⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 spearhead.code.svn-base

📁 Spearhead2000 的 USB驱动程序
💻 SVN-BASE
📖 第 1 页 / 共 5 页
字号:
        0x0005d8:    ebffff81    ....    BL       0x3e4        0x0005dc:    e3500000    ..P.    CMP      r0,#0        0x0005e0:    1a000000    ....    BNE      0x5e8        0x0005e4:    eafffff9    ....    B        0x5d0        0x0005e8:    eafffff6    ....    B        0x5c8        0x0005ec:    e3a0000d    ....    MOV      r0,#0xd        0x0005f0:    ebffff7b    {...    BL       0x3e4        0x0005f4:    e3500000    ..P.    CMP      r0,#0        0x0005f8:    1a000000    ....    BNE      0x600        0x0005fc:    eafffffa    ....    B        0x5ec        0x000600:    e28dd00c    ....    ADD      r13,r13,#0xc        0x000604:    e8bd80f0    ....    LDMIA    r13!,{r4-r7,pc}    x$litpool$2    $S16        0x000608:    64323025    %02d    LDRVST   r3,[r2],#-0x25        0x00060c:    3230253a    :%02    EORCCS   r2,r0,#0xe800000        0x000610:    30253a64    d:%0    EORCC    r3,r5,r4,ROR #20        0x000614:    00006432    2d..    ANDEQ    r6,r0,r2,LSR r4    x$litpool_e$2        EXPORT UART_print_ex    UART_print_ex        0x000618:    e92d4030    0@-.    STMDB    r13!,{r4,r5,r14}        0x00061c:    e24dd008    ..M.    SUB      r13,r13,#8        0x000620:    e1a04000    .@..    MOV      r4,r0        0x000624:    e1a02004    . ..    MOV      r2,r4        0x000628:    e1a0000d    ....    MOV      r0,r13        0x00062c:    e28f1f22    "...    ADD      r1,pc,#0x88 ; #0x6bc        0x000630:    eb000dac    ....    BL       0x3ce8        0x000634:    e3a00030    0...    MOV      r0,#0x30        0x000638:    ebffff69    i...    BL       0x3e4        0x00063c:    e3500000    ..P.    CMP      r0,#0        0x000640:    1a000000    ....    BNE      0x648        0x000644:    eafffffa    ....    B        0x634        0x000648:    e3a00078    x...    MOV      r0,#0x78        0x00064c:    ebffff64    d...    BL       0x3e4        0x000650:    e3500000    ..P.    CMP      r0,#0        0x000654:    1a000000    ....    BNE      0x65c        0x000658:    eafffffa    ....    B        0x648        0x00065c:    e3a05000    .P..    MOV      r5,#0        0x000660:    e3550008    ..U.    CMP      r5,#8        0x000664:    ba000002    ....    BLT      0x674        0x000668:    ea000007    ....    B        0x68c        0x00066c:    e2855001    .P..    ADD      r5,r5,#1        0x000670:    eafffffa    ....    B        0x660        0x000674:    e7dd0005    ....    LDRB     r0,[r13,r5]        0x000678:    ebffff59    Y...    BL       0x3e4        0x00067c:    e3500000    ..P.    CMP      r0,#0        0x000680:    1a000000    ....    BNE      0x688        0x000684:    eafffffa    ....    B        0x674        0x000688:    eafffff7    ....    B        0x66c        0x00068c:    e3a0000d    ....    MOV      r0,#0xd        0x000690:    ebffff53    S...    BL       0x3e4        0x000694:    e3500000    ..P.    CMP      r0,#0        0x000698:    1a000000    ....    BNE      0x6a0        0x00069c:    eafffffa    ....    B        0x68c        0x0006a0:    e3a0000a    ....    MOV      r0,#0xa        0x0006a4:    ebffff4e    N...    BL       0x3e4        0x0006a8:    e3500000    ..P.    CMP      r0,#0        0x0006ac:    1a000000    ....    BNE      0x6b4        0x0006b0:    eafffffa    ....    B        0x6a0        0x0006b4:    e28dd008    ....    