Hi,
disasm $12b40
$012b40 : 6052 bra.s $12b94
$012b42 : 7a4b moveq #$4b,d5
$012b44 : 6002 bra.s $12b48
$012b46 : 7a41 moveq #$41,d5
$012b48 : b3ca cmpa.l a2,a1
$012b4a : 6dfa blt.s $12b46
$012b4c : 4e75 rts
$012b4e : 6012 bra.s $12b62
This is right after the string.
Yes, and it's very wrong.
(...)
No.
I can set a breakpoint at a address.
Good, set it at $12b40
HEXdump:
000005e0: 0003 5965 7300 ffff 2689 2649 4299 32d8 ..Yes...&.&IB.2.
000005f0: b3ca 6dfa 4e75 6012 0000 46fc 2700 4e70 ..m.Nu`...F.'.Np
00000600: 4cf8 0300 0000 2e48 4ed1 2f07 6622 41fa L......HN./.f"A.
00000610: 053a 2010 671a 0cb0 514d 4f4e 0804 6708 .: .g...QMON..g.
00000620: d0a8 0004 d1c0 60ea 41f0 0808 70ff 4e90 ......`.A...p.N.
00000630: 2e1f 4eba 0306 1a3a fbda 0885 0000 6604 ..N....:......f.
00000640: 4eba 03fa 8c05 1a3c 001e ca06 0c05 0008 N......<........
32d8 b3ca 6dfa , the debugger reports 7a41 instead of 32d8
Now, this is the correct content, it corresponds to the SMSQ.PRG file.
What kind of machine or rather processor is this runnung on (could this
be some kind of cache problem?).
If you set the breakpoint at $12b40, you will notice that this routine
gets called quite a few times - it copies the individual modules..
You could check whether the code is still good each time it is called,
so we could perhaps find out when the corruption occurs.
Wolfgang
_______________________________________________
QL-Users Mailing List
http://www.q-v-d.demon.co.uk/smsqe.htm