Solved

Mem/MemW/Meml

Posted on 1997-04-10
2
455 Views
Last Modified: 2010-04-16
Which unit should be included to have access to Mem/MemW & MemL in Delphi 2.0??
0
Comment
Question by:OAM
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 3

Expert Comment

by:mheacock
ID: 1335283
I did a search of all the source files and couldn't find
references.  An oversight on Borland's part?
0
 
LVL 2

Accepted Solution

by:
gysbert1 earned 50 total points
ID: 1335284
All direct port and memory accesses are not allowed anymore
from Delphi 2 to comply with the Win NT 32 bit standards. You
have to do all accesses through a device driver (.VXD in 95, or
.SYS in NT). There is however a Delphi 2.0 component available
which allows you to do this, it comes with a general purpose device driver for NT and for 95. The component is available on the Delphi superpage (http://sunsite.icm.edu.pl/archive/delphi/)
It is shareware, and costs $99 to register.
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The uses clause is one of those things that just tends to grow and grow. Most of the time this is in the main form, as it's from this form that all others are called. If you have a big application (including many forms), the uses clause in the in…
Introduction Raise your hands if you were as upset with FireMonkey as I was when I discovered that there was no TListview.  I use TListView in almost all of my applications I've written, and I was not going to compromise by resorting to TStringGrid…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question