ADD      r13,r13,#8        0x0006b8:    e8bd8030    0...    LDMIA    r13!,{r4,r5,pc}    $S8    x$litpool$3        0x0006bc:    58383025    %08X    LDMPLDA  r8!,{r0,r2,r5,r12,r13}        0x0006c0:    00000000    ....    ANDEQ    r0,r0,r0    x$litpool_e$3        EXPORT uart_test    uart_test        0x0006c4:    e92d4010    .@-.    STMDB    r13!,{r4,r14}        0x0006c8:    e24dd0dc    ..M.    SUB      r13,r13,#0xdc        0x0006cc:    e59f1210    ....    LDR      r1,0x8e4        0x0006d0:    e28d00b4    ....    ADD      r0,r13,#0xb4        0x0006d4:    e3a02028    ( ..    MOV      r2,#0x28        0x0006d8:    eb000d9e    ....    BL       0x3d58        0x0006dc:    e59f1204    ....    LDR      r1,0x8e8        0x0006e0:    e28d0090    ....    ADD      r0,r13,#0x90        0x0006e4:    e3a02024    $ ..    MOV      r2,#0x24        0x0006e8:    eb000d9a    ....    BL       0x3d58        0x0006ec:    e59f11f8    ....    LDR      r1,0x8ec        0x0006f0:    e28d007c    |...    ADD      r0,r13,#0x7c        0x0006f4:    e3a02014    . ..    MOV      r2,#0x14        0x0006f8:    eb000d96    ....    BL       0x3d58        0x0006fc:    e59f11ec    ....    LDR      r1,0x8f0        0x000700:    e28d0058    X...    ADD      r0,r13,#0x58        0x000704:    e3a02024    $ ..    MOV      r2,#0x24        0x000708:    eb000d92    ....    BL       0x3d58        0x00070c:    e59f11e0    ....    LDR      r1,0x8f4        0x000710:    e28d002c    ,...    ADD      r0,r13,#0x2c        0x000714:    e3a0202c    , ..    MOV      r2,#0x2c        0x000718:    eb000d8e    ....    BL       0x3d58        0x00071c:    e59f11d4    ....    LDR      r1,0x8f8        0x000720:    e1a0000d    ....    MOV      r0,r13        0x000724:    e3a0202c    , ..    MOV      r2,#0x2c        0x000728:    eb000d8a    ....    BL       0x3d58        0x00072c:    e3a00072    r...    MOV      r0,#0x72        0x000730:    e51f11e8    ....    LDR      r1,0x550        0x000734:    e5c10004    ....    STRB     r0,[r1,#4]        0x000738:    e51f01f0    ....    LDR      r0,0x550        0x00073c:    e5d00004    ....    LDRB     r0,[r0,#4]        0x000740:    e3500073    s.P.    CMP      r0,#0x73        0x000744:    0a000064    d...    BEQ      0x8dc        0x000748:    e28d00b4    ....    ADD      r0,r13,#0xb4        0x00074c:    e3a01025    %...    MOV      r1,#0x25        0x000750:    ebffff43    C...    BL       0x464        0x000754:    e59f01a0    ....    LDR      r0,0x8fc        0x000758:    ebffff10    ....    BL       0x3a0        0x00075c:    e3500000    ..P.    CMP      r0,#0        0x000760:    1a000000    ....    BNE      0x768        0x000764:    eafffffa    ....    B        0x754        0x000768:    e3a04000    .@..    MOV      r4,#0        0x00076c:    e3540010    ..T.    CMP      r4,#0x10        0x000770:    ba000002    ....    BLT      0x780        0x000774:    ea000004    ....    B        0x78c        0x000778:    e2844001    .@..    ADD      r4,r4,#1        0x00077c:    eafffffa    ....    B        0x76c        0x000780:    e1a00004    ....    MOV      r0,r4        0x000784:    ebffff72    r...    BL       0x554        0x000788:    eafffffa    ....    B        0x778        0x00078c:    e28d0090    ....    ADD      r0,r13,#0x90        0x000790:    e3a01023    #...    MOV      r1,#0x23        0x000794:    ebffff32    2...    BL       0x464        0x000798:    e59f015c    \...    