shithub: pokered

Download patch

ref: f8c18f689d0123ac1cb9949c5b5b45bc931729fc
parent: 8d8258f5e6215f5d818ca81f838b33f3de822a89
author: Bryan Bishop <kanzure@gmail.com>
date: Sat Jan 21 12:49:08 EST 2012

use labels in more commands in gbz80disasm

hg-commit-id: b49550d941d7


--- a/extras/gbz80disasm.py
+++ b/extras/gbz80disasm.py
@@ -546,7 +546,7 @@
 0xc9, #ret
 ###0xda, 0xe9, 0xd2, 0xc2, 0xca, 0xc3, 0x38, 0x30, 0x20, 0x28, 0x18, 0xd8, 0xd0, 0xc0, 0xc8, 0xc9
 ]
-relative_jumps = [0x38, 0x30, 0x20, 0x28, 0x18, 0xc3, 0xda]
+relative_jumps = [0x38, 0x30, 0x20, 0x28, 0x18, 0xc3, 0xda, 0xc2] 
 relative_unconditional_jumps = [0xc3, 0x18]
 
 #TODO: replace call and a pointer with call and a label
@@ -724,7 +724,7 @@
                     number += byte2 << 8;
 
                     insertion = "$%.4x" % (number)
-                    if maybe_byte in call_commands:
+                    if maybe_byte in call_commands or current_byte in relative_unconditional_jumps or current_byte in relative_jumps:
                         if insertion[1:] in asm_commands:
                             insertion = asm_commands[insertion[1:]]