Bound program access |
---|
|
Bytes in the source are tested for matching values in the position aggregate. If a match is found, the byte value from the same relative offset within the replacement aggregate, as the matching value is within the position aggregate, is used to change the source byte value.
The operation proceeds byte by byte from left to right until each byte in the source has been tested and optionally modified.
Each byte of the source is compared with the individual byte values in the position aggregate. If a byte of equal value does not exist in the position aggregate, the source byte value is left unchanged. If a byte of equal value is found in the position aggregate, the corresponding byte in the same relative location within the replacement aggregate is used to modify the original source value. If a byte value in the position aggregate is duplicated, the first occurrence (leftmost) is used.
If any of the other operands overlap with the source aggregate but do not share all of the same bytes, results of this operation are unpredictable.
06 Addressing
08 Argument/Parameter
22 Object Access
24 Pointer Specification
44 Protection Violation