Very cool! Lots of food for thought. There are different trade offs going on
Use ram hidey hole(s), or not as you mention Using short branch or long branch Protecting listability by avoiding bytes < 32 What registers to protect and which to assume come out damaged Cycles required for a reljmp/relbranch Code bytes consumed by branch code — John.
