The "script" I have is actually an old Dos EXE that was written for us a long 
long time ago.  I do not have the source code for it nor do I know who the 
author was.

----- Original Message -----

Am 27.08.2012 um 03:18 schrieb Todd Zuercher:

> This thread lately about g-code remapping, has brought back to mind a problem 
> I have, that I've just been working around. 
> But maybe someone might have a better way. We have some 4 axis routers (XYZW) 
> that are used for wood carving. Mostly they are used to carve two of 
> something at the same time. Now I have to generate my xyz code then run it 
> through something that takes the z and adds an identical w code after it. 
> (x1y1z.5 to x1y1z.5w.5). How hard would it be to make a custom M or G code 
> that once issued all Z commands will be exicuted as Z and W commands, until 
> that code is deactivated by another code that returns normal operation. 

Todd,

it seems you have some kind of script to translate the gcode

can you post that script, or could you post an example sequence before and 
after the translation?

regards

Michael


> 
> -- 
> 
> ======================================== 
> 
> Todd Zuercher 
> mailto:zuerc...@embarqmail.com 
> 
> ======================================== 
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and 
> threat landscape has changed and how IT managers can respond. Discussions 
> will include endpoint security, mobile security and the latest in malware 
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> Emc-users mailing list
> Emc-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/emc-users


------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Emc-users mailing list
Emc-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/emc-users

-- 
========================================

Todd Zuercher
mailto:zuerc...@embarqmail.com

========================================

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Emc-users mailing list
Emc-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/emc-users

Reply via email to