📄 arm9debug.txt
字号:
================================================================================
Image Symbol Table
Mapping Symbols
Sym Value Execution Region
$a 0x30000000 ER_RO
$d 0x30000020 ER_RO
$f 0x30000020 ER_RO
$f 0x30000024 ER_RO
$f 0x30000028 ER_RO
$f 0x3000002c ER_RO
$f 0x30000030 ER_RO
$f 0x30000034 ER_RO
$f 0x30000038 ER_RO
$a 0x3000003c ER_RO
$d 0x300000e4 ER_RO
$a 0x300000fc ER_RO
$d 0x30000154 ER_RO
$a 0x3000015c ER_RO
$d 0x300001f4 ER_RO
$a 0x30000204 ER_RO
$d 0x30000254 ER_RO
$a 0x30000258 ER_RO
$p 0x300002b0 ER_RO
$d 0x300002bc ER_RO
$a 0x30000304 ER_RO
$d 0x30000698 ER_RO
$a 0x300006f0 ER_RO
$d 0x30000b38 ER_RO
$a 0x30000b44 ER_RO
$d 0x30001494 ER_RO
$f 0x3000149c ER_RO
$f 0x300014a4 ER_RO
$f 0x300014a8 ER_RO
$f 0x300014ac ER_RO
$f 0x300014b0 ER_RO
$f 0x300014b4 ER_RO
$f 0x300014b8 ER_RO
$a 0x300014fc ER_RO
$d 0x30001768 ER_RO
$a 0x30001788 ER_RO
$p 0x300017a8 ER_RO
$d 0x300017c8 ER_RO
$a 0x300017d4 ER_RO
$d 0x300017ec ER_RO
$a 0x300017f8 ER_RO
$d 0x30001844 ER_RO
$f 0x30001844 ER_RO
$a 0x30001848 ER_RO
$d 0x30001a40 ER_RO
$a 0x30001a44 ER_RO
$d 0x30001a94 ER_RO
$f 0x30001a94 ER_RO
$f 0x30001a98 ER_RO
$a 0x30001a9c ER_RO
$p 0x30001adc ER_RO
$p 0x30001d60 ER_RO
$p 0x30001d7c ER_RO
$p 0x30001da8 ER_RO
$p 0x30001ed0 ER_RO
$p 0x30001f08 ER_RO
$p 0x30001f44 ER_RO
$p 0x3000223c ER_RO
$d 0x30002258 ER_RO
$a 0x300022a4 ER_RO
$p 0x300025cc ER_RO
$p 0x300025f8 ER_RO
$p 0x3000264c ER_RO
$p 0x300026c4 ER_RO
$p 0x300026f4 ER_RO
$p 0x3000271c ER_RO
$p 0x30002750 ER_RO
$p 0x30002780 ER_RO
$p 0x300027b8 ER_RO
$a 0x300027d4 ER_RO
$d 0x3000284c ER_RO
$a 0x30002854 ER_RO
$d 0x3000285c ER_RO
$a 0x30002860 ER_RO
$d 0x30002cb4 ER_RO
$a 0x30002cc4 ER_RO
$d 0x3000300c ER_RO
$a 0x30003024 ER_RO
$d 0x30003484 ER_RO
$a 0x30003488 ER_RO
$d 0x30003660 ER_RO
$a 0x30003664 ER_RO
$d 0x30003710 ER_RO
$f 0x30003710 ER_RO
$a 0x30003718 ER_RO
$p 0x30003768 ER_RO
$d 0x30003774 ER_RO
$a 0x3000377c ER_RO
$d 0x30003948 ER_RO
$a 0x30003958 ER_RO
$d 0x3000398c ER_RO
$a 0x30003994 ER_RO
$d 0x30003a1c ER_RO
$a 0x30003a20 ER_RO
$d 0x30003a6c ER_RO
$a 0x30003a74 ER_RO
$d 0x30003b58 ER_RO
$a 0x30003bd4 ER_RO
$d 0x30004584 ER_RO
$a 0x30004608 ER_RO
$d 0x300046bc ER_RO
$f 0x300046e8 ER_RO
$a 0x30004724 ER_RO
$d 0x3000476c ER_RO
$a 0x30004780 ER_RO
$d 0x300047a0 ER_RO
$a 0x300047a8 ER_RO
$d 0x30004c34 ER_RO
$a 0x30004c44 ER_RO
$d 0x300051bc ER_RO
$a 0x3000524c ER_RO
$d 0x300052ec ER_RO
$a 0x300052f0 ER_RO
$d 0x300055fc ER_RO
$a 0x30005608 ER_RO
$d 0x30005978 ER_RO
$a 0x3000599c ER_RO
$d 0x300059e8 ER_RO
$a 0x300059ec ER_RO
$d 0x30005a80 ER_RO
$a 0x30005a88 ER_RO
$d 0x30005b2c ER_RO
$d 0x30f00000 ER_RW
$d 0x30f00004 ER_ZI
Local Symbols
Symbol Name Value Ov Type Size Object(Section)
D:\Study\2410bootload\APP_CODE\cpu_s\vectors.s 0x00000000 Number 0 vectors.o ABSOLUTE
<Anonymous Symbol> 0x00000000 Data 124 vectors.o(.debug_info)
<Anonymous Symbol> 0x00000000 Data 16 vectors.o(.debug_abbrev)
Vect 0x30000000 ARM Code 348 vectors.o(Vect)
<Anonymous Symbol> 0x00000000 Data 188 vectors.o(.debug_line)
BIT_EINT0 0x00000001 Number 0 vectors.o ABSOLUTE
BIT_EINT1 0x00000002 Number 0 vectors.o ABSOLUTE
M_SDIV 0x00000002 Number 0 vectors.o ABSOLUTE
BIT_EINT2 0x00000004 Number 0 vectors.o ABSOLUTE
M_PDIV 0x00000004 Number 0 vectors.o ABSOLUTE
BIT_EINT3 0x00000008 Number 0 vectors.o ABSOLUTE
BIT_EINT4_7 0x00000010 Number 0 vectors.o ABSOLUTE
IRQMODE 0x00000012 Number 0 vectors.o ABSOLUTE
SVCMODE 0x00000013 Number 0 vectors.o ABSOLUTE
BIT_EINT8_23 0x00000020 Number 0 vectors.o ABSOLUTE
BIT_NOTUSED6 0x00000040 Number 0 vectors.o ABSOLUTE
M_MDIV 0x0000005c Number 0 vectors.o ABSOLUTE
BIT_BAT_FLT 0x00000080 Number 0 vectors.o ABSOLUTE
NOINT 0x000000c0 Number 0 vectors.o ABSOLUTE
BIT_TICK 0x00000100 Number 0 vectors.o ABSOLUTE
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -