[A83] Re: bcall hacking
[Prev][Next][Index][Thread]
[A83] Re: bcall hacking
well you gotta be really good at reverse engineering code for any of the new
romcalls. i uploaded the my compilation of romcalls to
http://www.detacheds.com/brandon/romcalls83.txt . Some of this was reverse
engineering, but mostly it was 2 and a half long days of copy and pasting
and comparing. I think its the largest out there for the 83+. If anyone
has any to add to it, please email me. there are still hundreds out there
that are unequated and undocumented.
Brandon Sterner
----- Original Message -----
From: "David Lindström" <okvin@tiscali.se>
To: <assembly-83@lists.ticalc.org>
Sent: Tuesday, May 07, 2002 1:07 PM
Subject: [A83] bcall hacking
>
> I wonder how you can figure out undocumented bcalls on a ti83+
> like BCALL 807E which returns the five first bytes of the calc ID into =
> op1.
>
> Do you use the Flash Debugger for this purpose?
>
> //David
> Cirrus Programming, http://cirrus.tigalaxy.com
>
>
>
Follow-Ups:
References: