#include "head.html" µEforth for Windows

µEforth for Windows

#include "menu.html"

Building

µEforth for Windows

Unfortunately, Window Defender's heuristics falsely identify uEforth.exe builds as malware. And recently Google Cloud also started identifying them as abuse. As a result, I've removed hosting of them.

Instead build as follows (using the Windows Subsystem for Linux):

sudo apt install ninja-build
git clone https://github.com/flagxor/ueforth
cd ueforth
./configure.py
ninja


µEforth

µEforth Words

#include "common.html" #include "files_common.html"

Windows

Windows Opcodes

The wealth of Windows .DLL and system functionality can be accessed via the dynamic loading interface. A handle to a library is obtained with LOADLIBRARYA, and then individual symbols are accessed with GETPROCADDRESS.

LOADLIBRARYA ( dllname-z -- module )
GETPROCADDRESS ( module name-z -- fn )

And assembly version of */MOD is provided to allow the EXE to build without including MSVCRT.

See windows_main.c.

Native functions all called with CALL(n) (see Windows & Linux Calling below).

Windows Imports

Various Win32 calls are imported in windows.fs. In addition, a terminal that responds to ANSI escape codes is created and connected to TYPE and KEY.

#include "desktop_common.html"