?? arm9debug.txt
字號:
================================================================================
Image Symbol Table
Mapping Symbols
Sym Value Execution Region
$a 0x30000000 ER_RO
$d 0x30000020 ER_RO
$f 0x30000020 ER_RO
$f 0x30000024 ER_RO
$f 0x30000028 ER_RO
$f 0x3000002c ER_RO
$f 0x30000030 ER_RO
$f 0x30000034 ER_RO
$f 0x30000038 ER_RO
$a 0x3000003c ER_RO
$d 0x3000012c ER_RO
$a 0x3000014c ER_RO
$d 0x300001e4 ER_RO
$a 0x300001f4 ER_RO
$d 0x30000234 ER_RO
$a 0x3000024c ER_RO
$d 0x300002d4 ER_RO
$a 0x300002f0 ER_RO
$d 0x3000035c ER_RO
$f 0x30000360 ER_RO
$f 0x30000368 ER_RO
$a 0x3000036c ER_RO
$d 0x30000700 ER_RO
$a 0x30000758 ER_RO
$d 0x30000b9c ER_RO
$a 0x30000ba8 ER_RO
$d 0x300014f0 ER_RO
$f 0x300014f8 ER_RO
$f 0x30001500 ER_RO
$f 0x30001504 ER_RO
$f 0x30001508 ER_RO
$f 0x3000150c ER_RO
$f 0x30001514 ER_RO
$f 0x30001518 ER_RO
$a 0x3000155c ER_RO
$d 0x300016f4 ER_RO
$a 0x300016f8 ER_RO
$p 0x30001718 ER_RO
$d 0x30001738 ER_RO
$a 0x30001744 ER_RO
$d 0x30002258 ER_RO
$a 0x30002288 ER_RO
$d 0x30002e60 ER_RO
$a 0x30002e70 ER_RO
$d 0x30003b58 ER_RO
$f 0x30003b9c ER_RO
$f 0x30003bac ER_RO
$a 0x30003bd4 ER_RO
$d 0x300044f4 ER_RO
$a 0x30004518 ER_RO
$d 0x30005410 ER_RO
$a 0x3000541c ER_RO
$d 0x30005d4c ER_RO
$a 0x30005d74 ER_RO
$d 0x30006424 ER_RO
$a 0x30006428 ER_RO
$d 0x30006474 ER_RO
$f 0x30006474 ER_RO
$a 0x30006478 ER_RO
$d 0x30006670 ER_RO
$a 0x30006674 ER_RO
$d 0x300066c4 ER_RO
$f 0x300066c4 ER_RO
$f 0x300066c8 ER_RO
$a 0x300066cc ER_RO
$p 0x3000670c ER_RO
$p 0x30006990 ER_RO
$p 0x300069ac ER_RO
$p 0x300069d8 ER_RO
$p 0x30006b00 ER_RO
$p 0x30006b38 ER_RO
$p 0x30006b74 ER_RO
$p 0x30006e6c ER_RO
$d 0x30006e88 ER_RO
$a 0x30006ed4 ER_RO
$p 0x300071fc ER_RO
$p 0x30007228 ER_RO
$p 0x3000727c ER_RO
$p 0x300072f4 ER_RO
$p 0x30007324 ER_RO
$p 0x3000734c ER_RO
$p 0x30007380 ER_RO
$p 0x300073b0 ER_RO
$p 0x300073e8 ER_RO
$a 0x30007404 ER_RO
$d 0x3000747c ER_RO
$a 0x30007484 ER_RO
$d 0x3000748c ER_RO
$a 0x30007490 ER_RO
$d 0x300078e4 ER_RO
$a 0x300078f4 ER_RO
$d 0x30007c3c ER_RO
$a 0x30007c54 ER_RO
$d 0x300080b4 ER_RO
$a 0x300080b8 ER_RO
$d 0x30008290 ER_RO
$a 0x30008294 ER_RO
$d 0x30008340 ER_RO
$f 0x30008340 ER_RO
$a 0x30008348 ER_RO
$p 0x30008398 ER_RO
$d 0x300083a4 ER_RO
$a 0x300083ac ER_RO
$d 0x30008578 ER_RO
$a 0x30008588 ER_RO
$d 0x300085bc ER_RO
$a 0x300085c4 ER_RO
$d 0x3000864c ER_RO
$a 0x30008650 ER_RO
$d 0x3000869c ER_RO
$a 0x300086a4 ER_RO
$d 0x30008788 ER_RO
$a 0x30008804 ER_RO
$d 0x30009030 ER_RO
$a 0x300090b4 ER_RO
$d 0x3000915c ER_RO
$a 0x300091bc ER_RO
$d 0x30009210 ER_RO
$f 0x30009228 ER_RO
$a 0x3000922c ER_RO
$d 0x3000924c ER_RO
$a 0x30009254 ER_RO
$d 0x300096e0 ER_RO
$a 0x300096f0 ER_RO
$d 0x30009c68 ER_RO
$a 0x30009cf8 ER_RO
$d 0x30009d98 ER_RO
$a 0x30009d9c ER_RO
$d 0x3000a0a8 ER_RO
$a 0x3000a0b4 ER_RO
$d 0x3000a424 ER_RO
$a 0x3000a448 ER_RO
$d 0x3000a494 ER_RO
$a 0x3000a498 ER_RO
$d 0x3000a52c ER_RO
$a 0x3000a534 ER_RO
$d 0x3000a67c ER_RO
$d 0x31000000 ER_RW
$d 0x31000004 ER_ZI
Local Symbols
Symbol Name Value Ov Type Size Object(Section)
E:\MyPro\2410UCOSII\APP_CODE\cpu_s\vectors.s 0x00000000 Number 0 vectors.o ABSOLUTE
<Anonymous Symbol> 0x00000000 Data 16 vectors.o(.debug_abbrev)
<Anonymous Symbol> 0x00000000 Data 120 vectors.o(.debug_info)
Vect 0x30000000 ARM Code 332 vectors.o(Vect)
<Anonymous Symbol> 0x00000000 Data 176 vectors.o(.debug_line)
BIT_EINT0 0x00000001 Number 0 vectors.o ABSOLUTE
BIT_EINT1 0x00000002 Number 0 vectors.o ABSOLUTE
?? 快捷鍵說明
復制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號
Ctrl + =
減小字號
Ctrl + -