请教Cool_lang存"工模中VB"的地址?
请教Cool_lang Flash中存"工模中VB"的地址?用了你的电池参数调整工具,很好用。
所以这个问题,我想你能给我答案 !
谢谢!
[此贴子已经被作者于2004-3-10 12:20:55编辑过]
即:如何在补丁中获得工模中VB的数据。
Cool_lang还没来吗?
等到花儿也谢了! 不好意思,最近有点忙!
E:39E2
相关的可以看这些!
0xB4:CA28 MakeMonitorString_Charge: ; CODE XREF: sub_D58FE6+2CP
0xB4:CA28 ; sub_D5904E+4AP
0xB4:CA28 mov [-r0], r9
0xB4:CA2A mov [-r0], r8
0xB4:CA2A mov [-r0], r8
0xB4:CA2C mov [-r0], r6
0xB4:CA2E mov DPP0, #0Eh
0xB4:CA32 sub r0, #0Ah
0xB4:CA36 mov r12, word_3B9EA
0xB4:CA3A cmp r12, #0CBh ; '?
0xB4:CA3E jmpa cc_Z, loc_B4CFBA
0xB4:CA42 mov r12, #3A54h
0xB4:CA46 mov r13, #0Eh
0xB4:CA4A mov r14, #20h ; ' '
0xB4:CA4E mov r15, #70h ; 'p'
0xB4:CA52 calls 0C7h, memset; R13:R12 -> pDst R14 -> Stuff R15 -> Size
0xB4:CA56 mov r8, #3A54h
0xB4:CA5A mov r9, #0Eh
0xB4:CA5E mov r6, #2
0xB4:CA60 mov [-r0], r6
0xB4:CA62 mov r12, r8
0xB4:CA64 mov r13, r9
0xB4:CA66 mov r14, #aVb ; "VB"
0xB4:CA6A mov r15, #2D3h
0xB4:CA6E calls 0C7h, memcpy_Limit
0xB4:CA72 mov DPP0, #0Eh
0xB4:CA76 add r0, #2
0xB4:CA78 mov r12, word_3B9E2
0xB4:CA7C mov r13, r0
0xB4:CA7E and r13, #3FFFh
0xB4:CA82 mov r14, DPP1
0xB4:CA86 mov r15, #4
0xB4:CA88 calls 0C7h, HexToDigString ; R15 = 有效数字
0xB4:CA8C mov r6, #4
0xB4:CA8E mov [-r0], r6
0xB4:CA90 mov r12, r8
0xB4:CA92 mov r13, r9
0xB4:CA94 add r12, #2
0xB4:CA96 mov r14, #2
0xB4:CA98 add r14, r0
0xB4:CA9A and r14, #3FFFh
0xB4:CA9E mov r15, DPP1
0xB4:CAA2 calls 0C7h, memcpy_Limit
0xB4:CAA6 add r8, #7
0xB4:CAA8 mov r6, #2
0xB4:CAAA mov , r6
0xB4:CAAC mov r12, r8
0xB4:CAAE mov r13, r9
0xB4:CAB0 mov r14, #aCt ; "CT"
0xB4:CAB4 mov r15, #2D3h
0xB4:CAB8 calls 0C7h, memcpy_Limit
0xB4:CABC mov DPP0, #0Eh
0xB4:CAC0 add r0, #2
0xB4:CAC2 mov r12, word_3B9EC
0xB4:CAC6 mov r13, r0
0xB4:CAC8 and r13, #3FFFh
0xB4:CACC mov r14, DPP1
0xB4:CAD0 mov r15, #1
0xB4:CAD2 calls 0C7h, HexToDigString ; R15 = 有效数字
0xB4:CAD6 mov r6, #1
0xB4:CAD8 mov [-r0], r6
0xB4:CADA mov r12, r8
0xB4:CADC mov r13, r9
0xB4:CADE add r12, #2
0xB4:CAE0 mov r14, #2
0xB4:CAE2 add r14, r0
0xB4:CAE4 and r14, #3FFFh
0xB4:CAE8 mov r15, DPP1
0xB4:CAEC calls 0C7h, memcpy_Limit
0xB4:CAF0 add r8, #4
0xB4:CAF2 mov r6, #2
0xB4:CAF4 mov , r6
0xB4:CAF6 mov r12, r8
0xB4:CAF8 mov r13, r9
0xB4:CAFA mov r14, #aEx ; "EX"
