📄 symc.sym
字号:
=========================================================** ELF Header Information Machine class: 32-bit (1) Data encoding: Little endian (1) Header version: 1 File Type: Executable (2) Machine: ARM (40) Image Entry point: 0x00000000 Program header offset: 67360 (0x00010720) Section header offset: 67456 (0x00010780) Flags: EF_ARM_HASENTRY (0x00000002) Header size: 52 bytes (0x34) Program header entry size: 32 bytes (0x20) Program header entries: 3 Section header entry size: 40 bytes (0x28) Section header entries: 15 String table section index: 14=========================================================** Program header #1 (PT_LOAD) [PF_X + PF_R] Size : 27056 bytes Virtual address: 0x00000000========================** Program header #2 (PT_LOAD) [PF_W + PF_R] Size : 692 bytes Virtual address: 0x000069b0========================** Program header #3 (PT_LOAD) [PF_W + PF_R] Size : 80 bytes (0 bytes in file) Virtual address: 0x00006c64=========================================================** Section #1 '..\bin\44bmon.elf' (SHT_PROGBITS) [SHF_ALLOC + SHF_EXECINSTR + SHF_LOADREGION] Size : 27056 bytes EXPORT Init$$Base Init$$Base Init 0x000000: ea000125 %... B 0x49c 0x000004: ea00005d ]... B 0x180 0x000008: ea000062 b... B 0x198 0x00000c: ea00006d m... B 0x1c8 0x000010: ea000066 f... B 0x1b0 0x000014: eafffffe .... B 0x14 0x000018: ea000052 R... B 0x168 0x00001c: ea00004b K... B 0x150 0x000020: e59ff0bc .... LDR pc,0xe4 0x000024: e59ff0bc .... LDR pc,0xe8 0x000028: e59ff0bc .... LDR pc,0xec 0x00002c: e59ff0bc .... LDR pc,0xf0 0x000030: e59ff0bc .... LDR pc,0xf4 0x000034: e59ff0bc .... LDR pc,0xf8 0x000038: eafffffe .... B 0x38 0x00003c: eafffffe .... B 0x3c 0x000040: e59ff0b4 .... LDR pc,0xfc 0x000044: e59ff0b4 .... LDR pc,0x100 0x000048: e59ff0b4 .... LDR pc,0x104 0x00004c: e59ff0b4 .... LDR pc,0x108 0x000050: e59ff0b4 .... LDR pc,0x10c 0x000054: e59ff0b4 .... LDR pc,0x110 0x000058: eafffffe .... B 0x58 0x00005c: eafffffe .... B 0x5c 0x000060: e59ff0ac .... LDR pc,0x114 0x000064: e59ff0ac .... LDR pc,0x118 0x000068: e59ff0ac .... LDR pc,0x11c 0x00006c: e59ff0ac .... LDR pc,0x120 0x000070: e59ff0ac .... LDR pc,0x124 0x000074: e59ff0ac .... LDR pc,0x128 0x000078: eafffffe .... B 0x78 0x00007c: eafffffe .... B 0x7c 0x000080: e59ff0a4 .... LDR pc,0x12c 0x000084: e59ff0a4 .... LDR pc,0x130 0x000088: e59ff0a4 .... LDR pc,0x134 0x00008c: e59ff0a4 .... LDR pc,0x138 0x000090: e59ff0a4 .... LDR pc,0x13c 0x000094: e59ff0a4 .... LDR pc,0x140 0x000098: eafffffe .... B 0x98 0x00009c: eafffffe .... B 0x9c 0x0000a0: e59ff09c .... LDR pc,0x144 0x0000a4: eafffffe .... B 0xa4 0x0000a8: eafffffe .... B 0xa8 0x0000ac: eafffffe .... B 0xac 0x0000b0: