Dragon Memory Info in Python...

Hardware Hacking, Programming and Game Solutions/Cheats
Post Reply
jedie
Posts: 634
Joined: Wed Aug 14, 2013 12:23 pm
Location: germany
Contact:

Dragon Memory Info in Python...

Post by jedie »

I hacked a Python script to convert the data from [1] and [2] and make them useable in Python programms.

[1] http://dragon32.info/info/memmap.html - Dragon 32/64 Memory Map (with CoCo refs)
[2] http://dragon32.info/info/romref.html - Dragon 32/64 ROM Reference guide

The script is here: https://gist.github.com/jedie/6529046

I hope that Graham E. Kinns, the origin author of these information, will not get annoyed.

EDIT: Used for: viewtopic.php?f=5&t=4308&p=9163#p9163

Test code:

Code: Select all

def print_out(txt):
    print txt


if __name__ == "__main__":
    mem_info = DragonMemInfo(print_out)

    # 0xaf-0xaf - TRON/TROFF trace flag - non zero for TRON
    mem_info(0xaf)

    # 5x entries
    mem_info(0xbff0)

    # 0xf-0x18 - Temporary results
    mem_info(0xf)
    mem_info(0x10)
    mem_info(0x18)

    print "\n --- END --- \n"
Will output this:
0xaf:
* 0xaf-0xaf - TRON/TROFF trace flag - non zero for TRON
0xbff0:
* 0x8000-0xbfff - BASIC ROM in 32K mode
* 0xa000-0xbfff - CoCo - Color BASIC ROM
* 0xbff0-0xbfff - These addresses mapped from ROM to $fff0-$ffff by the SAM
* 0xbff0-0xbfff - 6809 interrupt vectors mapped to $fff0-$ffff by SAM
* 0xbff0-0xfff1 - Reserved ($0000)
0xf:
* 0xf-0x18 - Temporary results
0x10:
* 0xf-0x18 - Temporary results
0x18:
* 0xf-0x18 - Temporary results

--- END ---
... too many ideas and too little time ... Related stuff written in Python:
Dragon 32 emulator / PyDC - Python Dragon 32 converter: https://github.com/jedie/DragonPy
DWLOAD server / Dragon-Lib and other stuff: https://github.com/6809
Post Reply