memmap: Color memory codes.
[ScratchABit.git] / example.def
blob8ff1f23ecbf3e370c8fabf5abd215ad7894f63dc
1 # Specify which CPU plugin to use. Plugins are just Python modules/packages,
2 # they are searched either on PYTHONPATH as usual or, additionally, in
3 # subdirectories "plugins" and "plugins/cpu" of the ScratchABit dir.
4 cpu x86_64_pymsasid
6 # Show up to this many raw bytes of code/data
7 show bytes 4
9 # This defines memory area at the given address of the given size
10 # and permissions (all of read/write/execute in this case)
11 area .bin 0x600000(0x1000) rwx
12 # Alternatively, end address (inclusive) can be specified:
13 #area .bin 0x600000-0x600fff rwx
15 # Load binary code to disassemble to the defined memory area
16 load example.bin 0x600000
18 # And/or load a structured executable (e.g. ELF) via a specific
19 # loader plugin ("elf" below).
20 #load example-elf elf
22 # Start disassembly from the addresses defined below (left-hand
23 # side defines label for that address). Multiple entrypoints allowed.
24 # Address first in list is what will be shown after load.
25 [entrypoints]
26 start = 0x600000
28 # Alternatively or additionally, entrypoints/symbol addresses may
29 # be loaded from a file. Format is the same as above (actually, even
30 # more relaxed, each line may have arbitrary prefix and suffix around
31 # "label = addr" part).
32 #load "ld-provides.ld"