[A83] Re: bcall hacking


[Prev][Next][Index][Thread]

[A83] Re: bcall hacking




well you gotta be really good at reverse engineering code for any of the new
romcalls.  i uploaded the my compilation of romcalls to
http://www.detacheds.com/brandon/romcalls83.txt .  Some of this was reverse
engineering, but mostly it was 2 and a half long days of copy and pasting
and comparing.  I think its the largest out there for the 83+.  If anyone
has any to add to it, please email me.  there are still hundreds out there
that are unequated and undocumented.

Brandon Sterner
----- Original Message -----
From: "David Lindström" <okvin@tiscali.se>
To: <assembly-83@lists.ticalc.org>
Sent: Tuesday, May 07, 2002 1:07 PM
Subject: [A83] bcall hacking


>
> I wonder how you can figure out undocumented bcalls on a ti83+
> like BCALL 807E which returns the five first bytes of the calc ID into =
> op1.
>
> Do you use the Flash Debugger for this purpose?
>
> //David
> Cirrus Programming, http://cirrus.tigalaxy.com
>
>
>




Follow-Ups: References: