Out of curiosity and because of the cheap price I'v bought an ESP8266 also.
I was wondering if you could elaborate on what your setup is and which bobverter driver you used.
My ESP8266 is hooked up also to TX,RX,GND to my 130XE's SIO port and I have an UNOcart which can load BobTerm or Ice-T.
I'm using an 800XL with RAMBO XL, internal MyIDE, SDX 4.49c beta (on an Atarimax 8mbit cart). I mostly use ICE-T, because of the 80 column support and the 19.2 kbits/sec speed.
I'm not aware of more than one bobverter driver. I believe I once read that bob puff wrote a better driver than the original rverter driver. Don't know if it's true or even if I'm remembering that correctly but don't really have a reason to use the original rverter driver.
"I just connected the boards' TX, RX and GND lines (so far) to SIO"
Is your NodeMCU still working?
My understanding is the ESP8266 module is not 5V tolerant. But the Atari SIO TX circuit is an open drain output with a 4.7k pull up resistor and 100 ohm series resistor - that would limit current into the device. So perhaps things are fine because there's limited current (maybe a couple hundred microamps) being shunted by the internal ESD protection circuit.
Sounds reasonable but it's probably obvious that I don't know hardware.
Yep, both NodeMCUs have been working these past nine months. I can't say I use them very often on the Atari. I still haven't repaired my svideo cable and ICE-T is virtually unusable via composite video. I'll be more inclined to get it done if someone can patch The Learning Phone binary to work with the R-Verter driver. Currently an 850 is required and I don't own one any longer.
Somebody took TLP and made an xex out of it, and it has a very odd bug, where just before it finishes drawing the password prompt, the cart somehow falls out into the weeds and jumps to warm start....
Not a bug. There is some copy-protection being employed here.
At B863 exist 12 curious bytes. This is a bit of obfuscated code that is decrypted and copied from ROM to RAM in the subroutine at B84B.
lda #<(LB863-1) ; Address of obfuscated code (well, minus 1)
ldx #$0C ; Initialize counter to 12
sta off_EC ; Create pointer to obfuscated code
sty off_EC+1 ;
ldy #$00 ; Point to the first byte
lda #$55 ; Decryption key 01010101
iny ; Increment pointer index
rol a ; Rotate the key 01010101 -> 10101010
eor (off_EC),y ; Decrypt the byte using exclusive OR
sta L3E33-1,y ; Save the byte to RAM
dex ; Decrement counter
bne :@LOOP ; Continue looping while counter not equal to 0
The Le Mans pic remains my overall favorite conversion. However, this is another pic that looks like it might have been done by a pixel artist specifically for A8. It is my favorite in this vein. Kudos!