LDR      r0,0x8fc        0x00079c:    ebfffeff    ....    BL       0x3a0        0x0007a0:    e3500000    ..P.    CMP      r0,#0        0x0007a4:    1a000000    ....    BNE      0x7ac        0x0007a8:    eafffffa    ....    B        0x798        0x0007ac:    e28d007c    |...    ADD      r0,r13,#0x7c        0x0007b0:    e3a01013    ....    MOV      r1,#0x13        0x0007b4:    ebffff2a    *...    BL       0x464        0x0007b8:    e28d0058    X...    ADD      r0,r13,#0x58        0x0007bc:    e3a01022    "...    MOV      r1,#0x22        0x0007c0:    ebffff27    '...    BL       0x464        0x0007c4:    e59f0130    0...    LDR      r0,0x8fc        0x0007c8:    ebfffef4    ....    BL       0x3a0        0x0007cc:    e3500000    ..P.    CMP      r0,#0        0x0007d0:    1a000000    ....    BNE      0x7d8        0x0007d4:    eafffffa    ....    B        0x7c4        0x0007d8:    e3a0200f    . ..    MOV      r2,#0xf        0x0007dc:    e3a01019    ....    MOV      r1,#0x19        0x0007e0:    e3a00010    ....    MOV      r0,#0x10        0x0007e4:    ebffff68    h...    BL       0x58c        0x0007e8:    e3a0000d    ....    MOV      r0,#0xd        0x0007ec:    ebfffefc    ....    BL       0x3e4        0x0007f0:    e3500000    ..P.    CMP      r0,#0        0x0007f4:    1a000000    ....    BNE      0x7fc        0x0007f8:    eafffffa    ....    B        0x7e8        0x0007fc:    e3a0000a    ....    MOV      r0,#0xa        0x000800:    ebfffef7    ....    BL       0x3e4        0x000804:    e3500000    ..P.    CMP      r0,#0        0x000808:    1a000000    ....    BNE      0x810        0x00080c:    eafffffa    ....    B        0x7fc        0x000810:    e28d002c    ,...    ADD      r0,r13,#0x2c        0x000814:    e3a01028    (...    MOV      r1,#0x28        0x000818:    ebffff11    ....    BL       0x464        0x00081c:    e59f00d8    ....    LDR      r0,0x8fc        0x000820:    ebfffede    ....    BL       0x3a0        0x000824:    e3500000    ..P.    CMP      r0,#0        0x000828:    1a000000    ....    BNE      0x830        0x00082c:    eafffffa    ....    B        0x81c        0x000830:    e3a0000a    ....    MOV      r0,#0xa        0x000834:    ebffff77    w...    BL       0x618        0x000838:    e1a0000d    ....    MOV      r0,r13        0x00083c:    e3a0102b    +...    MOV      r1,#0x2b        0x000840:    ebffff07    ....    BL       0x464        0x000844:    e59f00b0    ....    LDR      r0,0x8fc        0x000848:    ebfffed4    ....    BL       0x3a0        0x00084c:    e3500000    ..P.    CMP      r0,#0        0x000850:    1a000000    ....    BNE      0x858        0x000854:    eafffffa    ....    B        0x844        0x000858:    ebffff1b    ....    BL       0x4cc        0x00085c:    e350002b    +.P.    CMP      r0,#0x2b        0x000860:    0a000000    ....    BEQ      0x868        0x000864:    eafffffb    ....    B        0x858        0x000868:    e3a0000d    ....    MOV      r0,#0xd        0x00086c:    ebfffedc    ....    BL       0x3e4        0x000870:    e3500000    ..P.    CMP      r0,#0        0x000874:    1a000000    ....    BNE      0x87c        0x000878:    eafffffa    ....    B        0x868        0x00087c:    e3a0000a    ....    MOV      r0,#0xa        0x000880:    ebfffed7    ....    BL       0x3e4        0x000884:    e3500000    ..P.    CMP      r0,#0        0x000888:    1a000000    ....    