The "script" I have is actually an old Dos EXE that was written for us a long long time ago. I do not have the source code for it nor do I know who the author was.
----- Original Message ----- Am 27.08.2012 um 03:18 schrieb Todd Zuercher: > This thread lately about g-code remapping, has brought back to mind a problem > I have, that I've just been working around. > But maybe someone might have a better way. We have some 4 axis routers (XYZW) > that are used for wood carving. Mostly they are used to carve two of > something at the same time. Now I have to generate my xyz code then run it > through something that takes the z and adds an identical w code after it. > (x1y1z.5 to x1y1z.5w.5). How hard would it be to make a custom M or G code > that once issued all Z commands will be exicuted as Z and W commands, until > that code is deactivated by another code that returns normal operation. Todd, it seems you have some kind of script to translate the gcode can you post that script, or could you post an example sequence before and after the translation? regards Michael > > -- > > ======================================== > > Todd Zuercher > mailto:zuerc...@embarqmail.com > > ======================================== > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > Emc-users mailing list > Emc-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/emc-users ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ Emc-users mailing list Emc-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/emc-users -- ======================================== Todd Zuercher mailto:zuerc...@embarqmail.com ======================================== ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ Emc-users mailing list Emc-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/emc-users