comparison sf2_vram_map.txt @ 6:b231162c8fdd

Add some logic analyzer captures, a Python script for analyzing said captures and a higher level analysis of the output
author Mike Pavone <pavone@retrodev.com>
date Tue, 06 Nov 2012 01:57:36 -0800
parents
children
comparison
equal deleted inserted replaced
4:6f6a2d7cc889 6:b231162c8fdd
1 0000: single color blocks
2 0200: Random symbols????
3 0400-0C00: Font
4 0C00-0E??: Score font
5 0E??: Player name displays
6
7 2000-3000: floor (mostly, some garbage around 2800 and 2A00)
8 3000-6C00: background
9 6C00-8000: not graphics
10 8000-~8A00: bat/bird sprites, special attack text
11 8A00-9000: ?????
12 9000-9200: More special attack text
13 9200-9600: another font
14 9800-AA00: special attack effects?
15 AC00-B000: ????
16 B000-B500: character sprite
17 ????
18 C000-C500: chracter sprite
19 D000-DA00: window name table
20 DA00-DC00: Sprite attribute table
21 DC00-E000: horizontal scroll data
22 E000-????: plane A&B name table
23 C500-FFFF: not graphics
24
25 VDP Registers:
26 Mode
27 00 - 14
28 01 - 64
29 Scroll A Name Table Address: E000
30 02 - 38
31 Window Name Table Address: D000
32 03 - 34
33 Scroll B Name Table Address: E000
34 04 - 07
35 Sprite Attribute Table Address: DA00
36 05 - 6D
37 06 - 00
38 Backdrop color - 0
39 07 - 00
40 08 - 00
41 09 - 00
42 HINT Counter
43 0A - AF
44 Mode - Full screen vertical scroll, line horizontal scroll, external ints disabled, 32 cell display, no interlacing
45 0B - 03
46 0C - 00
47 H Scroll Data Address: DC00
48 0D - 37
49 0E - 00
50 Auto increment
51 0F - 02
52 Scroll Size
53 10 - 11
54 Window H Pos
55 11 - 00
56 Window V Pos
57 12 - 05
58 DMA transfer length
59 13 - 00
60 14 - 00
61 DMA source address and mode
62 15 - DB
63 16 - CF
64 17 - 7F