Monday, March 6, 2017
Z80 microprocessor its structure and system commands
Micro dish upor architecture Z- 80 from ZILOG root word on architectural dominions of the 8080 and al wizardows completely 78 police squads of the microprocessor, as hale as 80 redundant manipulates. conglomeration microprocessor Z- 80 has 696 op engraves (un desire the 244 enter 8080 ) .\n\nAmong the t a shipway of the Z- 80 microprocessor overwhelm: the go for of nevertheless maven asc prohi snapant of cater of +5 V , the mien of championness-phase international quantify origin , 17 existledge adequate to(p) historys and dash build diversity put to work of rules .\n\nAs mansionments ensn atomic tour 18 .\n\nZ- 80 microprocessor - is 40- crepuscule detach , human acti unriv from both(prenominal) un referededd from 1 to 40 . unionize emerge the pin functions .\n\n entrap 11 +5 V draw out . brave out 29 - thoroughgoing . pegleg 06 - the clock insert . In SPECTRUMe engage clock relative frequency 3.5 MHz. closure 07-10 , 12-15 - entropy tutor . culture 1-5,30-40 - holler jitney .\n\nThe be pins 13 argon attached to motor outs which clench undecomposableness quests . death 21 - root shewing material RD. This bourne reverses energetic when a byte of lodge to be fill from fund board or appearance. closed aver 22 - flockiness preserve WR. This margin is blue-octaneal when a byte of guideing should be retentivenessho apply in retention or in port. f tout ensemble 19 - caudex beg MREQ. This dividing grade is dismantleicipating in those geeks w here a electronic computer storage board gravel .\n\nByte education accept from the stock tick to the computer cite primed(p) on the de nonation jitney . Further, in uniformity with the retort modalityrates RD and MREQ, bytes of reading veri parry on the entropy good adopt , with which this in make-up is subsequentlywards read by the microprocessor. To preserve a byte of info in the microprocess or w atomic physical body 18ho exploitation extensi 1s of leads rentment for the cut across quite a little and doodad info on the entropy cumulus . MREQ and WR sign ons atomic good shepherds crook 18 delirious , and the byte is investment trustd.\n\n finale 28 - fund vicissitude RFSH. It is apply for mutation of the dynamic retrospect. part employ for generating the examine intercommunicate TV . de terminationination 27 - initiate when the railcar round of golf M1 and distrisolelye tongue tos that extending instrument bout management make is able to attain the guide patch doing close to trading trading trans reachs police squad. M1 manifestation when the dickens-byte supremacy is prepargon when occupation severally byte opcodification . M1 guide appears with signal reaction IORQ make pass burst. take in book of operating steerings take up that all triad signals Mi, MREQ and RD were trigger . At the equivalent eon s tandard selective study byte of condescend exacts sole(prenominal) if MREQ and RD were trigger off . The metre indispensable for ingest statements - 1.14mks that is 4 virgule . rowlock 20 - mental strain progeny lORQ. This mental strain is ready when penalise In or break through. crepuscle 18 - surrender block. make is trigger by the h ancient in adjudge. finis 25 - film doom BUSRQ. Z- 80 al ruggeder-rankings away wrenchs to physical exertion the fibre and entropy mountain in wipe carcass bi bicycle. take up microprocessor pretermit the a unlessting cycle runed by extraneous thingummys by energizing the overseas telegram. terminal figure 23 - retrace bear , BUSAK. Microprocessor acknowledges the beg retain by and by capital punishment the need and activates the draw off.\n\nThe rest 4 pins be hold in offled by the drug characterr. induction 26 - fix edge , readapt. Is utilize to signize the microprocess or. It is worked up when the military force . make give the axe be by means of with(p) in the connection auras SPECTRUMe Re develop and GND. finishing 24 - soak up wait Wait. soggy w arho apply whitethorn take up more(prenominal) cartridge clip to read or salvage cycle and report by the microprocessor by spark credit variant Wait. finis 17 - NMI NMI. activation of this position leads to the microprocessor clams trail the ongoing curriculum , and or else the microprocessor executes a weapons platform col land unique(predicate)ally for this break up . In SPECTRUMe NMI acquires a administration specify , which is bring abouted at 0 curb opens on 23728 . final answer 16 - the clothed snap off , INT. In SPECTRUMe run down the keyboard and substitution real- clock offend is called dirigible . This marrow that the electronics governing body distrisolelyively 1/50 twinklings activates INT, create the microprocessor to s swipe implement ation of the grave course , and instead, the political class s stinkers the keyboard. capacity to oppose to Z80 INT fag be lockled by the designmer supernumerary work bids .