代码搜索:Boot

找到约 10,000 项符合「Boot」的源代码

代码结果 10,000
www.eeworm.com/read/199546/7845817

paf boot.paf

www.eeworm.com/read/299355/7865583

asm boot.asm

.title "Flash bootup utility for 6713 dsk" .option D,T .length 102 .width 140 COPY_TABLE .equ 0x90000400 .sect ".boot_load" .global
www.eeworm.com/read/399336/7868971

asm boot.asm

.title "Flash bootup utility for 6414 dsk" ; EMIF registers and values EMIFA_GCR .equ 0x01800000 ;EMIFA global control. EMIFA_CE0 .equ 0x01800008 ;EMIFA CE0 spa
www.eeworm.com/read/299141/7886168

asm boot.asm

; ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ; boot.asm ; ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ;
www.eeworm.com/read/398847/7915422

hex boot.hex

www.eeworm.com/read/398847/7915427

cmd boot.cmd

BOOT.out -a -memwidth 8 -image -map BOOT.map ROMS { FLASH: org = 0x90000000, len = 0x0040000,romwidth = 8, files = {BOOT.hex} } SECTIONS { .boot_load /* : PADDR = 0x9000000
www.eeworm.com/read/398847/7915434

out boot.out

www.eeworm.com/read/398847/7915479

c boot.c

/******************************************************************************* * * Borrowed from earlier work done by souls * braver than mine.... * * Originally, this was the Blink program e
www.eeworm.com/read/398847/7915494

cmd boot.cmd

BOOT.out -a -memwidth 8 -image -map BOOT.map ROMS { FLASH: org = 0x90000000, len = 0x0040000,romwidth = 8, files = {BOOT.hex} } SECTIONS { .boot_load /* : PADDR = 0x9000000
www.eeworm.com/read/398847/7915496

out boot.out