eafffffe .... B 0xb0 0x0000b4: eafffffe .... B 0xb4 0x0000b8: eafffffe .... B 0xb8 0x0000bc: eafffffe .... B 0xbc 0x0000c0: e59ff080 .... LDR pc,0x148 0x0000c4: eafffffe .... B 0xc4 0x0000c8: eafffffe .... B 0xc8 0x0000cc: eafffffe .... B 0xcc 0x0000d0: eafffffe .... B 0xd0 0x0000d4: eafffffe .... B 0xd4 0x0000d8: eafffffe .... B 0xd8 0x0000dc: eafffffe .... B 0xdc 0x0000e0: e59ff064 d... LDR pc,0x14c x$litpool$1 0x0000e4: 00000438 8... ANDEQ r0,r0,r8,LSR r4 0x0000e8: 00000420 ... ANDEQ r0,r0,r0,LSR #8 0x0000ec: 00000408 .... ANDEQ r0,r0,r8,LSL #8 0x0000f0: 000003f0 .... ANDEQ r0,r0,r0,ROR r3 ; ? Bad load/store extension op 0x0000f4: 000003d8 .... ANDEQ r0,r0,r8,ASR r3 ; ? Bad load/store extension op 0x0000f8: 000003c0 .... ANDEQ r0,r0,r0,ASR #7 0x0000fc: 000003a8 .... ANDEQ r0,r0,r8,LSR #7 0x000100: 00000390 .... MULEQ r0,r0,r3 0x000104: 00000378 x... ANDEQ r0,r0,r8,ROR r3 0x000108: 00000360 `... ANDEQ r0,r0,r0,ROR #6 0x00010c: 00000348 H... ANDEQ r0,r0,r8,ASR #6 0x000110: 00000330 0... ANDEQ r0,r0,r0,LSR r3 0x000114: 00000318 .... ANDEQ r0,r0,r8,LSL r3 0x000118: 00000300 .... ANDEQ r0,r0,r0,LSL #6 0x00011c: 000002e8 .... ANDEQ r0,r0,r8,ROR #5 0x000120: 000002d0 .... ANDEQ r0,r0,r0,ASR r2 ; ? Bad load/store extension op 0x000124: 000002b8 .... STREQH r0,[r0],-r8 0x000128: 000002a0 .... ANDEQ r0,r0,r0,LSR #5 0x00012c: 00000288 .... ANDEQ r0,r0,r8,LSL #5 0x000130: 00000270 p... ANDEQ r0,r0,r0,ROR r2 0x000134: 00000258 X... ANDEQ r0,r0,r8,ASR r2 0x000138: 00000240 @... ANDEQ r0,r0,r0,ASR #4 0x00013c: 00000228 (... ANDEQ r0,r0,r8,LSR #4 0x000140: 00000210 .... ANDEQ r0,r0,r0,LSL r2 0x000144: 000001f8 .... ANDEQ r0,r0,r8,ROR r1 ; ? Bad load/store extension op 0x000148: 000001e0 .... ANDEQ r0,r0,r0,ROR #3 0x00014c: 00000588 .... ANDEQ r0,r0,r8,LSL #11 x$litpool_e$1 0x000150: e24dd004 ..M. SUB r13,r13,#4 0x000154: e92d0001 ..-. STMDB r13!,{r0} 0x000158: e59f047c |... LDR r0,0x5dc 0x00015c: e5900000 .... LDR r0,[r0,#0] 0x000160: e58d0004 .... STR r0,[r13,#4] 0x000164: e8bd8001 .... LDMIA r13!,{r0,pc} 0x000168: e24dd004 ..M. SUB r13,r13,#4 0x00016c: e92d0001 ..-. STMDB r13!,{r0} 0x000170: e59f0468 h... LDR r0,0x5e0 0x000174: e5900000 .... LDR r0,[r0,#0] 0x000178: e58d0004 .... STR r0,[r13,#4] 0x00017c: e8bd8001 .... LDMIA r13!,{r0,pc} 0x000180: e24dd004 ..M. SUB r13,r13,#4 0x000184: e92d0001 ..-. STMDB r13!,{r0} 0x000188: e59f0454 T... LDR r0,0x5e4 0x00018c: e5900000 .... LDR r0,[r0,#0] 0x000190: e58d0004 .... STR r0,[r13,#4] 0x000194: e8bd8001 .... LDMIA r13!,{r0,pc} 0x000198: e24dd004 ..M. SUB r13,r13,#4 0x00019c: e92d0001 ..-. STMDB r13!,{r0} 0x0001a0: e59f0440 @... LDR r0,0x5e8 0x0001a4: e5900000 .... LDR r0,[r0,#0] 0x0001a8: e58d0004 .... STR r0,[r13,#4] 0x0001ac: e8bd8001 .... LDMIA r13!,{r0,pc} 0x0001b0: e24dd004 ..M. SUB r13,r13,#4 0x0001b4: e92d0001 ..