📄 ds18b20.lst
字号:
00000775 0D 00 0A 00 .dw 0x0d,0x0a
0000809B .code
LM26:
0000809B C5 96 R3=[BP] // QImode move
0000809C 03 93 R1=R3 // QImode move
0000809D 0F 9F 9F 80 pc=L15 // Indirect jump
00000777 .debug
00000777 2E 00 73 00 .dw '.stabn 0x44,0,73,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
37 00 33 00
2C 00 00 00
00 00
0000078A 16 00 00 00 .dd LM27-_Read_DQ
0000078C 0D 00 0A 00 .dw 0x0d,0x0a
0000809F .code
LM27:
LBE2:
0000078E .debug
0000078E 2E 00 73 00 .dw '.stabn 0x44,0,73,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
37 00 33 00
2C 00 00 00
00 00
000007A1 16 00 00 00 .dd LM28-_Read_DQ
000007A3 0D 00 0A 00 .dw 0x0d,0x0a
0000809F .code
LM28:
L15:
0000809F 41 00 sp+=1
000080A0 88 98 pop bp from [sp]
000080A1 90 9A retf
.endp // end of Read_DQ
000007A5 .debug
000007A5 2E 00 73 00 .dw '.stabn 0xc0,0,0,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 63 00
30 00 2C 00
30 00 2C 00
30 00 2C 00
00 00 00 00
000007B7 06 00 00 00 .dd LBB2-_Read_DQ
000007B9 0D 00 0A 00 .dw 0x0d,0x0a
000080A2 .code
000007BB .debug
000007BB 2E 00 73 00 .dw '.stabs "uiTemp:4",128,0,0,0',0x0d,0x0a
74 00 61 00
62 00 73 00
20 00 22 00
75 00 69 00
54 00 65 00
6D 00 70 00
3A 00 34 00
22 00 2C 00
31 00 32 00
38 00 2C 00
30 00 2C 00
30 00 2C 00
30 00 0D 00
0A 00
000080A2 .CODE
000007D8 .debug
000007D8 2E 00 73 00 .dw '.stabn 0xe0,0,0,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 65 00
30 00 2C 00
30 00 2C 00
30 00 2C 00
00 00 00 00
000007EA 16 00 00 00 .dd LBE2-_Read_DQ
000007EC 0D 00 0A 00 .dw 0x0d,0x0a
000080A2 .code
000007EE .debug
000007EE 2E 00 73 00 .dw '.stabf ',0,0
74 00 61 00
62 00 66 00
20 00 00 00
00 00
000007F7 19 00 00 00 .dd LME4-_Read_DQ
000007F9 0D 00 0A 00 .dw 0x0d,0x0a
000080A2 .code
LME4:
000080A2 .code
000007FB .debug
000007FB 2E 00 73 00 .dw '.stabs "Read_18B20_Byte:F4",36,0,0,',0,0,offset _Read_18B20_Byte,seg _Read_18B20_Byte,0x0d,0x0a
74 00 61 00
62 00 73 00
20 00 22 00
52 00 65 00
61 00 64 00
5F 00 31 00
38 00 42 00
32 00 30 00
5F 00 42 00
79 00 74 00
65 00 3A 00
46 00 34 00
22 00 2C 00
33 00 36 00
2C 00 30 00
2C 00 30 00
2C 00 00 00
00 00 72 00
00 00 0D 00
0A 00
000080A2 .CODE
.public _Read_18B20_Byte
_Read_18B20_Byte: .proc
00000824 .debug
00000824 2E 00 73 00 .dw '.stabn 0x44,0,83,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
38 00 33 00
2C 00 00 00
00 00
00000837 00 00 00 00 .dd LM29-_Read_18B20_Byte
00000839 0D 00 0A 00 .dw 0x0d,0x0a
000080A2 .code
LM29:
// total=3, vars=3
// frame_pointer_needed: 1
000080A2 88 DA push bp to [sp]
000080A3 43 20 sp-=3
000080A4 08 0B 01 00 bp=sp+1
000080A6 0D 03 06 00 R1=BP+6
000080A8 02 D2 [bp+2]=R1 // QImode move
0000083B .debug
0000083B 2E 00 73 00 .dw '.stabn 0x44,0,84,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
38 00 34 00
2C 00 00 00
00 00
0000084E 07 00 00 00 .dd LM30-_Read_18B20_Byte