0xB4:CAFE mov r15, #2D3h
0xB4:CB02 calls 0C7h, memcpy_Limit
0xB4:CB06 mov DPP0, #0Eh
0xB4:CB0A add r0, #2
0xB4:CB0C mov r12, word_3B9F0
0xB4:CB10 mov r13, r0
0xB4:CB12 and r13, #3FFFh
0xB4:CB16 mov r14, DPP1
0xB4:CB1A mov r15, #2
0xB4:CB1C calls 0C7h, HexToDigString ; R15 = 有效数字
0xB4:CB20 mov r6, #2
0xB4:CB22 mov [-r0], r6
0xB4:CB24 mov r12, r8
0xB4:CB26 mov r13, r9
0xB4:CB28 add r12, #2
0xB4:CB2A mov r14, #2
0xB4:CB2C add r14, r0
0xB4:CB2E and r14, #3FFFh
0xB4:CB32 mov r15, DPP1
0xB4:CB36 calls 0C7h, memcpy_Limit
0xB4:CB3A add r8, #5
0xB4:CB3C mov r6, #2
0xB4:CB3E mov , r6
0xB4:CB40 mov r12, r8
0xB4:CB42 mov r13, r9
0xB4:CB44 mov r14, #aTb ; "TB"
0xB4:CB48 mov r15, #2D3h
0xB4:CB4C calls 0C7h, memcpy_Limit
0xB4:CB50 add r0, #2
0xB4:CB52 add r8, #2
0xB4:CB54 calls 0B5h, GetTB
0xB4:CB58 mov r6, r4
0xB4:CB5A sub r6, #2730
0xB4:CB5E cmp r6, #0
0xB4:CB60 jmpr cc_SGE, loc_B4CB80
0xB4:CB62 mov r12, r6
0xB4:CB64 neg r12
0xB4:CB66 mov r13, r0
0xB4:CB68 and r13, #3FFFh
0xB4:CB6C mov r14, DPP1
0xB4:CB70 mov r15, #3
0xB4:CB72 calls 0C7h, HexToDigString ; R15 = 有效数字
0xB4:CB76 movb rl6, #2Dh ; '-'
0xB4:CB7A extp r9, #1
0xB4:CB7C movb , rl6
0xB4:CB7E jmpr cc_UC, loc_B4CB9A
0xB4:CB80 ; ☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆
0xB4:CB80 loc_B4CB80: ; CODE XREF: MakeMonitorString_Charge+138j
0xB4:CB80 mov r12, r6
0xB4:CB82 mov r13, r0
0xB4:CB84 and r13, #3FFFh
0xB4:CB88 mov r14, DPP1
0xB4:CB8C mov r15, #3
0xB4:CB8E calls 0C7h, HexToDigString ; R15 = 有效数字
0xB4:CB92 movb rl6, #2Bh ; '+'
0xB4:CB96 extp r9, #1
0xB4:CB98 movb , rl6
0xB4:CB9A loc_B4CB9A: ; CODE XREF: MakeMonitorString_Charge+156j
0xB4:CB9A add r8, #1
0xB4:CB9C mov r6, #3
0xB4:CB9E mov [-r0], r6
0xB4:CBA0 mov r12, r8
0xB4:CBA2 mov r13, r9
0xB4:CBA4 mov r14, #2
0xB4:CBA6 add r14, r0
0xB4:CBA8 and r14, #3FFFh
0xB4:CBAC mov r15, DPP1
0xB4:CBB0 calls 0C7h, memcpy_Limit
0xB4:CBB4 add r8, #4
0xB4:CBB6 mov r6, #2
0xB4:CBB8 mov , r6
0xB4:CBBA mov r12, r8
0xB4:CBBC mov r13, r9
0xB4:CBBE mov r14, aLs ; "LS"
0xB4:CBC2 mov r15, #2D3h
0xB4:CBC6 calls 0C7h, memcpy_Limit
0xB4:CBCA mov DPP0, #0Eh
0xB4:CBCE add r0, #2
0xB4:CBD0 mov r12, word_3B9EA
0xB4:CBD4 mov r13, r0
0xB4:CBD6 and r13, #3FFFh
0xB4:CBDA mov r14, DPP1
