用DEBUG进行指令的输入 CC:\WINDOWS\system32\cmd.exe-debug -回 -a 0C63:0100 mov ax.89fe 0C63:0103 mov bx,1234 0C63:0106mou al,bh 3C63:0108 mov ah,[si] 0C63:010A mov ax.[bp] 0C63:010D mov byte ptr[si],90 0C63:0110 mov word ptr[si].88 3C63:0114
26/133 用DEBUG进行指令的输入
指令1、2、3执行结果 C:\WINDOWS\system32\cmd.exe-debug -▣x 0C63:0108 mov ah,[si] 0C63:010A mov ax.[bp] 0C63:010D mov byte ptr[si].90 0C63:0110 mov word ptr[si].88 3C63:0114 AX=0000 BX=0000 CX=0000 DX=0000 SP=FFEE BP=0000SI=000gDI=g000 D5=0C63 ES=0C63 SS=0C63 CS=0C63 IP=0100 NU UP EI PL NZ NA PO NC 0C63:0100B8FE89 MOU AX,89FE -t MOV AX,89FEH AX=89FE BX=0000 CX=0000 DX=0000 SP=FFEE BP=0000SI=000G DI=0000 5=063 E8=0C63 SS=0C63 CS=0C63 IP=0103 NU UP EI PL NZ NA PO NC 0C63:0103 BB3412 MOU BX,1234 -t MOV BX,1234H AX=89FE Bx-1234 CX=0006 DX=9000 SP=FFEE BP=0000 5I=0000 DI=0000 DS=0C63 5=U06j SS=0C63 CS=0C63 IP=0106 NU UP EI PL NZ NA PO NC 0C63:61G688F8 MOU AL.BH -t MOV AL.BH AX=8912 BX=1234 CX=0000 DX=0000 SP=FFEE BP=-9000SI=9000 DI=0000 D8-0G6时 ES=0C63 SS=0C63 CS=0C63 IP=0108 NU UP EI PL NZ NA PO NC 0C63:0108 8A24 MOU AH,[SI] S:0000=CD 27/133
27/133 MOV AX, 89FEH MOV BX, 1234H MOV AL, BH 指令1、2、3执行结果
指令4执行结果 C:\WINDOWS\system32\cmd.exe-debug -回 AX=89FE Bx=1234 CX=0000 DX=0000 SP=FFEE BP=9000SI=9000DI=0000 DS=0C63 ES=0C63 SS=0C63 CS=0C63 IP=0106 NU UP EI PL NZ NA PO NC 0C63:010688F8 MOU AL.BH -t Addr=0x0C630 Addr=0x0C631 SP=FFEE BP=0000 SI=0000 DI=0000 P=0108 NU UP EI PL NZ NA PO NC 0C63:0108 024 AH.[SI] MOV AL,[SI] DS:0000=CD 9C63:0009 CD 20 FF 9F 00 9A EE FE-1D F0 4F 03 C7 068A03 0 065.u0IG C7 061703C7064204-0101010002FFF℉F℉ 0C63:0020 FFFFFFFFFFFFFF FF-FF FFFFFF D8 05 4E 01 0C63:0030/ 870B14001800630C-F℉F℉F℉FPP00000000 0C63:0040 0506660900665060-606000000900 0000 9C63:0070 CD 21 CB0000000090-0000000000 202020 3C63:0060 2020 202020202020-00000000 00202020 0C63:0370 2020202820262020-9000000000000909 t AX=CD12 Bx=1234 CX=0006 DX=0000 SP=FFEE BP-0000SI=9000DI=0000 5=U063 E8=0C63 SS=0C63 CS=0C63 IP=010A NU UP EI PL NZ NA PO NC 3C63:010A8B4600 MOU AX.[BP+00] S5:0000=20CD Zǒ7I55
28/133 Addr=0x0C630 Addr=0x0C631 MOV AL, [SI] 指令4执行结果
