代码搜索:Boot
找到约 10,000 项符合「Boot」的源代码
代码结果 10,000
www.eeworm.com/read/199546/7845817
paf boot.paf
www.eeworm.com/read/299355/7865583
asm boot.asm
.title "Flash bootup utility for 6713 dsk"
.option D,T
.length 102
.width 140
COPY_TABLE .equ 0x90000400
.sect ".boot_load"
.global
www.eeworm.com/read/399336/7868971
asm boot.asm
.title "Flash bootup utility for 6414 dsk"
; EMIF registers and values
EMIFA_GCR .equ 0x01800000 ;EMIFA global control.
EMIFA_CE0 .equ 0x01800008 ;EMIFA CE0 spa
www.eeworm.com/read/299141/7886168
asm boot.asm
; ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
; boot.asm
; ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
;
www.eeworm.com/read/398847/7915422
hex boot.hex
www.eeworm.com/read/398847/7915427
cmd boot.cmd
BOOT.out
-a
-memwidth 8
-image
-map BOOT.map
ROMS
{
FLASH: org = 0x90000000, len = 0x0040000,romwidth = 8, files = {BOOT.hex}
}
SECTIONS
{
.boot_load /* : PADDR = 0x9000000
www.eeworm.com/read/398847/7915434
out boot.out
www.eeworm.com/read/398847/7915479
c boot.c
/*******************************************************************************
*
* Borrowed from earlier work done by souls
* braver than mine....
*
* Originally, this was the Blink program e
www.eeworm.com/read/398847/7915494
cmd boot.cmd
BOOT.out
-a
-memwidth 8
-image
-map BOOT.map
ROMS
{
FLASH: org = 0x90000000, len = 0x0040000,romwidth = 8, files = {BOOT.hex}
}
SECTIONS
{
.boot_load /* : PADDR = 0x9000000
www.eeworm.com/read/398847/7915496