PEEK'ing is only looking as the name implies. That will never cause problems.How bad can I screw up the chip using peek? poke?
Can I change the bootstrap and kill the down load?
How do I revert back to the stock values if I have poked new values.
Not always true, reading (peeking) some special system registers will alter the code operation.PEEK'ing is only looking as the name implies. That will never cause problems.
So I presume that those doing peeks and pokes will never get into so much trouble as to totally earase their PICAXE's. May cause a crash but nothing too fatal.The bits involved are at Address 2007h and 2008h which are beyond the user program memory space. It belongs to the special configuration memory space (2000h-3FFFh), which can be accessed only during programming.
I think we have that already with the "only poke to the $50-$7F and $C0-$FF" range in the manual. I haven't checked to see what it exactly says.It would be a good idea if a list/range of POKEs were published - inlcuding 'prohibited' ones. It is then up the user if he/she/it/teacher wishes to muck it up.
It could curtail lots of fun hacking and would also have to be done in firmware rather than in the compiler, this could be quite easily trapped as an error by the compiler -Would it not be a good idea for the compiler to refuse access to any 'dangerous' ones?