Hi,

disasm $12b40
$012b40 : 6052                                 bra.s     $12b94
$012b42 : 7a4b                                 moveq     #$4b,d5
$012b44 : 6002                                 bra.s     $12b48
$012b46 : 7a41                                 moveq     #$41,d5
$012b48 : b3ca                                 cmpa.l    a2,a1
$012b4a : 6dfa                                 blt.s     $12b46
$012b4c : 4e75                                 rts
$012b4e : 6012                                 bra.s     $12b62

This is right after the string.

Yes, and it's very wrong.
(...)


No.
I can set a breakpoint at a address.


Good, set it at $12b40

HEXdump:

000005e0: 0003 5965 7300 ffff 2689 2649 4299 32d8  ..Yes...&.&IB.2.
000005f0: b3ca 6dfa 4e75 6012 0000 46fc 2700 4e70  ..m.Nu`...F.'.Np
00000600: 4cf8 0300 0000 2e48 4ed1 2f07 6622 41fa  L......HN./.f"A.
00000610: 053a 2010 671a 0cb0 514d 4f4e 0804 6708  .: .g...QMON..g.
00000620: d0a8 0004 d1c0 60ea 41f0 0808 70ff 4e90  ......`.A...p.N.
00000630: 2e1f 4eba 0306 1a3a fbda 0885 0000 6604  ..N....:......f.
00000640: 4eba 03fa 8c05 1a3c 001e ca06 0c05 0008  N......<........

32d8 b3ca 6dfa , the debugger reports 7a41 instead of 32d8


Now, this is the correct content, it corresponds to the SMSQ.PRG file.

What kind of machine or rather processor is this runnung on (could this be some kind of cache problem?).

If you set the breakpoint at $12b40, you will notice that this routine gets called quite a few times - it copies the individual modules..

You could check whether the code is still good each time it is called, so we could perhaps find out when the corruption occurs.

Wolfgang


_______________________________________________
QL-Users Mailing List
http://www.q-v-d.demon.co.uk/smsqe.htm

Reply via email to