G49 cancels G43 
Send the machine home at the end of the prog using:
G28G91Z0.0  Y0.0  X0.0
 You should not need to use G49
You must be doing something else wrong

Start of every one of my  progs look like this:

T1M6
G54G90G0XxxYxxS500M3
G43H1Z.1M8   moves the tool down to .1 above the workpiece
blah blah

ends look like this:

G28G91 Z0.0   send the Z home
G28G91Y0.0   send the y home to put in a new part
M30


----- Original Message -----
From: Eric H. Johnson <ejohn...@camalytics.com>
To: 'Enhanced Machine Controller (EMC)' <emc-users@lists.sourceforge.net>
Cc: 
Sent: Monday, May 21, 2012 2:51 PM
Subject: [Emc-users] Tool Offsets

Hi all,

Per the "Setting Coordinate Systems" thread, I converted from using
coordinate systems (G54-G59.3) and setting the offsets with G10 L2, to using
the offsets specified in the tool table. Mostly it worked without a problem.
The exception is when re-running a program without reloading it. The
beginning of the program will have two lines similar to the following:

T3 M6
G43 H3

If I just rerun, the tool offsets seem to be ignored, but if I do a reload
of the same program it runs fine.

Do I need to add a G43 H0 to the end of the program, is there another
explanation for why the offsets are ignored when rerunning?

Thanks,
Eric



------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Emc-users mailing list
Emc-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/emc-users


------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Emc-users mailing list
Emc-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/emc-users

Reply via email to