This repository contains my attempts at reverse engineering a number of Intel and CP/M tools and applications back into PL/M and assembler source code. My goal was to make sure that the reverse engineered source can be rebuilt to create a byte level match to the original binary images. With a few exceptions I have managed to achieve this, or in some cases create equivalent code, i.e. image loaded into memory will be the same. There are a very small number of cases, where it appears that internal / pre-release development tools were used, in these cases I have done my best to match the original or at least understand the issue.
In addition to my reverse engineering efforts, the repository contains the prebuilt 32bit windows versions of the development tools I use, except for Visual Studio and perl, both of which can be freely downloaded.
One of the key tools is an enhanced version of John Elliott's thames emulator for ISIS. I have added several features to make it more user friendly, especially for use in development.
The source for most of the bespoke tools can be found in the c-ports and tool-src repositories in addition to the binary files.
A new tool has been added fixobj that provides features to allow binaries to be tweaked to match binaries generated by tools that are not available. This has allowed me to rework of the toolbox files and several others to support direct application build without resorting to previous libraries. The only individual differences now for files where the tool / linker has saved OMF records in a different order or split records differently, this prevents an exact binary image match, but the files are fully equivalent and can be used in builds without problem. One other minor difference is for a couple of library files the historic lib application saved a file offset using a non-normalised value. Again this does not cause problems.
The c-ports and tool-src now have their own repositories. The prebuilt 32bit windows binaries are still in this repository. This was done to keep the repository cleaner as more tools were added.
The core documentation for the work is now located in the doc directory, where you will find an overview document along with more targeted documentation for various parts of the repository.
A recent addition to the repository is ISIS v1.1 (16k ISIS). I am not aware of this being elsewhere on the internet. It was uncovered in early September 2020 by Jon Hales a volunteer at the Cambridge Centre for Computing History, who found it in the centre's archives. In addition to the binary images for this rare version of ISIS, I have also reversed engineered all of the OS and applications, except for the assembler as80 which remains a work in progress.
For the most part the repository contains the tools you need to rebuild any of the reverse engineered code I have provided. The things to watch out for are
Updated by Mark Ogden 26-Nov-2020
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4