00000850 0D 00 0A 00 .dw 0x0d,0x0a
000080A9 .code
LM30:
LBB3:
00000852 .debug
00000852 2E 00 73 00 .dw '.stabn 0x44,0,86,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
38 00 36 00
2C 00 00 00
00 00
00000865 07 00 00 00 .dd LM31-_Read_18B20_Byte
00000867 0D 00 0A 00 .dw 0x0d,0x0a
000080A9 .code
LM31:
000080A9 05 93 R1=BP // QImode move
000080AA 0D 05 01 00 R2=BP+1
000080AC 40 92 R1=0 // QImode move
000080AD 02 97 R3=R2 // QImode move
000080AE C3 D2 [R3]=R1 // QImode move
00000869 .debug
00000869 2E 00 73 00 .dw '.stabn 0x44,0,87,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
38 00 37 00
2C 00 00 00
00 00
0000087C 0D 00 00 00 .dd LM32-_Read_18B20_Byte
0000087E 0D 00 0A 00 .dw 0x0d,0x0a
000080AF .code
LM32:
000080AF 40 92 R1=0 // QImode move
000080B0 C5 D2 [BP]=R1 // QImode move
L19:
000080B1 C5 92 R1=[BP] // QImode move
000080B2 47 42 CMP R1,7 // QImode compare
000080B3 04 AE 01 EE NSJNG L22 //QImode LE
00 EE
000080B6 0F 9F F9 80 pc=L20 // Indirect jump
L22:
00000880 .debug
00000880 2E 00 73 00 .dw '.stabn 0x44,0,89,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
38 00 39 00
2C 00 00 00
00 00
00000893 16 00 00 00 .dd LM33-_Read_18B20_Byte
00000895 0D 00 0A 00 .dw 0x0d,0x0a
000080B8 .code
LM33:
000080B8 41 92 R1=1 // QImode move
000080B9 C8 D2 [SP--]=R1 // QImode move
000080BA 40 F0 47 80 call _Set_DQ // call without return value
000080BC 41 00 SP = SP + 1 //SP
00000897 .debug
00000897 2E 00 73 00 .dw '.stabn 0x44,0,90,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
39 00 30 00
2C 00 00 00
00 00
000008AA 1B 00 00 00 .dd LM34-_Read_18B20_Byte
000008AC 0D 00 0A 00 .dw 0x0d,0x0a
000080BD .code
LM34:
000080BD 41 92 R1=1 // QImode move
000080BE C8 D2 [SP--]=R1 // QImode move
000080BF 40 F0 30 80 call _Delay // call without return value
000080C1 41 00 SP = SP + 1 //SP
000008AE .debug
000008AE 2E 00 73 00 .dw '.stabn 0x44,0,91,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
39 00 31 00
2C 00 00 00
00 00
000008C1 20 00 00 00 .dd LM35-_Read_18B20_Byte
000008C3 0D 00 0A 00 .dw 0x0d,0x0a
000080C2 .code
LM35:
000080C2 41 92 R1=1 // QImode move
000080C3 C8 D2 [SP--]=R1 // QImode move
000080C4 40 F0 68 80 call _Clr_DQ // call without return value
000080C6 41 00 SP = SP + 1 //SP
000008C5 .debug
000008C5 2E 00 73 00 .dw '.stabn 0x44,0,92,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
39 00 32 00
2C 00 00 00
00 00
000008D8 25 00 00 00 .dd LM36-_Read_18B20_Byte
000008DA 0D 00 0A 00 .dw 0x0d,0x0a
000080C7 .code
LM36:
000080C7 42 92 R1=2 // QImode move
000080C8 C8 D2 [SP--]=R1 // QImode move
000080C9 40 F0 30 80 call _Delay // call without return value
000080CB 41 00 SP = SP + 1 //SP
000008DC .debug
000008DC 2E 00 73 00 .dw '.stabn 0x44,0,93,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
39 00 33 00
2C 00 00 00
