4-8

Using the 162Bug Debugger
4
The above program was loaded at address $0001327C.The disassembled code is shown next:
162-Bug>MD 1327C;DI
0001327C 48E78080 MOVEM.L D0/A0,—(A7)
00013280 4280 CLR.L D0
00013282 1018 MOVE.B (A0)+,D0
00013284 5340 SUBQ.W #1,D0
00013286 12D8 MOVE.B (A0)+,(A1)+
00013288 51C8FFFC DBF D0,$13286
0001328C 4CDF0101 MOVEM.L (A7)+,D0/A0
00013290 4E75 RTS
162-Bug>
By using one of the offset registers, the disassembled code addresses can be made to match the listing file addresses as follows:
162-Bug>OF R0
R0 =00000000 00000000? 1327C. <CR>
162Bug>MD 0+R0;DI <CR>
00000+R0 48E78080 MOVEM.L D0/A0,—(A7)
00004+R0 4280 CLR.L D0
00006+R0 1018 MOVE.B (A0)+,D0
00008+R0 5340 SUBQ.W #1,D0
0000A+R0 12D8 MOVE.B (A0)+,(A1)+
0000C+R0 51C8FFFC DBF D0,$A+R0
00010+R0 4CDF0101 MOVEM.L (A7)+,D0/A0
00014+R0 4E75 RTS
162-Bug>
8 0 00000008 5340 SUBQ.W#1,D0
9 0 0000000A 12D8 LOOP MOVE.B(A0)+,(A1)+
10 0 0000000C 51C8FFFC MOVS DBRA D0,LOOP
11 0 00000010 4CDF0101 MOVEM.L(A7)+,D0/A0
12 0 00000014 4E75 RTS
13
14 END END
****** TOTAL ERRORS 0ÑÑ
****** TOTAL WARNINGS 0ÑÑ