Rizin
unix-like reverse engineering framework and cli tools
|
Go to the source code of this file.
Namespaces | |
objdump-m68k | |
Functions | |
def | objdump-m68k.dump_bytes (b, len) |
def | objdump-m68k.dump_op_reg (insn, op_reg) |
def | objdump-m68k.s8 (value) |
def | objdump-m68k.s16 (value) |
def | objdump-m68k.extsign8 (value) |
def | objdump-m68k.extsign1616 (value) |
def | objdump-m68k.extsign1632 (value) |
def | objdump-m68k.printRegbitsRange (buffer, data, prefix) |
def | objdump-m68k.registerBits (op) |
def | objdump-m68k.dump_op_ea (insn, op) |
def | objdump-m68k.debug (insn, op) |
def | objdump-m68k.dump_ops (insn) |
def | objdump-m68k.is_branch (insn) |
def | objdump-m68k.dump_mnemonic (insn) |
def | objdump-m68k.print_insn_detail_np (insn) |
def | objdump-m68k.print_objdump_dumpheader (filename='', address=0) |
def | objdump-m68k.test_class () |
Variables | |
string | objdump-m68k.TODO |
string | objdump-m68k.objdump_cmd_example = 'm68k-atari-mint-objdump -b binary -D -mm68k --adjust-vma 0x30664 u/m68k.bin' |
string | objdump-m68k.objdump_dumpheader_fmt |
string | objdump-m68k.M68000_CODE = b"\x04\x40\x00\x40" |
tuple | objdump-m68k.all_tests |
dictionary | objdump-m68k.map_address_mode_str |
dictionary | objdump-m68k.map_op_str |