Thread: CD32Load
View Single Post
Old 07 April 2020, 13:07   #1164
Registered User

Join Date: Dec 2013
Location: Auckland
Posts: 2,377
Originally Posted by jotd View Post
I could run it with

cd32load tintoyadventure.slave cdbuffer=0x150000
in the middle of the upper memory there's a big aligned memory block (filled with 0xcccccccc by whdload), I created a script to find the big chunks and found it.

NOBUFFERCHECK alone assumes cdbuffer at 0x1E0000 but there's data there, so it will probably fail. Setting CDBUFFER manually sets NOBUFFERCHECK automatically of course.

I suppose you're going to add "up = jump" or you want me to help?

Thanks, you're awesome

Wellll.. I could maybe do it, though I would prefer if you did if you'd prefer not to, I could try asking Codetapper for the slave source.
earok is offline  
Page generated in 0.04461 seconds with 11 queries