avx: Extract opcode information
Hey all!
This is the first stage of !111 (merged): in this MR, I extract the prefix and escape bytes information from the OrcSysOpcode
instances. This will power the AVX backend's VEX codegen, and by submitting it separately, we can verify that SSE keeps working after this refactor.
Let me know what you think.