-. STMDB r13!,{r0} 0x0001b8: e59f042c ,... LDR r0,0x5ec 0x0001bc: e5900000 .... LDR r0,[r0,#0] 0x0001c0: e58d0004 .... STR r0,[r13,#4] 0x0001c4: e8bd8001 .... LDMIA r13!,{r0,pc} 0x0001c8: e24dd004 ..M. SUB r13,r13,#4 0x0001cc: e92d0001 ..-. STMDB r13!,{r0} 0x0001d0: e59f0418 .... LDR r0,0x5f0 0x0001d4: e5900000 .... LDR r0,[r0,#0] 0x0001d8: e58d0004 .... STR r0,[r13,#4] 0x0001dc: e8bd8001 .... LDMIA r13!,{r0,pc} 0x0001e0: e24dd004 ..M. SUB r13,r13,#4 0x0001e4: e92d0001 ..-. STMDB r13!,{r0} 0x0001e8: e59f0404 .... LDR r0,0x5f4 0x0001ec: e5900000 .... LDR r0,[r0,#0] 0x0001f0: e58d0004 .... STR r0,[r13,#4] 0x0001f4: e8bd8001 .... LDMIA r13!,{r0,pc} 0x0001f8: e24dd004 ..M. SUB r13,r13,#4 0x0001fc: e92d0001 ..-. STMDB r13!,{r0} 0x000200: e59f03f0 .... LDR r0,0x5f8 0x000204: e5900000 .... LDR r0,[r0,#0] 0x000208: e58d0004 .... STR r0,[r13,#4] 0x00020c: e8bd8001 .... LDMIA r13!,{r0,pc} 0x000210: e24dd004 ..M. SUB r13,r13,#4 0x000214: e92d0001 ..-. STMDB r13!,{r0} 0x000218: e59f03dc .... LDR r0,0x5fc 0x00021c: e5900000 .... LDR r0,[r0,#0] 0x000220: e58d0004 .... STR r0,[r13,#4] 0x000224: e8bd8001 .... LDMIA r13!,{r0,pc} 0x000228: e24dd004 ..M. SUB r13,r13,#4 0x00022c: e92d0001 ..-. STMDB r13!,{r0} 0x000230: e59f03c8 .... LDR r0,0x600 0x000234: e5900000 .... LDR r0,[r0,#0] 0x000238: e58d0004 .... STR r0,[r13,#4] 0x00023c: e8bd8001 .... LDMIA r13!,{r0,pc} 0x000240: e24dd004 ..M. SUB r13,r13,#4 0x000244: e92d0001 ..-. STMDB r13!,{r0} 0x000248: e59f03b4 .... LDR r0,0x604 0x00024c: e5900000 .... LDR r0,[r0,#0] 0x000250: e58d0004 .... STR r0,[r13,#4] 0x000254: e8bd8001 .... LDMIA r13!,{r0,pc} 0x000258: e24dd004 ..M. SUB r13,r13,#4 0x00025c: e92d0001 ..-. STMDB r13!,{r0} 0x000260: e59f03a0 .... LDR r0,0x608 0x000264: e5900000 .... LDR r0,[r0,#0] 0x000268: e58d0004 .... STR r0,[r13,#4] 0x00026c: e8bd8001 .... LDMIA r13!,{r0,pc} 0x000270: e24dd004 ..M. SUB r13,r13,#4 0x000274: e92d0001 ..-. STMDB r13!,{r0} 0x000278: e59f038c .... LDR r0,0x60c 0x00027c: e5900000 .... LDR r0,[r0,#0] 0x000280: e58d0004 .... STR r0,[r13,#4] 0x000284: e8bd8001 .... LDMIA r13!,{r0,pc} 0x000288: e24dd004 ..M. SUB r13,r13,#4 0x00028c: e92d0001 ..-. STMDB r13!,{r0} 0x000290: e59f0378 x... LDR r0,0x610 0x000294: e5900000 .... LDR r0,[r0,#0] 0x000298: e58d0004 .... STR r0,[r13,#4] 0x00029c: e8bd8001 .... LDMIA r13!,{r0,pc} 0x0002a0: e24dd004 ..M. SUB r13,r13,#4 0x0002a4: e92d0001 ..-. STMDB r13!,{r0} 0x0002a8: e59f0364 d... LDR r0,0x614 0x0002ac: e5900000 .... LDR r0,[r0,#0] 0x0002b0: e58d0004 .... STR r0,[r13,#4]
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -