Jun 22, 2012 However, there is a CIV IV Mac Forum here for Mac related issues. I would like to mention though that you can move the screen around quite easily in Windowed mode by clicking on the Mini-Map. You can click to move the screen or click (or right click) and hold to move it around. Jan 31, 2017 Waltorious: Kezardin is correct that pressing Alt+Enter will switch between fullscreen and windowed mode. If you want to set it to automatically start up in windowed mode, you just need to edit the.conf file. It's located in the install directory and will be called something like dosboxmm3.conf (for MM3. Change that depending on which game you're playing).
Crossover Mac Beyond The Sword Windowed Models
Just adding a debug log to see if that will help:
** Wed Aug 1 13:03:28 2012
Starting '/opt/cxoffice/bin/wineloader' 'winewrapper.exe' '--workdir' '/home/robins80/.cxoffice/Caracalla/dosdevices/c:/Program Files/Firaxis Games/Sid Meier's Civilization 4/Beyond the Sword' '--start' '--'
'/home/robins80/.cxoffice/Caracalla/dosdevices/../drive_c/Program Files/Firaxis Games/Sid Meier's Civilization 4/Beyond the Sword/Civ4BeyondSword.exe'
001a:fixme:advapi:SetEntriesInAclW unhandled access mode 4
001a:fixme:advapi:SetSecurityInfo stub
001a:fixme:advapi:SetEntriesInAclW unhandled access mode 4
001a:fixme:advapi:SetSecurityInfo stub
001a:fixme:advapi:SetSecurityInfo stub
0009:fixme:exec:SHELL_execute flags ignored: 0x00000100
002f:fixme:service:QueryServiceObjectSecurity 0x1393e8 4 0x139a48 0 0x33f030 - semi-stub
002f:fixme:service:QueryServiceObjectSecurity 0x1393e8 4 0x139a48 28 0x33f030 - semi-stub
002f:fixme:service:SetServiceObjectSecurity 0x1393e8 4 0x33efac
002d:trace:seh:raise_exception code=c0000096 flags=0 addr=0x54164e ip=0054164e tid=002d
002d:trace:seh:raise_exception eax=00000000 ebx=00113e04 ecx=7ed1bbc4 edx=001134d8 esi=001138ec edi=00113e08
002d:trace:seh:raise_exception ebp=0053e700 esp=0053e700 cs=0023 ds=002b es=002b fs=0063 gs=006b flags=00010246
002d:trace:seh:call_vectored_handlers calling handler at 0x7ecf6a00 code=c0000096 flags=0
002d:trace:seh:call_vectored_handlers handler at 0x7ecf6a00 returned ffffffff
002d:trace:seh:raise_exception code=c0000096 flags=0 addr=0x541664 ip=00541664 tid=002d
002d:trace:seh:raise_exception eax=00000000 ebx=00113e04 ecx=7ed1bbc4 edx=001134d8 esi=001138ec edi=00113e08
002d:trace:seh:raise_exception ebp=0053e700 esp=0053e700 cs=0023 ds=002b es=002b fs=0063 gs=006b flags=00010207
002d:trace:seh:call_vectored_handlers calling handler at 0x7ecf6a00 code=c0000096 flags=0
002d:trace:seh:call_vectored_handlers handler at 0x7ecf6a00 returned ffffffff
002f:trace:seh:raise_exception code=c0000005 flags=0 addr=0x6670c2b6 ip=6670c2b6 tid=002f
002f:trace:seh:raise_exception info[0]=00000001
002f:trace:seh:raise_exception info[1]=44576704
002f:trace:seh:raise_exception eax=44576408 ebx=667074d5 ecx=00000001 edx=0033f818 esi=00000001 edi=0033f950
002f:trace:seh:raise_exception ebp=0033fac8 esp=0033f810 cs=0023 ds=002b es=002b fs=0063 gs=006b flags=00010246
002f:trace:seh:call_stack_handlers calling handler at 0x7bc897c0 code=c0000005 flags=0
wine: Unhandled page fault on write access to 0x44576704 at address 0x6670c2b6 (thread 002f), starting debugger...
002f:trace:seh:start_debugger Starting debugger 'winedbg --auto 46 160'
002f:trace:seh:__regs_RtlUnwind code=c0000005 flags=2
002f:trace:seh:__regs_RtlUnwind calling handler at 0x7bc72af0 code=c0000005 flags=2
002f:trace:seh:__regs_RtlUnwind handler at 0x7bc72af0 returned 1
0016:err:service:service_send_command service protocol error - failed to read pipe r = 0 count = 0!
** Wed Aug 1 13:03:28 2012
Starting '/opt/cxoffice/bin/wineloader' 'winewrapper.exe' '--workdir' '/home/robins80/.cxoffice/Caracalla/dosdevices/c:/Program Files/Firaxis Games/Sid Meier's Civilization 4/Beyond the Sword' '--start' '--'
'/home/robins80/.cxoffice/Caracalla/dosdevices/../drive_c/Program Files/Firaxis Games/Sid Meier's Civilization 4/Beyond the Sword/Civ4BeyondSword.exe'
001a:fixme:advapi:SetEntriesInAclW unhandled access mode 4
001a:fixme:advapi:SetSecurityInfo stub
001a:fixme:advapi:SetEntriesInAclW unhandled access mode 4
001a:fixme:advapi:SetSecurityInfo stub
001a:fixme:advapi:SetSecurityInfo stub
0009:fixme:exec:SHELL_execute flags ignored: 0x00000100
002f:fixme:service:QueryServiceObjectSecurity 0x1393e8 4 0x139a48 0 0x33f030 - semi-stub
002f:fixme:service:QueryServiceObjectSecurity 0x1393e8 4 0x139a48 28 0x33f030 - semi-stub
002f:fixme:service:SetServiceObjectSecurity 0x1393e8 4 0x33efac
002d:trace:seh:raise_exception code=c0000096 flags=0 addr=0x54164e ip=0054164e tid=002d
002d:trace:seh:raise_exception eax=00000000 ebx=00113e04 ecx=7ed1bbc4 edx=001134d8 esi=001138ec edi=00113e08
002d:trace:seh:raise_exception ebp=0053e700 esp=0053e700 cs=0023 ds=002b es=002b fs=0063 gs=006b flags=00010246
002d:trace:seh:call_vectored_handlers calling handler at 0x7ecf6a00 code=c0000096 flags=0
002d:trace:seh:call_vectored_handlers handler at 0x7ecf6a00 returned ffffffff
002d:trace:seh:raise_exception code=c0000096 flags=0 addr=0x541664 ip=00541664 tid=002d
002d:trace:seh:raise_exception eax=00000000 ebx=00113e04 ecx=7ed1bbc4 edx=001134d8 esi=001138ec edi=00113e08
002d:trace:seh:raise_exception ebp=0053e700 esp=0053e700 cs=0023 ds=002b es=002b fs=0063 gs=006b flags=00010207
002d:trace:seh:call_vectored_handlers calling handler at 0x7ecf6a00 code=c0000096 flags=0
002d:trace:seh:call_vectored_handlers handler at 0x7ecf6a00 returned ffffffff
002f:trace:seh:raise_exception code=c0000005 flags=0 addr=0x6670c2b6 ip=6670c2b6 tid=002f
002f:trace:seh:raise_exception info[0]=00000001
002f:trace:seh:raise_exception info[1]=44576704
002f:trace:seh:raise_exception eax=44576408 ebx=667074d5 ecx=00000001 edx=0033f818 esi=00000001 edi=0033f950
002f:trace:seh:raise_exception ebp=0033fac8 esp=0033f810 cs=0023 ds=002b es=002b fs=0063 gs=006b flags=00010246
002f:trace:seh:call_stack_handlers calling handler at 0x7bc897c0 code=c0000005 flags=0
wine: Unhandled page fault on write access to 0x44576704 at address 0x6670c2b6 (thread 002f), starting debugger...
002f:trace:seh:start_debugger Starting debugger 'winedbg --auto 46 160'
002f:trace:seh:__regs_RtlUnwind code=c0000005 flags=2
002f:trace:seh:__regs_RtlUnwind calling handler at 0x7bc72af0 code=c0000005 flags=2
002f:trace:seh:__regs_RtlUnwind handler at 0x7bc72af0 returned 1
0016:err:service:service_send_command service protocol error - failed to read pipe r = 0 count = 0!