> El 18 oct 2017, a las 5:45, Jesus Cea <jcea@jcea.es> escribió: > > The only option I see is that the 6510 is running a tight loop reading commands to read/write those addresses and that the card is releasing the DMA briefly when the fast CPU access those location for the 6510 to continue execution and simulate the access, but this seems complicated and fragile. > The only other option I see is that when the machine boots, the 6510 runs a ROM in the card that copies basic, kernal and chargen to the card. After this the card takes control, disable the 6510 via DMA and simulates the bank switching internally snooping accesses to $0/$1. Boot would be a bit slow and tape interface would be lost. > Enviado desde mi iPhone Message was sent through the cbm-hackers mailing listReceived on 2017-10-18 04:01:43
Archive generated by hypermail 2.2.0.