0xB4:CBDE mov r15, #1
0xB4:CBE0 calls 0C7h, HexToDigString ; R15 = 有效数字
0xB4:CBE4 mov r6, #1
0xB4:CBE6 mov [-r0], r6
0xB4:CBE8 mov r12, r8
0xB4:CBEA mov r13, r9
0xB4:CBEC add r12, #2
0xB4:CBEE mov r14, #2
0xB4:CBF0 add r14, r0
0xB4:CBF2 and r14, #3FFFh
0xB4:CBF6 mov r15, DPP1
0xB4:CBFA calls 0C7h, memcpy_Limit
0xB4:CBFE add r8, #4
0xB4:CC00 mov r6, #2
0xB4:CC02 mov , r6
0xB4:CC04 mov r12, r8
0xB4:CC06 mov r13, r9
0xB4:CC08 mov r14, aAt ; "AT"
0xB4:CC0C mov r15, #2D3h
0xB4:CC10 calls 0C7h, memcpy_Limit
0xB4:CC14 mov DPP0, #0Eh
0xB4:CC18 add r0, #2
0xB4:CC1A movbz r12, byte_3B9FE
0xB4:CC1E mov r13, r0
0xB4:CC20 and r13, #3FFFh
0xB4:CC24 mov r14, DPP1
0xB4:CC28 mov r15, #1
0xB4:CC2A calls 0C7h, HexToDigString ; R15 = 有效数字
0xB4:CC2E mov r6, #1
0xB4:CC30 mov [-r0], r6
0xB4:CC32 mov r12, r8
0xB4:CC34 mov r13, r9
0xB4:CC36 add r12, #2
0xB4:CC38 mov r14, #2
0xB4:CC3A add r14, r0
0xB4:CC3C and r14, #3FFFh
0xB4:CC40 mov r15, DPP1
0xB4:CC44 calls 0C7h, memcpy_Limit
0xB4:CC48 add r8, #4
0xB4:CC4A mov r6, #2
0xB4:CC4C mov , r6
0xB4:CC4E mov r12, r8
0xB4:CC50 mov r13, r9
0xB4:CC52 mov r14, aTe ; "TE"
0xB4:CC56 mov r15, #2D3h
0xB4:CC5A calls 0C7h, memcpy_Limit
0xB4:CC5E add r0, #2
0xB4:CC60 add r8, #2
0xB4:CC62 calls 0B5h, GetTE
0xB4:CC66 mov r6, r4
0xB4:CC68 sub r6, #2730
0xB4:CC6C cmp r6, #0
0xB4:CC6E jmpr cc_SGE, loc_B4CC8E
0xB4:CC70 mov r12, r6
0xB4:CC72 neg r12
0xB4:CC74 mov r13, r0
0xB4:CC76 and r13, #3FFFh
0xB4:CC7A mov r14, DPP1
0xB4:CC7E mov r15, #3
0xB4:CC80 calls 0C7h, HexToDigString ; R15 = 有效数字
0xB4:CC84 movb rl6, #2Dh ; '-'
0xB4:CC88 extp r9, #1
0xB4:CC8A movb , rl6
0xB4:CC8C jmpr cc_UC, loc_B4CCA8
0xB4:CC8E ; ☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆
0xB4:CC8E loc_B4CC8E: ; CODE XREF: MakeMonitorString_Charge+246j
0xB4:CC8E mov r12, r6
0xB4:CC90 mov r13, r0
0xB4:CC92 and r13, #3FFFh
0xB4:CC96 mov r14, DPP1
0xB4:CC9A mov r15, #3
0xB4:CC9C calls 0C7h, HexToDigString ; R15 = 有效数字
0xB4:CCA0 movb rl6, #2Bh ; '+'
0xB4:CCA4 extp r9, #1
0xB4:CCA6 movb , rl6
0xB4:CCA8 loc_B4CCA8: ; CODE XREF: MakeMonitorString_Charge+264j
0xB4:CCA8 add r8, #1
0xB4:CCAA mov r6, #3
0xB4:CCAC mov [-r0], r6
0xB4:CCAE mov r12, r8
0xB4:CCB0 mov r13, r9
