Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature Suggestion: Show Label Call Addresses #18

Open
phillipeaton opened this issue Nov 26, 2022 · 0 comments
Open

Feature Suggestion: Show Label Call Addresses #18

phillipeaton opened this issue Nov 26, 2022 · 0 comments

Comments

@phillipeaton
Copy link

The Infiltrator C64 Disassembler tool provides the call addresses e.g. ($2A64) as labeled code in it's output (though in this case, I'm showing the code for a VIC-20 program, seems to work fine)
image

Because I have worked out all the code/data addresses in my VIC-20 program, via some MS Excel manipulation
image

I was able to feed Infiltrator with my Data address exclusions to get a perfect set of labelled code call addresses, which I was then able to extract via some more Excel manipulation
image

and feed back into dasmfw via an info file
image

and thus merge them into my dasmfw output
image

This makes it very easy to work out where your most used utility functions are!
image

I can also disable these label/comments with a single ;
image

This actually only took a couple of hours to make work, but only because I have all my code/data worked out. It would be great if dasmfw had an option to do this automatically, like Infiltrator. Better still would be if it could include the most recently defined label for the calling address, I could do that with Excel but then it starts to get messy.

Thanks for considering it 🙂

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant