home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Software Vault: The Gold Collection
/
Software Vault - The Gold Collection (American Databankers) (1993).ISO
/
cdr47
/
335_03.zip
/
ASZ80.MAN
< prev
next >
Wrap
Text File
|
1993-04-01
|
3KB
|
133 lines
Z80ASM(1L) UNIX 5.0 Z80ASM(1L)
NAME
as64180, asz80, as8085, as8080 - cross assemblers for
microcomputers
SYNOPSIS
as64180 [-p cpu] [-l listfile] [-o hexfile] [-d] [-s symbolfile] input
asz80 [-p cpu] [-l listfile] [-o hexfile] [-d] [-s symbolfile] input
as8085 [-p cpu] [-l listfile] [-o hexfile] [-d] [-s symbolfile] input
as8080 [-p cpu] [-l listfile] [-o hexfile] [-d] [-s symbolfile] input
DESCRIPTION
The as64180, asz80, as8085, as8080 command(s) assembles the
input file into a text output file representing the program
memory for a microcomputer.
Options
-p cpu
Override the instruction set selection.
Valid Values for Cpu
64180, z80, Z80, 8085, 8085
-l listfile
Output a file formated with the memory address, data,
and source input lines.
-o hexfile
Output the memory data image in a form accepted by most
prom programmers.
-h hexfile
Same as -o.
-d Save the intermediate data file (see FILE) and abort
the execution at the end of processing.
-s symbolfile
Print the symbol table values and names, one per line
in the specified file.
FILES
/usr/tmp/frtXXXXXX
SEE ALSO
Frankenstein Cross Assemblers Users Manual (file base.doc)
Appendix for asz80 Frankenstein Assembler (file asz80.doc)
NOTES
There is only one input file.
The program can select which subset of instructions is
accepted. The program first uses the name with which it is
Page 1 (printed 12/4/90)
Z80ASM(1L) UNIX 5.0 Z80ASM(1L)
invoked. This is scanned for a substring which indicates
which set to use. The -p options overrides this selction by
performing the same substring search. Finally the input
file can select which subset to use with the CPU statement.
There should only be one executable file with all of its
names linked to it.
Page 2 (printed 12/4/90)