0xB4:CCB2 mov r14, #2
0xB4:CCB4 add r14, r0
0xB4:CCB6 and r14, #3FFFh
0xB4:CCBA mov r15, DPP1
0xB4:CCBE calls 0C7h, memcpy_Limit
0xB4:CCC2 add r8, #4
0xB4:CCC4 mov r6, #2
0xB4:CCC6 mov , r6
0xB4:CCC8 mov r12, r8
0xB4:CCCA mov r13, r9
0xB4:CCCC mov r14, aSb ; "SB"
0xB4:CCD0 mov r15, #2D3h
0xB4:CCD4 calls 0C7h, memcpy_Limit
0xB4:CCD8 mov DPP0, #0Eh
0xB4:CCDC add r0, #2
0xB4:CCDE movbz r12, byte_3B9EE
0xB4:CCE2 mov r13, r0
0xB4:CCE4 and r13, #3FFFh
0xB4:CCE8 mov r14, DPP1
0xB4:CCEC mov r15, #3
0xB4:CCEE calls 0C7h, HexToDigString ; R15 = 有效数字
0xB4:CCF2 mov r6, #3
0xB4:CCF4 mov [-r0], r6
0xB4:CCF6 mov r12, r8
0xB4:CCF8 mov r13, r9
0xB4:CCFA add r12, #2
0xB4:CCFC mov r14, #2
0xB4:CCFE add r14, r0
0xB4:CD00 and r14, #3FFFh
0xB4:CD04 mov r15, DPP1
0xB4:CD08 calls 0C7h, memcpy_Limit
0xB4:CD0C add r8, #6
0xB4:CD0E mov r6, #2
0xB4:CD10 mov , r6
0xB4:CD12 mov r12, r8
0xB4:CD14 mov r13, r9
0xB4:CD16 mov r14, aLt ; "LT"
0xB4:CD1A mov r15, #2D3h
0xB4:CD1E calls 0C7h, memcpy_Limit
0xB4:CD22 mov DPP0, #0Eh
0xB4:CD26 add r0, #2
0xB4:CD28 mov r12, word_3B9E8
0xB4:CD2C mov r13, r0
0xB4:CD2E and r13, #3FFFh
0xB4:CD32 mov r14, DPP1
0xB4:CD36 mov r15, #5
0xB4:CD38 calls 0C7h, HexToDigString ; R15 = 有效数字
0xB4:CD3C mov r6, #5
0xB4:CD3E mov [-r0], r6
0xB4:CD40 mov r12, r8
0xB4:CD42 mov r13, r9
0xB4:CD44 add r12, #2
0xB4:CD46 mov r14, #2
0xB4:CD48 add r14, r0
0xB4:CD4A and r14, #3FFFh
0xB4:CD4E mov r15, DPP1
0xB4:CD52 calls 0C7h, memcpy_Limit
0xB4:CD56 add r8, #8
0xB4:CD5A mov r6, #3
0xB4:CD5C mov , r6
0xB4:CD5E mov r12, r8
0xB4:CD60 mov r13, r9
0xB4:CD62 mov r14, aPpv ; "PPV"
0xB4:CD66 mov r15, #2D3h
0xB4:CD6A calls 0C7h, memcpy_Limit
0xB4:CD6E add r0, #2
0xB4:CD70 extp #0Eh, #1
0xB4:CD74 mov r12, word_3BAC6
0xB4:CD78 mov r13, r0
0xB4:CD7A and r13, #3FFFh
0xB4:CD7E mov r14, DPP1
0xB4:CD82 mov r15, #3
0xB4:CD84 calls 0C7h, HexToDigString ; R15 = 有效数字
0xB4:CD88 mov r6, #3
0xB4:CD8A mov [-r0], r6
0xB4:CD8C mov r12, r8
0xB4:CD8E mov r13, r9
0xB4:CD90 add r12, #3
0xB4:CD92 mov r14, #2
0xB4:CD94 add r14, r0
0xB4:CD96 and r14, #3FFFh
0xB4:CD9A mov r15, DPP1
0xB4:CD9E calls 0C7h, memcpy_Limit
0xB4:CDA2 add r8, #7
0xB4:CDA4 mov r6, #4
0xB4:CDA6 mov , r6
0xB4:CDA8 mov r12, r8
0xB4:CDAA mov r13, r9