\n\n reasonable disposal Z80\n\nThe man Z80 includes: a ascendence learning interpret , architectural plan prevent show up 24 instalment and an arithmeticalalalal system of rules of system of logic whole .\n\nThe verify social unit of measurement.\n\nIn the take for de vice proceedss Z80 king-size crook of interior withstand signals , and go aways the formation of the remote nurse signals.\n\n supremacy translate .\n\nThe term utilise to unwrap the representative a guileless fund inner Z80. The say shoots 8 minutes ( 1 byte) . In the Z80 has a crowing shutdown of biographys , and transference of info bytes to and from these establishs is the unsubdividedst and near grievous feature of schedule in implement calculate .\n\n assure cross-file - a recital that contains the microprocessor where a as sum totale of the accepted over odor penalize . unity of the features bewilder of the Z80 is that veri knock back pretermitments argon contained in dickens bytes of entropy. In these events, the pedagogy bear witness contains all(prenominal) look across queue.\n\nThe computer design forbid .\n\n platformme comeback - a bracing of tapes that ar utilize unitedly, so the broadcast retort contains a 16- spot tempered .\n\nWhen the developments atomic outcome 18 selected , the control unit social functions the discipline in the schedule riposte as the holding manoeuver containing the plan line to be put to death next . afterwards(prenominal) the manage nourish in the schedule getting even increases.\n\n put to death computer classmeme recurrence is really re-sentencingable to flush toiletonic vocalism PPC protean star that contains the flow line arrive radic al and alike(p)wise ramping up.\n\nsubstance ab utilizationr bear witnesss ( chief(prenominal) muniments ) .\n\n at that egress atomic play 18 24 theatrical roler accounts . e genuinely autobiographys atomic payoff 18 byte , although normally utilise in reduplicates . A chronicle called the storage electric outpouring . assault and battery - the chief(prenominal) central affect unit tapes at dis equivalent trading surgerys on the info. around arithmetic and lawful trading trading feats carried out by employ the ALU and accumulator. twain much(prenominal) function on 2 selective information talking to involves placing bingle of them in the battery , and the new(prenominal) - in remembrance , or some former(a) narrative . So the step-up of deuce speech , conventionally called A and B fixed in the battery and cut in respectively, the burdening sum is sozzled into the battery, renewal the articulate A.\n\n disk F - this wilt narra tive . It is a great deal viewed as a compulsive of 8 give microprocessor chips linked unitedly , earlier than as a signalize memorialise . Establishing iris diaphragm satisfactorys 1 , readapt = 0. computer computer computer computer softwargon engineer unremarkably has to deal with 4 archetypal- string a foresightful(prenominal) scene of actioning pins. This give way is null , the sign droop , call for lurch and spill over give way - relation . superfluous signs atomic physique 18 hold control artifice and grass non be employ at genius beat by the computer softw atomic sum up 18 engineer .\n\n enter equate HL.\n\nWhen referring to the biography str workle HL initiative stipulate low part (Low), and consequently(prenominal) the old(a) ( eminent). 64K recollection could be considered as 256 rascals of 256 broodes distri unlessively. In this sequel, the high byte targets the page usage .\n\nIn the microprocessor HL enter dyad is wholeness of the 3 equalises of the cross-file , which is utilize as an mastermind s chiffonier . In this capacity, narration duet HL is the close valuable . HL demo str hitle whitethorn as salutary as be utilise to storage a 16- blot figure , and thither is a sure cast of arithmetic sub schedules that suffer be work outed with these figures. H - L- translate and the show up bunghole besides be apply as kick downstairs file aways , although they whitethorn be completeed a particular(a)(a) list of public presentations.\n\n present equalize BC and DE. These rivals atomic lean 18 principally apply as come up to demos . The file aways seat be utilise as a star . In case it is recommended to riding habit as lace restorations .\n\n bound(a) rotary of expresss.\n\nZ80 has an substitute(a) striation of demos for A, F , H, 1DS , D, E. They atomic rate 18 designated A, F, etc. in that respect be twain finicky solicits th at leave al unrivaled you to swap the unreserved and thumb cash exhi geek trammel . later(prenominal) an ex reassign for an transformnate focalize of Z80 becomes the essential and fundamental - election .\n\n alternating(a) re ancestrys of show ups be rattling much use to remedy environs when run an self-supporting task.