0 Members and 2 Guests are viewing this topic.
xor a REP_NEXT call unlockflash REP_NEXT call rVersionEnd ld a, $10unlockFlash: di push af in a, (06) push af REP_NEXT ld hl, returnPointz+$8138-$80FE ld de, $8138 ld a, d out (05), a dec a ld i, a dec a out (06), a in a, (02) and e jr z, $+4 ld e, $02 ld b, d ld c, e lddr ex de, hl add hl, sp ex de, hl ld sp, $82A9+$4000 jp nz, $4529 call $4276returnPointz: ex de, hl ld sp, hl out (05), a pop af out (06), a pop af out ($25), a bcall(_flashWriteDisable) retrVersionEnd:
On another note, has anyone actually used this with success?
Oh, right, I know why that is. You were probably using bootfree which doesn't contain the same flash unlock exploits as the TI boot code. I don't think I can really make it work with boot free (unless it has it's own specialized unlock routine)
Just put Fcdf() or Fcdf()r very early in your program to use them. Preferably, don't force quit after you use it.
:.IKARUGAX:#Axiom(FULLRENE):Fcdf():Return