代码搜索:KeyScan
找到约 2,231 项符合「KeyScan」的源代码
代码结果 2,231
www.eeworm.com/read/282931/9052732
mp keyscan.mp
NOTE: AVR Code addresses are word addresses
All other addresses (including ones in FLASH) are byte addresses
Area Addr Size Decimal Bytes (Attributes)
----------
www.eeworm.com/read/282931/9052779
mak keyscan.mak
CC = iccavr
CFLAGS = -ID:\icc\include\ -e -D__ICC_VERSION="7.13A" -DATMega8 -l -A -A -Wf-O24 -g -Mavr_enhanced_small -Wa-W
ASFLAGS = $(CFLAGS) -Wa-g
LFLAGS = -LD:\icc\lib\ -g -e:0x2000 -Wl-W -
www.eeworm.com/read/282931/9052808
lst keyscan.lst
__start:
__text_start:
34 E5CF LDI R28,0x5F
35 E0D4 LDI R29,4
36 BFCD OUT 0x3D,R28
37 BFDE OUT 0x3E,R29
38 52C0 SUBI R28,0x20
39 40D
www.eeworm.com/read/282931/9052820
hex keyscan.hex
:0200000033C00B
:0200120025C205
:14002600D501D701D901DB01DD01DF01E101E301E501E70110
:14003A00E901EB01ED01EF01F101F301F501F701F901FB0134
:14004E00FD01FF01010203020502C0F9A4B0999282F88090CF
:050062
www.eeworm.com/read/282931/9052854
mak keyscan.mak
CC = iccavr
CFLAGS = -e -D__ICC_VERSION="7.13A" -DATMega8 -l -A -A -Wf-O24 -g -Mavr_enhanced_small -Wa-W
ASFLAGS = $(CFLAGS) -Wa-g
LFLAGS = -g -e:0x2000 -Wl-W -bfunc_lit:0x26.0x2000 -dram_end:
www.eeworm.com/read/282931/9052887
lst keyscan.lst
__start:
__text_start:
15 E5CF LDI R28,0x5F
16 E0D4 LDI R29,4
17 BFCD OUT 0x3D,R28
18 BFDE OUT 0x3E,R29
19 52C0 SUBI R28,0x20
1A 40D
www.eeworm.com/read/282931/9052893
hex keyscan.hex
:0200000014C02A
:02001200B0C07C
:1400260000000000CFE5D4E0CDBFDEBFC052D0400AEA088394
:14003A000024E4E6F0E010E0E436F10711F00192FBCF008311
:14004E00E6E2F0E0A0E6B0E010E000E00BBFEA32F10721F031
:140062
www.eeworm.com/read/282877/9055181
c keyscan.c
#include "CPU.H"
extern void Delayms(U16 Ms);
/*
*****************************************************************************
* KeyScan - 键盘扫描函数
* DESCRIPTION: -
* 判4个按键那个有按下
* @Param void:
www.eeworm.com/read/381702/9076726
c keyscan.c
#include "def.h"
#include "2410addr.h"
#include "2410lib.h"
#include "2410slib.h"
#include "mmu.h"
#include "uart.h"
#include "timer.h"
/******************************************************