0xB4:CDAC mov r14, aVmax ; "VMax"
0xB4:CDB0 mov r15, #2D3h
0xB4:CDB4 calls 0C7h, memcpy_Limit
0xB4:CDB8 mov DPP0, #0Eh
0xB4:CDBC add r0, #2
0xB4:CDBE movb rl6, byte_3B9FE
0xB4:CDC2 cmpb rl6, #1
0xB4:CDC4 jmpr cc_Z, loc_B4CDCA
0xB4:CDC6 cmpb rl6, #2
0xB4:CDC8 jmpr cc_NZ, loc_B4CE08
0xB4:CDCA loc_B4CDCA: ; CODE XREF: MakeMonitorString_Charge+39Cj
0xB4:CDCA mov DPP0, #0Eh
0xB4:CDCE nop
0xB4:CDD0 mov r6, word_3B9EC
0xB4:CDD4 cmp r6, #1
0xB4:CDD6 jmpr cc_NZ, loc_B4CDEE
0xB4:CDD8 mov r12, word_3B9F4
0xB4:CDDC mov r13, r0
0xB4:CDDE and r13, #3FFFh
0xB4:CDE2 mov r14, DPP1
0xB4:CDE6 mov r15, #4
0xB4:CDE8 calls 0C7h, HexToDigString ; R15 = 有效数字
0xB4:CDEC jmpr cc_UC, loc_B4CE20
0xB4:CDEE ; ☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆
0xB4:CDEE loc_B4CDEE: ; CODE XREF: MakeMonitorString_Charge+3AEj
0xB4:CDEE mov DPP0, #0Eh
0xB4:CDF2 mov r13, r0
0xB4:CDF4 mov r12, word_3BA18
0xB4:CDF8 and r13, #3FFFh
0xB4:CDFC mov r14, DPP1
0xB4:CE00 mov r15, #4
0xB4:CE02 calls 0C7h, HexToDigString ; R15 = 有效数字
0xB4:CE06 jmpr cc_UC, loc_B4CE20
0xB4:CE08 ; ☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆
0xB4:CE08 loc_B4CE08: ; CODE XREF: MakeMonitorString_Charge+3A0j
0xB4:CE08 mov DPP0, #0Eh
0xB4:CE0C mov r13, r0
0xB4:CE0E mov r12, word_3BA44
0xB4:CE12 and r13, #3FFFh
0xB4:CE16 mov r14, DPP1
0xB4:CE1A mov r15, #4
0xB4:CE1C calls 0C7h, HexToDigString ; R15 = 有效数字
0xB4:CE20 loc_B4CE20: ; CODE XREF: MakeMonitorString_Charge+3C4j
0xB4:CE20 ; MakeMonitorString_Charge+3DEj
0xB4:CE20 mov r6, #4
0xB4:CE22 mov [-r0], r6
0xB4:CE24 mov r12, r8
0xB4:CE26 mov r13, r9
0xB4:CE28 add r12, #4
0xB4:CE2A mov r14, #2
0xB4:CE2C add r14, r0
0xB4:CE2E and r14, #3FFFh
0xB4:CE32 mov r15, DPP1
0xB4:CE36 calls 0C7h, memcpy_Limit
0xB4:CE3A add r8, #9
0xB4:CE3E mov r6, #2
0xB4:CE40 mov , r6
0xB4:CE42 mov r12, r8
0xB4:CE44 mov r13, r9
0xB4:CE46 mov r14, aMa ; "mA"
0xB4:CE4A mov r15, #2D3h
0xB4:CE4E calls 0C7h, memcpy_Limit
0xB4:CE52 mov DPP0, #0Eh
0xB4:CE56 add r0, #2
0xB4:CE58 mov r12, word_3B9FC
0xB4:CE5C mov r13, r0
0xB4:CE5E and r13, #3FFFh
0xB4:CE62 mov r14, DPP1
0xB4:CE66 mov r15, #3
0xB4:CE68 calls 0C7h, HexToDigString ; R15 = 有效数字
0xB4:CE6C mov r6, #3
0xB4:CE6E mov [-r0], r6