BNE      0x890        0x00088c:    eafffffa    ....    B        0x87c        0x000890:    e3a01018    ....    MOV      r1,#0x18        0x000894:    e28f0f19    ....    ADD      r0,pc,#0x64 ; #0x900        0x000898:    ebfffef1    ....    BL       0x464        0x00089c:    e59f0078    x...    LDR      r0,0x91c        0x0008a0:    ebfffebe    ....    BL       0x3a0        0x0008a4:    e3500000    ..P.    CMP      r0,#0        0x0008a8:    1a000000    ....    BNE      0x8b0        0x0008ac:    eafffffa    ....    B        0x89c        0x0008b0:    e3a0000d    ....    MOV      r0,#0xd        0x0008b4:    ebfffeca    ....    BL       0x3e4        0x0008b8:    e3500000    ..P.    CMP      r0,#0        0x0008bc:    1a000000    ....    BNE      0x8c4        0x0008c0:    eafffffa    ....    B        0x8b0        0x0008c4:    e3a0000a    ....    MOV      r0,#0xa        0x0008c8:    ebfffec5    ....    BL       0x3e4        0x0008cc:    e3500000    ..P.    CMP      r0,#0        0x0008d0:    1a000000    ....    BNE      0x8d8        0x0008d4:    eafffffa    ....    B        0x8c4        0x0008d8:    eaffff96    ....    B        0x738        0x0008dc:    e28dd0dc    ....    ADD      r13,r13,#0xdc        0x0008e0:    e8bd8010    ....    LDMIA    r13!,{r4,pc}    x$litpool$4        0x0008e4:    00006988    .i..    ANDEQ    r6,r0,r8,LSL #19        0x0008e8:    000069b0    .i..    STREQH   r6,[r0],-r0        0x0008ec:    000069d4    .i..    ANDEQ    r6,r0,r4,ASR r9 ; ? Bad load/store extension op        0x0008f0:    000069e8    .i..    ANDEQ    r6,r0,r8,ROR #19        0x0008f4:    00006a0c    .j..    ANDEQ    r6,r0,r12,LSL #20        0x0008f8:    00006a38    8j..    ANDEQ    r6,r0,r8,LSR r10        0x0008fc:    00006afc    .j..    ANDEQ    r6,r0,r12,ROR r10 ; ? Bad load/store extension op    $S28        0x000900:    73657270    pres    MSRVC    SPSR_cs,#7 ; ? Rd = 0x7        0x000904:    20732073    s s     RSBCSS   r2,r3,r3,ROR r0        0x000908:    73206f74    to s    MSRVC    CPSR_,#0x1d0 ; ? field-mask = 0, Rd = 0x6        0x00090c:    20706f74    top     RSBCSS   r6,r0,r4,ROR pc        0x000910:    6f742072    r to    SWIVS    0x742072        0x000914:    6e757220     run    CDPVS    p2,0x7,c7,c5,c0,1        0x000918:    00000000    ....    ANDEQ    r0,r0,r0        0x00091c:    00006af8    .j..    ANDEQ    r6,r0,r8,ROR r10 ; ? Bad load/store extension op    x$litpool_e$4        EXPORT UART2_Init    UART2_Init        0x000920:    e3a01024    $...    MOV      r1,#0x24        0x000924:    e3a00a09    ....    MOV      r0,#0x9000        0x000928:    e2800412    ....    ADD      r0,r0,#0x12000000        0x00092c:    e1c010b0    ....    STRH     r1,[r0,#0]        0x000930:    e3a0100f    ....    MOV      r1,#0xf        0x000934:    e1c011bc    ....    STRH     r1,[r0,#0x1c]        0x000938:    e3a01064    d...    MOV      r1,#0x64        0x00093c:    e1c011b8    ....    STRH     r1,[r0,#0x18]        0x000940:    e3a0108b    ....    MOV      r1,#0x8b        0x000944:    e2811c05    ....    ADD      r1,r1,#0x500        0x000948:    e1c010bc    ....    STRH     r1,[r0,#0xc]        0x00094c:    e3a01000    ....    MOV      r1,#0        0x000950:    e1c012b0    ....    STRH     r1,[r0,#0x20]        0x000954:    e3a01000    ....    MOV      r1,#0        0x000958:    e1c012b4    ....    STRH     r1,[r0,#0x24]

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -