Rizin
unix-like reverse engineering framework and cli tools
intel-syntax-encoding.s.cs
Go to the documentation of this file.
1 # CS_ARCH_X86, CS_MODE_64, None
2 0x66,0x83,0xf0,0x0c = xor ax, 12
3 0x83,0xf0,0x0c = xor eax, 12
4 0x48,0x83,0xf0,0x0c = xor rax, 12
5 0x66,0x83,0xc8,0x0c = or ax, 12
6 0x83,0xc8,0x0c = or eax, 12
7 0x48,0x83,0xc8,0x0c = or rax, 12
8 0x66,0x83,0xf8,0x0c = cmp ax, 12
9 0x83,0xf8,0x0c = cmp eax, 12
10 0x48,0x83,0xf8,0x0c = cmp rax, 12
11 0x48,0x89,0x44,0x24,0xf0 = mov QWORD PTR [RSP - 16], RAX
12 0x66,0x83,0xc0,0xf4 = add ax, -12
13 0x83,0xc0,0xf4 = add eax, -12
14 0x48,0x83,0xc0,0xf4 = add rax, -12
15 0x66,0x83,0xd0,0xf4 = adc ax, -12
16 0x83,0xd0,0xf4 = adc eax, -12
17 0x48,0x83,0xd0,0xf4 = adc rax, -12
18 0x66,0x83,0xd8,0xf4 = sbb ax, -12
19 0x83,0xd8,0xf4 = sbb eax, -12
20 0x48,0x83,0xd8,0xf4 = sbb rax, -12
21 0x66,0x83,0xf8,0xf4 = cmp ax, -12
22 0x83,0xf8,0xf4 = cmp eax, -12
23 0x48,0x83,0xf8,0xf4 = cmp rax, -12
24 0xf2,0x0f,0x10,0x2c,0x25,0xf8,0xff,0xff,0xff = movsd XMM5, QWORD PTR [-8]
25 0xd1,0xe7 = shl EDI, 1
26 0x0f,0xc2,0xd1,0x01 = cmpltps XMM2, XMM1
27 0xc3 = ret
28 0xcb = retf
29 0xc2,0x08,0x00 = ret 8
30 0xca,0x08,0x00 = retf 8
static RzILOpEffect * cmp(cs_insn *insn, bool is_thumb)
Definition: arm_il32.c:942
static RzILOpEffect * mov(cs_insn *insn, bool is_thumb)
Definition: arm_il32.c:351
QWORD XMM1
QWORD PTR[-8]
eax
Definition: x86-32-avx.s.cs:79
static int add(char *argv[])
Definition: ziptool.c:84