Author: | Nate (guest: search) | |
Date: | Sun, Sep 05th, 2010 @ 14:06 ( . ) |
So many questions. :) I use cc65 and VICE, including its built-in monitor. It can disassemble and set breakpoints in drive RAM, and is thus very powerful for understanding protections. I usually set a read watchpoint on $255 or write wp on the command buffer at $200. That way you can see where the protection is loading data. I like Hexplorer as a hex editor. I don't use any more advanced tools to look at disks. I'm so used to the track format that editing the GCR in hex is easiest. ICU64 looks awesome but I haven't had time to try it out. Disassemblers just walk through memory linearly. It's up to you to tell it the range of data and instructions. |
9/12/2010 @ 13:45----Kevin 4/04/2011 @ 16:05--------Nate 4/04/2011 @ 21:08------------Lord Crass 4/07/2011 @ 06:22----------------hyper active 4/10/2011 @ 13:34--------------------Nate 4/13/2011 @ 11:00----------------------Lord Crass 6/20/2011 @ 13:35------------hyper active 6/21/2011 @ 09:37----------------Pete Rittwage 7/14/2011 @ 19:22------------Pete Rittwage 9/01/2011 @ 18:45------------------hyper active --- 0 Users Online --- 0 Recent Unique Posters |