指令5执行结果 C:\WINDOWS\system32\cmd.exe-debug -回x 0C63:0030 87 0B 14 00 18 00 63 0C-FF FF FFFF 00 000000 0C63:00400500000000000000-00000000000000 00 0C63:0050CD 21CB0000000000-0000000000202020 0C63:5060 2026262620262620-6000000600262620 0C63:0079 2020202020202020-0000900000000000 -t Addr=0x0C630 43 Addr=0x0C631 SP=FFEE BP=999 SI=0000 DI=999 P=010A NU UIP EI PL NZ NA PO NG 0C63:010A8B4606 MOU A8,[BP+0g] MOV AX,[BP] S5:0000=20CD 0C63:0000 CD 20 FF 9F 00 9A EE FE-1D 1 F9 4F 93 C7 068A 03 063881 c7, 061703c7064204-0101010002FPF℉ FF ......B......... 0C63:0020 FX FFFFFFFF FF FF FF-FF FFFFFF D8 05 4E 01 N 0C63:0030 70B14 001800630C-FF FF F℉F℉00000000 0C63:5040 0000 0C63:005 CD 21 CB066665060-6060600606202020 0C63:006 20 20202020202020-5000000000202020 0C63:0g 2020 202020202020-5000000000000000 AX=20CD BX=1234 CX=0000 DX=0000 SP=FFEE BP=0000SI=0000DI=000g D5U063 E8=0C63 SS=0C63 CS=0C63 IP=010D NU UP EI PL NZ NA PO NC 0C63:010DC60490 MOU BYTE PTR [SI].90 DS:0000=CD 29/133
29/133 Addr=0x0C630 Addr=0x0C631 MOV AX, [BP] 指令5执行结果
指令6执行结果 0C63:0070 2020202020202020-00 00000000000000 Addr=0x0C630 Addr=0x0C631 SP=FFEE BP=0009 SI=0000 DI=0000 D5=G63 S=63 5U0西 5U0 1P=010A NU UP EI PL NZ NA PO NC 0C63:010A B4600 MOU AX.[BP+00] SS:0000=25CD 0C63:0000 CD 20 FF 9F 00 9A EE 1 FE-1D FO 4F 03 C7068A03 0 0u时-da1g C? 061703c7064204-0101 01 00 02 FF FFFF 0C63:0020 FF FFFFFF FFFFFF FF-FF FFFFFF D8 05 4E 01 N 9C63:0030 870B14 001800630C-F℉F℉FFFF000000 00 0C63:0040 05 000000000000 00-00000000000000 00 0C63:0050 CD 21 CB000000 0660-0g0g 90 60002020 20 0C63:0060 20 2020 2020202020-00 90 00 00 00 2020 20 0C63:0070 2020 202020202020-00000000500000 00 AX=20CD MOV BYTE PTRISI],90H BX=1234 CX=0000 DX=0000 SP=FFEE BP=000 DS=0C63 ES =0C63 S5=0C63 CS=0C63 IP=010D NU UPEI PL NZ NA PO NC 0C63:010DC60490 MOU BYTE PTR [SI1.90. DS:0000=CD -t AX=20CD Bx=1234 CX=0000 DX=0000 SP=FFEE BP=0000 SI=0000DI=0000 DS=0C63 ES =0C63 SS=0C63 CS=0C63 IP=0110 NU UP EI PL NZ NA PO NC 0C63:0110C7048800 MOU WORD PTR [SI]0088 D5:0000=2090 -dg 0C63:0000 90 0 FF 9F 00 9A EE FE-1DF04F03C706 8A03 0C63:0010 06 17 03C70642 04-0101 010002 FF FF FF 0C63:0020 PF FF FE FE FE FE FE FF-FF FE FF FF D8 05 4E 01 0C63:0030 87 OB 14 00 18 00 63 0C-FF FFFF FF 00 00 00 60 0C63:0040 05 00 00 000000001 00-000000 00 00 00 0 00 0C63:0050 CD 21 CB 000000 0000-0000 00 00 00 20 2 0C63:0060 20 20 20 2020 202020-00 00 00 00 00 20 20 0C63:0070 20 20 20 2020 2020 20-0000 00 00 00 00 00 00
30/133 Addr=0x0C630 Addr=0x0C631 MOV BYTE PTR[SI], 90H 指令6执行结果