搜索资源列表
AIC1630A
- datasheetEM78 系列单片机共有的 47 条(EM78P447和451、458有48条) 指令,其寬度为 13 位。每一个指令码可分割成两部份,第一部分为标示指令功能的运算码( OPCODE ),第二部份則指出运算時所需之參数,亦即运算码( OPERAND )。而指令的类型大致可分为下列四种: -datasheetEM78 Series MCU total of 47 (45 and EM78P447 the 1,458 is 48) directive, the
Opcode
- 用visual C++实现的一个碰撞检测库,采用AABB包围盒实现-using visual C + + realization of a collision detection basement, surrounded by boxes used to achieve AABB
OpcodeDemo
- 使用opcode库的一个碰撞检测实例,和其它碰撞检测库如rapid 等一些的对比实例-use of the opcode of a collision detection example, and other collision detection for rapid as some other examples of the contrast
OpCodeSize
- 一个获取opcode的h文件,可以方便的获取指令长度,方便反汇编用-an opcode access to the h file, you can obtain instructions convenient length, used to facilitate anti-Series
arp
- ARP编程,发送ARP,// ARP Frame typedef struct tagARPFrame { unsigned short HW_Type /* hardware address */ unsigned short Prot_Type /* protocol address */ unsigned char HW_Addr_Len /* length of hardware address */ unsigned char Prot_Addr_Le
opcode
- 详细介绍光电编码器原理,对想了解光电编码器的人是一份不错的资料
Opcode
- 这是一个AABB碰撞检测库,实现了多种模型之间的碰撞检测
OpCode
- 看雪软件安全http:www.pediy.com 上 翻译的opcode结构的文章 对学习反编译很有用处
Hacker Disassembler Engine
- Please excuse my english... It's so bad :) Hacker Disassembler Engine, or HDE, is small disassembler engine, which intend to code analyse. HDE get length of command, prefixes, ModR/M and SIB bytes, opcode, immediate, displacement, relative address
Opcode.rar
- 经典的Opcode碰撞检测算法的源程序。使用于大型场景。,Opcode classic collision detection algorithm of the source. Used in large-scale scenes.
W32asm_wuji
- 反汇编利器:W32asm无极版 C32asm 是一款非常不错的国产静态反编译工具! C32Asm现具有如下功能: 快速静态反编译PE格式文件(Exe、Dll等) 提供Hex文件编辑功能,功能强大 提供内存Dump、内存编辑、PE文件Dump、PE内存ImageSize修正等多种实用功能 提供内存反汇编功能,提供汇编语句直接修改功能,免去OPCode的直接操作的繁琐 提供反编译语句彩色语法功能,方便阅读分析,能方便自定义语法色彩 提供输入表、输出表、参
OgreOpCode
- Ogre OpCode:利用OPCODE库,在OGRE中做精确的碰撞检测(opcode即物理引擎ode使用的库)-Ogre OpCode: use OpCode library at Ogre in to do precise collision detection (opcode that ode physics engine used in the Treasury)
ScenesDemo
- OGRE开发的带碰撞检测的场景例子.ScenesDemo带特殊效果.-OGRE development scene with examples of collision detection. ScenesDemo with special effects.
hbzl
- 在 ARM 汇编语言程序里,有一些特殊指令助记符,这些助记符与指令系统的助记符不同,没有相对应的操作码,通常称这些特殊指令助记符为伪指令,他们所完成的操作称为伪操作。伪指令在源程序中的作用是为完成汇编程序作各种准备工作的,这些伪指令仅在汇编过程中起作用,一旦汇编结束,伪指令的使命就完成。 -In ARM assembly language program, there are some special instruction mnemonic, the mnemonic with the
ogreopcode
- opcode是功能强大,跨平台的物理引擎,ogreopcode则是针对Ogre图像引擎封装的opcode物理库。-opcode is a powerful, cross-platform physics engine, ogreopcode is for Ogre graphics engine package opcode physical library.
hde_disassembly
- hde32 is a small disassembler engine, intended for analysis of x86-32 code. It gets length of command, prefixes, ModR/M, SIB, opcode, etc. For example, you can use hde32 when writing unpackers of executables, viruses, because most other disassemblers
OPCODE-1.2.1.tar
- 可支持Mesh-Mesh,sphere-mesh,ray-mesh,AABB-mesh,OBB-mesh,Planes-mesh对象的接触碰撞检测库-a collision dectection library,which support Mesh-Mesh,sphere-mesh, ray-mesh,AABB-mesh,OBB-mesh,Planes-mesh objects collision dectection
opcode
- This a VERY crude opcode decoder. We only need to find the size of the load store that caused our PF and this should work for all the opcodes that we care about. Moreover, the ones who invented this instruction set should be shot. -This is a VERY c
opcode
- This a VERY crude opcode decoder. We only need to find the size of the load store that caused our PF and this should work for all the opcodes that we care about. Moreover, the ones who invented this instruction set should be shot. -This is a VERY c
symbol table_litle & opcode table.tar
- system programming, symbol table, little table and opcode table