0xB4:CE70 mov r12, r8
0xB4:CE72 mov r13, r9
0xB4:CE74 add r12, #2
0xB4:CE76 mov r14, #2
0xB4:CE78 add r14, r0
0xB4:CE7A and r14, #3FFFh
0xB4:CE7E mov r15, DPP1
0xB4:CE82 calls 0C7h, memcpy_Limit
0xB4:CE86 add r8, #6
0xB4:CE88 mov r6, #2
0xB4:CE8A mov , r6
0xB4:CE8C mov r12, r8
0xB4:CE8E mov r13, r9
0xB4:CE90 mov r14, #aAs ; "AS"
0xB4:CE94 mov r15, #2D3h
0xB4:CE98 calls 0C7h, memcpy_Limit
0xB4:CE9C add r0, #2
0xB4:CE9E calls 0B5h, sub_B5090E
0xB4:CEA2 mov r12, r4
0xB4:CEA4 mov DPP0, #0Eh
0xB4:CEA8 mov r13, r5
0xB4:CEAA mov r6, word_3B9E4 ; 2940
0xB4:CEAE mov [-r0], r6
0xB4:CEB0 extp r13, #1
0xB4:CEB2 mov r14, ; 4072
0xB4:CEB6 mov [-r0], r14
0xB4:CEB8 extp r13, #1
0xB4:CEBA movb rl1, ; 0
0xB4:CEBE mov r15, r12
0xB4:CEC0 movbz r12, rl1
0xB4:CEC2 mov r1, r13
0xB4:CEC4 movbz r13, byte_3B9FE ; 04
0xB4:CEC8 extp r1, #1
0xB4:CECA movb rl2, ; 05
0xB4:CECE movbz r14, rl2
0xB4:CED0 extp r1, #1
0xB4:CED2 mov r15, ; 3860
0xB4:CED4 calls 0B0h, GetAS
0xB4:CED8 add r0, #4
0xB4:CEDA extp r5, #2
0xB4:CEDC mov r6,
0xB4:CEDE mov r1,
0xB4:CEE0 mov , r6
0xB4:CEE4 mov DPP0, #0Eh
0xB4:CEE8 mov , r1
0xB4:CEEC mov r12, word_3B9E0
0xB4:CEF0 cmp r12, #1
0xB4:CEF2 jmpr cc_NZ, loc_B4CF08
0xB4:CEF4 mov r12, r1
0xB4:CEF6 mov r13, r0
0xB4:CEF8 and r13, #3FFFh
0xB4:CEFC mov r14, DPP1
0xB4:CF00 mov r15, #4
0xB4:CF02 calls 0C7h, HexToDigString ; R15 = 有效数字
0xB4:CF06 jmpr cc_UC, loc_B4CF1C
0xB4:CF08 ; ☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆
0xB4:CF08 loc_B4CF08: ; CODE XREF: MakeMonitorString_Charge+4CAj
0xB4:CF08 mov r12,
0xB4:CF0C mov r13, r0
0xB4:CF0E and r13, #3FFFh
0xB4:CF12 mov r14, DPP1
0xB4:CF16 mov r15, #4
0xB4:CF18 calls 0C7h, HexToDigString ; R15 = 有效数字
0xB4:CF1C loc_B4CF1C: ; CODE XREF: MakeMonitorString_Charge+4DEj
0xB4:CF1C mov r6, #4
0xB4:CF1E mov [-r0], r6
0xB4:CF20 mov r12, r8
0xB4:CF22 mov r13, r9
0xB4:CF24 add r12, #2
0xB4:CF26 mov r14, #2
0xB4:CF28 add r14, r0
0xB4:CF2A and r14, #3FFFh
0xB4:CF2E mov r15, DPP1
0xB4:CF32 calls 0C7h, memcpy_Limit
0xB4:CF36 add r8, #7
0xB4:CF38 mov r6, #3
0xB4:CF3A mov , r6
0xB4:CF3C mov r12, r8
0xB4:CF3E mov r13, r9
0xB4:CF40 mov r14, aTme ; "TmE"
0xB4:CF44 mov r15, #2D3h
0xB4:CF48 calls 0C7h, memcpy_Limit