00 00
000008EF 2A 00 00 00 .dd LM37-_Read_18B20_Byte
000008F1 0D 00 0A 00 .dw 0x0d,0x0a
000080CC .code
LM37:
000080CC 40 92 R1=0 // QImode move
000080CD C8 D2 [SP--]=R1 // QImode move
000080CE 40 F0 47 80 call _Set_DQ // call without return value
000080D0 41 00 SP = SP + 1 //SP
000008F3 .debug
000008F3 2E 00 73 00 .dw '.stabn 0x44,0,94,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
39 00 34 00
2C 00 00 00
00 00
00000906 2F 00 00 00 .dd LM38-_Read_18B20_Byte
00000908 0D 00 0A 00 .dw 0x0d,0x0a
000080D1 .code
LM38:
000080D1 05 95 R2=BP // QImode move
000080D2 0D 03 01 00 R1=BP+1
000080D4 05 95 R2=BP // QImode move
000080D5 0D 07 01 00 R3=BP+1
000080D7 03 99 R4=R3 // QImode move
000080D8 C4 94 R2=[R4] // QImode move
000080D9 62 97 R3=R2 lsr 1
000080DA 01 95 R2=R1 // QImode move
000080DB C2 D6 [R2]=R3 // QImode move
0000090A .debug
0000090A 2E 00 73 00 .dw '.stabn 0x44,0,95,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
39 00 35 00
2C 00 00 00
00 00
0000091D 3A 00 00 00 .dd LM39-_Read_18B20_Byte
0000091F 0D 00 0A 00 .dw 0x0d,0x0a
000080DC .code
LM39:
000080DC 40 F0 89 80 call _Read_DQ // call with return value
000080DE 40 42 CMP R1,0 // QImode test
000080DF 0E 5E 01 EE NSJZ L23 //QImode EQ
00 EE
00000921 .debug
00000921 2E 00 73 00 .dw '.stabn 0x44,0,96,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
39 00 36 00
2C 00 00 00
00 00
00000934 40 00 00 00 .dd LM40-_Read_18B20_Byte
00000936 0D 00 0A 00 .dw 0x0d,0x0a
000080E2 .code
LM40:
000080E2 05 95 R2=BP // QImode move
000080E3 0D 03 01 00 R1=BP+1
000080E5 05 95 R2=BP // QImode move
000080E6 0D 07 01 00 R3=BP+1
000080E8 03 99 R4=R3 // QImode move
000080E9 C4 98 R4=[R4] // QImode move
000080EA 0C A5 80 00 R2=R4|128
000080EC 01 99 R4=R1 // QImode move
000080ED C4 D4 [R4]=R2 // QImode move
L23:
00000938 .debug
00000938 2E 00 73 00 .dw '.stabn 0x44,0,97,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
39 00 37 00
2C 00 00 00
00 00
0000094B 4C 00 00 00 .dd LM41-_Read_18B20_Byte
0000094D 0D 00 0A 00 .dw 0x0d,0x0a
000080EE .code
LM41:
000080EE 5F 92 R1=31 // QImode move
000080EF C8 D2 [SP--]=R1 // QImode move
000080F0 40 F0 30 80 call _Delay // call without return value
000080F2 41 00 SP = SP + 1 //SP
0000094F .debug
0000094F 2E 00 73 00 .dw '.stabn 0x44,0,87,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
78 00 34 00
34 00 2C 00
30 00 2C 00
38 00 37 00
2C 00 00 00
00 00
00000962 51 00 00 00 .dd LM42-_Read_18B20_Byte
00000964 0D 00 0A 00 .dw 0x0d,0x0a
000080F3 .code
LM42:
L21:
000080F3 C5 92 R1=[BP] // QImode move
000080F4 09 05 01 00 R2=R1+1
000080F6 C5 D4 [BP]=R2 // QImode move
000080F7 0F 9F B1 80 pc=L19 // Indirect jump
L20:
00000966 .debug
00000966 2E 00 73 00 .dw '.stabn 0x44,0,99,',0,0
74 00 61 00
62 00 6E 00
20 00 30 00
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -