代码搜索:AD测试

找到约 10,000 项符合「AD测试」的源代码

代码结果 10,000
www.eeworm.com/read/440587/7687268

pwi ad1674.pwi

www.eeworm.com/read/440548/7687936

bsf ad_da.bsf

/* WARNING: Do NOT edit the input and output ports in this file in a text editor if you plan to continue editing the block that represents it in the Block Editor! File corruption is VERY likely to
www.eeworm.com/read/440548/7687948

v ad_da.v

// WARNING: Do NOT edit the input and output ports in this file in a text // editor if you plan to continue editing the block that represents it in // the Block Editor! File corruption is VERY likel
www.eeworm.com/read/440518/7688306

lnp ad0809.lnp

"STARTUP.obj", "AD0809.obj" TO "AD0809"
www.eeworm.com/read/440518/7688307

__i ad0809.__i

"AD0809.C" BROWSE DEBUG OBJECTEXTEND
www.eeworm.com/read/440518/7688308

plg ad0809.plg

礦ision3 Build Log Project: D:\My Documents\我的单片机实验\27.ADC0809AD转换器基本应用技术\Keil-C1\AD0809.uv2 Project File Date: 08/20/2007 Output: Build target
www.eeworm.com/read/440518/7688310

lst ad0809.lst

C51 COMPILER V8.02 AD0809 08/30/2007 14:37:15 PAGE 1 C51 COMPILER V8.02, COMPILATION OF MODULE AD0809 OBJECT MODULE PLACED IN
www.eeworm.com/read/440518/7688316

c ad0809.c

#include unsigned char code dispbitcode[]={0xfe,0xfd,0xfb,0xf7, 0xef,0xdf,0xbf,0x7f}; unsigned char code dispcode[]={0x3f,0x06,0x5b,0x4f,0x66, 0x6d,0x7d,
www.eeworm.com/read/440518/7688317

obj ad0809.obj

www.eeworm.com/read/440518/7688318

hex ad0809.hex

:03000000020916DC :0C091600787FE4F6D8FD75811402095DBD :10080000FEFDFBF7EFDFBF7F3F065B4F666D7D07A9 :100810007F6F0000000001000200000300040000E0 :10082000050006000007000800000900000A000B90 :10083000