I finished running the 128 odd numbers. No surprises. this produced every combination of counters for the bits turned off, except bit zero. This ran every possible cycle for odd numbers. The output produced every possible number from 0 to 255. Although I used randomly generated even numbers, it looks fairly certain that there is no hidden command there. On entering a different second odd number: it looks as though it changes the counting sequence for the bits where the second number is high. It also depends on where in the counting sequence the chip is. I start with one and then increase the number. If I run 6 cycles and then enter a three, I get bit one high all the time. If I run fewer cycles and enter three I get a cycle with bit one low for several cycles and then high for one cycle. I get a similar sequence for entering 5 as the cecond number, but with bit two affected. On Mon, 21 May 2012, William Levak wrote: > > > I assume you are refering to the fact that the pattern changes when you > change the number. I haven't determined exactly how to calculate the change, > but it does not start over from the beginning, and it does not reset the > counters. > > I have so far tested all the odd numbers through 109. Several of those have > had only two bits changing. Also some sequences repeat after only twelve > numbers. > > > On Thu, 17 May 2012, Rob Clarke wrote: > >> What would really help me is wo things: >> >> Write a sequence of odd values with two bits set, like you did before only >> this time switch the bit off for one write half way through a sequence of >> 1's and again half way through a sequence of 0's. >> >> eg >> 00000011 >> 00000011 >> 00000011 >> 00000001 >> 00000011 >> 00000011 >> 00000011 >> 00000011 >> 00000011 >> >> and >> 0000001 >> 0000001 >> 0000001 >> 0000101 >> 0000001 >> 0000001 >> 0000001 >> 0000001 >> >> Also, for writing a constant value, start with the sequences with just >> three bits set. >> >> Cheers, >> >> Rob >> >> >> Message was sent through the cbm-hackers mailing list >> > > wlevak@sdf.lonestar.org > SDF Public Access UNIX System - http://sdf.lonestar.org > > Message was sent through the cbm-hackers mailing list > wlevak@sdf.lonestar.org SDF Public Access UNIX System - http://sdf.lonestar.org Message was sent through the cbm-hackers mailing listReceived on 2012-05-23 16:00:05
Archive generated by hypermail 2.2.0.