代码搜索:380
找到约 2,730 项符合「380」的源代码
代码结果 2,730
www.eeworm.com/read/449284/7511700
map a01328.map
base referer
rect $a00792.html 220,6 380,30
rect $a01247.html 200,54 400,78
www.eeworm.com/read/437857/7740695
txt dropdata.txt
// Die Map Spawn Map Spawn X Spawn Y Discription
1002 1002 430 380 //Die in TC
1004 1002 430 380
1005 1002 430 380
1006 1002 430 380
1007 1002 430 380
1008 1002 430 380
1009 1002 430 380
www.eeworm.com/read/437857/7740696
txt revivepoints.txt
// Die Map Spawn Map Spawn X Spawn Y Discription
1002 1002 430 380 //Die in TC
1004 1002 430 380
1005 1002 430 380
1006 1002 430 380
1007 1002 430 380
1008 1002 430 380
1009 1002 430 380
www.eeworm.com/read/435394/7792625
dat 100.dat
ID: 100 Time: 12-02-2008 10:22
Trial#: Response Key: Response Time
1 -1 0
2 -1 0
3 -1 0
4 2 380
5 -1 0
1 1 330
2 2 331
3 -1 0
4 2 380
5 1 -371
1 1 160
2 2 230
3 2 80
4 1 150
5 1 -371
www.eeworm.com/read/299454/7852416
m14 powrvolt.m14
***********************************************
*ELECTRONICS WORKBENCH MODEL FILE *
*MODELS GENERATED BY: S. MOORE *
*(c) 1996 INTERACTIVE IMAGE TECHNOLOGIES LTD. *
*TOR
www.eeworm.com/read/145341/12734807
cmd jack.cmd
echo starting boot sequence
jtag
halt
idcode
#
echo configuring the processor and memory interface (Off)
poke 30470010 00100000
poke 30470010 08000000
# cpu
poke 30440030 4
poke 30440018 a52383
poke 3
www.eeworm.com/read/145341/12734856
cmd flasher.cmd
echo starting boot sequence
jtag
halt
idcode
#
echo configuring the processor and memory interface (Off)
poke 30470010 00100000
poke 30470010 08000000
# cpu
poke 30440030 4
poke 30440018 a52383
poke 3
www.eeworm.com/read/246126/12754308
inc datpar.inc
20040506,
350,
0x57fa2,
0x18400,
0x71c02,
0x50081,
0x71804,
0xa7e95,
0xa7e12,
0x3800b,
0x15c39,
0x38023,
0x3801c,
0x50206,
0xa5c72,
0x50286,
0x1841e,
0x3800e,
0xa1dd4,
0xa2237,
0x1
www.eeworm.com/read/246126/12754695
inc dvdpar.inc
20050106,
273,
0x5008f,
0x18400,
0x71c02,
0x50081,
0x57fa2,
0x71804,
0xa5c74,
0x50286,
0x1841e,
0x38008,
0xa1dd4,
0xa2237,
0x10800,
0x38012,
0x50406,
0x75200,
0x1841f,
0x38010,
0xa
www.eeworm.com/read/246126/12755059
inc allpar.inc
20031106,
251,
0x18400,
0x71c02,
0x50081,
0x57fa2,
0x71804,
0xa7e92,
0x38008,
0x3800d,
0x50206,
0xa5c72,
0x50286,
0x1841e,
0x3800b,
0x30020,
0x30000,
0x5049b,
0x33fe3,
0x81021,
0x3