0xB4:CF4C mov DPP0, #0Eh
0xB4:CF50 add r0, #2
0xB4:CF52 mov r12, word_3BA48
0xB4:CF56 mov r13, r0
0xB4:CF58 and r13, #3FFFh
0xB4:CF5C mov r14, DPP1
0xB4:CF60 mov r15, #5
0xB4:CF62 calls 0C7h, HexToDigString ; R15 = 有效数字
0xB4:CF66 mov r6, #5
0xB4:CF68 mov [-r0], r6
0xB4:CF6A mov r12, r8
0xB4:CF6C mov r13, r9
0xB4:CF6E add r12, #3
0xB4:CF70 mov r14, #2
0xB4:CF72 add r14, r0
0xB4:CF74 and r14, #3FFFh
0xB4:CF78 mov r15, DPP1
0xB4:CF7C calls 0C7h, memcpy_Limit
0xB4:CF80 add r0, #2
0xB4:CF82 add r8, #9
0xB4:CF86 mov r12, r8
0xB4:CF88 mov r13, r9
0xB4:CF8A calls 0B1h, sub_B1FE68
0xB4:CF8E mov DPP0, #0Eh
0xB4:CF92 add r8, #11h
0xB4:CF96 movb byte_3BAC4, ZEROS
0xB4:CF9A mov r6, #3A54h
0xB4:CF9E mov r12, #0Eh
0xB4:CFA2 sub r8, r6
0xB4:CFA4 mov r9, #0
0xB4:CFA6 sub r8, #71h ; 'q'
0xB4:CFAA subc r9, #0
0xB4:CFAC jmpa cc_C, loc_B4D08A
0xB4:CFB0 mov CC7, #0A019h
0xB4:CFB4 trap #30h ; '0'
0xB4:CFB6 jmpa cc_UC, loc_B4D08A
0xB4:CFBA ; ☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆
0xB4:CFBA loc_B4CFBA: ; CODE XREF: MakeMonitorString_Charge+16j
0xB4:CFBA mov r8, #40h ; '@'
0xB4:CFBE mov [-r0], r8
0xB4:CFC0 mov r12, #3A54h
0xB4:CFC4 mov r13, #0Eh
0xB4:CFC8 mov r14, #10E8h ; ' '
0xB4:CFCC mov r15, #2D3h
0xB4:CFD0 calls 0C7h, memcpy_Limit
0xB4:CFD4 mov DPP0, #0Eh
0xB4:CFD8 add r0, #2
0xB4:CFDA mov r12, word_3B9E2
0xB4:CFDE mov r13, r0
0xB4:CFE0 and r13, #3FFFh
0xB4:CFE4 mov r14, DPP1
0xB4:CFE8 mov r15, #4
0xB4:CFEA calls 0C7h, HexToDigString ; R15 = 有效数字
0xB4:CFEE mov r8, #4
0xB4:CFF0 mov [-r0], r8
0xB4:CFF2 mov r12, #3A6Ch
0xB4:CFF6 mov r13, #0Eh
0xB4:CFFA mov r14, #2
0xB4:CFFC add r14, r0
0xB4:CFFE and r14, #3FFFh
0xB4:D002 mov r15, DPP1
0xB4:D006 calls 0C7h, memcpy_Limit
0xB4:D00A mov DPP0, #0Eh
0xB4:D00E add r0, #2
0xB4:D010 movbs r8, byte_3BA2D
0xB4:D014 shl r8, #1
0xB4:D016 extp #2D2h, #1
0xB4:D01A mov r12,
0xB4:D01E mov r13, r0
0xB4:D020 and r13, #3FFFh
0xB4:D024 mov r14, DPP1
0xB4:D028 mov r15, #4
0xB4:D02A calls 0C7h, HexToDigString ; R15 = 有效数字
0xB4:D02E mov r8, #4
0xB4:D030 mov [-r0], r8
0xB4:D032 mov r12, #3A7Ah
0xB4:D036 mov r13, #0Eh
0xB4:D03A mov r14, #2
0xB4:D03C add r14, r0
0xB4:D03E and r14, #3FFFh
0xB4:D042 mov r15, DPP1
0xB4:D046 calls 0C7h, memcpy_Limit
0xB4:D04A mov DPP0, #0Eh
0xB4:D04E add r0, #2
0xB4:D050 movbz r12, byte_3BA2E
0xB4:D054 mov r13, r0
0xB4:D056 and r13, #3FFFh
0xB4:D05A mov r14, DPP1
0xB4:D05E mov r15, #3
0xB4:D060 calls 0C7h, HexToDigString ; R15 = 有效数字
0xB4:D064 mov r8, #3
0xB4:D066 mov [-r0], r8
0xB4:D068 mov r12, #3A8Fh
0xB4:D06C mov r13, #0Eh
0xB4:D070 mov r14, #2
0xB4:D072 add r14, r0
0xB4:D074 and r14, #3FFFh
0xB4:D078 mov r15, DPP1
0xB4:D07C calls 0C7h, memcpy_Limit
0xB4:D080 mov DPP0, #0Eh
0xB4:D084 add r0, #2
0xB4:D086 movb byte_3BA94, ZEROS
0xB4:D08A loc_B4D08A: ; CODE XREF: MakeMonitorString_Charge+584j
0xB4:D08A ; MakeMonitorString_Charge+58Ej
0xB4:D08A mov r4, #3A54h
0xB4:D08E mov r5, #0Eh
0xB4:D092 add r0, #0Ah
0xB4:D096 mov r6,
0xB4:D098 mov r8,
0xB4:D09A mov r9,
0xB4:D09C rets
0xB4:D09E MonitorString:dw 0C5E8h
0xB4:D0A0 dw 0C5E8h
0xB4:D0A2 dw 0C5ECh
0xB4:D0A4 dw 0C5ECh
0xB4:D0A6 dw 0C5ECh
0xB4:D0A8 dw 0C630h
0xB4:D0AA dw 0C630h
0xB4:D0AC dw 0C634h
0xB4:D0AE dw 0C634h
0xB4:D0B0 dw 0C634h
0xB4:D0B2 aLs: db 'LS',0 ; DATA XREF: MakeMonitorString_Charge+196t
0xB4:D0B5 aLt: db 'LT',0 ; DATA XREF: MakeMonitorString_Charge+2EEt
0xB4:D0B8 aIiiiciiic: db 'iiiiciiic',0
0xB4:D0C2 aAs: db 'AS',0 ; DATA XREF: MakeMonitorString_Charge+468t
0xB4:D0C5 aAt: db 'AT',0 ; DATA XREF: MakeMonitorString_Charge+1E0t
0xB4:D0C8 aIii: db 'iii',0
0xB4:D0CC aTme: db 'TmE',0 ; DATA XREF: MakeMonitorString_Charge+518t
0xB4:D0D0 aPpv: db 'PPV',0 ; DATA XREF: MakeMonitorString_Charge+33At
0xB4:D0D4 aCt: db 'CT',0 ; DATA XREF: MakeMonitorString_Charge+88t
0xB4:D0D7 aVmax: db 'VMax',0 ; DATA XREF: MakeMonitorString_Charge+384t
0xB4:D0DC aMa: db 'mA',0 ; DATA XREF: MakeMonitorString_Charge+41Et
0xB4:D0DF aSb: db 'SB',0 ; DATA XREF: MakeMonitorString_Charge+2A4t
0xB4:D0E2 aEx: db 'EX',0 ; DATA XREF: MakeMonitorString_Charge+D2t
0xB4:D0E5 aTb: db 'TB',0 ; DATA XREF: MakeMonitorString_Charge+11Ct
0xB4:D0E8 aEmvTestVbattPpvStrbyte:db ' **',9,'EMV-Test ** VBATT= PPV= StrByte='
0xB4:D0E8 db ' ',0
0xB4:D129 aTe: db 'TE',0 ; DATA XREF: MakeMonitorString_Charge+22At
0xB4:D12C aVb: db 'VB',0 ; DATA XREF: MakeMonitorString_Charge+3Et
0xB4:D12F db 0FFh ;
好多啊。不过最后好像切入问题了。 多谢Cool_lang,花时间好好研究一下。
果果,看得如何了?
页:
[1]