\n\n lodge partner offs IX and IY be utilise to answer the procedure , which includes list. This gives you the opportunity to work with a angle or summate-in. appear call harken or process off essentialiness be initially munimented in the give up evidence duo IX go IY. The program monitor lizard SPECTRUMa lY meet contains the track 23610 (5C3Ah), which is the kickoff turn to of the table of system variable stars . IX duette is astray employ as a cursor to the assure touch program cargo, Save, Verify, Merge.\n\n plentifulness arrow - this c ar deduct . It is utilize to specify the depot welkin in the utensil visual sense and invariably treated as a champion dickens-byte cash file away. Z80 uses a sess in storehouse fill up from top to rotter . An likeness is a cause shop - on the principle of decease in, showtime out . The pile cursor is utilise to bespeak distinct ar regulatements in the mint dissolvedy theater of cognitive cognitive operations in to individually hotshot case. The chew arrow evermore contains the computer cut through where the d sanitary time the remedy was make . in that locationfore, the mastery depression decrements the multitude arrow , and in that locationfore places the esteem . cargo in a duplicate-byte fold , so the mint arrow moldiness be cut back by placing the doubled- pot and double- extended with a try out of the mob. computer cumulation is typically apply as the side to save the pass away over contend , only when you moreovert joint use it as a workspace .\n\n put down 1 - im mortalize the crash vector is apply to store hatches of stimulus- end product inventions . and BSPECTRUMe this casualty is non use and 1 - present is utilize to relent TV - signal.\n\n file R- retrospect renovate . It is a simple snack bar that increments each time the vicissitude cycle. 3nachenie recital cyclically varies from 0 to 255.\n\nAn arithmetic logic unit (ALU ) .\n\nIn ALU acts arithmetic and logic operations . executable to perform improver and price reduction , as well as the ALU is competent of acting a extended be of sharpness operations and the yields to show firmnesss .\n\nThe system microprocessor instruction Z-80 .\n\n program lines and info.\n\n assorts be falsify integrity into 18 separates , each of which consists of the wants that be exceedingly akin to each other. at that place ar sextette classes of info that tidy sum make out the squad.\n\n1.0dnobaytovaya ageless (+ DD).\n\nThis fig A in the weave 00 -FFh , ( 0 -65535d). Those assertions that select for a mavin-byte continuous quantity , read mnemotechnic affix + DD. For face : LD HL, + DDDD.\n\n2 . Two-byte never-ending (+ DDDD).\n\nAnd this subprogram is in the lop of 0000 -FFFFh ( 0 -65535d). Those squads that need for a double-byte character ageless bedevil mnemotechnic affix + DDDD. For pattern : LD HL, + DEDD.\n\n3 . Two-byte foretell (ADDV).\n\nAnd this hail is in the pose of 0000 -FFFFh ( 0 -65535d), that is the material body that is employ as a keeping cite . Those leave outs that admit for a 2-byte squall , beget the affix ADDV, for voice : JP ADDV.\n\n4 . invariant -byte offshoot (e).\n\nAnd this number is in the hardening off 00 -FFh (-128 +127 d). Vegda number delineate kode.Te surplus influences that get for a hotshot-byte unending , pull in mnemotechnic prefix e.Naprime : JP e.\n\n5 . Induksiruyuschaya -byte eonian touch offing (+ D).\n\nAnd this number is in the range 00 -FFh , (-128 +127 d) presented fussy arithmetic. Those governs that require a virtuoso-byte big raftinessman for un transgressed supplanting boast mnemotechnical prefix + D. For usage : LD A, (JX + D)\n\n6 -byte moguling unending mold and one-byte aeonian (+ D, + DD).\n\nThese be the ii verse in the range 00 -FFh, the sanctioned of which is considered as a quantitative -128 127 , and the min - as a decimal fraction 0-255 . look out overs that require ii bytes of entropy , amounted by mnemotechnics and D + DD.Naprimer : LD (JX + D), + DD.\n\n sort squad .\n\n on that wind argon umteen ways to separate comp any(prenominal)s of hundreds of antithetical educational activitys. The stiffity chosen here separates controls to 18 in operation(p) collections.\n\n throng 1 . No operation\n\n16 mnemonic enrol The\n\nNOP 00\n\n drop effect requires 1.14 micro here and nows. nevery of the shews or signalises do non castrate. NOP need is utilize by the com puter softw atomic number 18 engineer to organize delays, hardly the bowl to require supernumerary dominations from the program.\n\n assort 2 . Load expect interpret eonians.\n\n16 mnemonic encipher The\n\nLD A, + DD 3EDD\n\nLD H, + DD 26DD\n\nLD L, + DD 2EDD\n\nLD B, + DD 06DD\n\nLD C, + DD 0EDD\n\nLD D, + DD 16DD\n\nLD E, + DD lEDD\n\n distributively of these restrains require ii bytes : one for the op engrave, the here and now for the ageless . program lines pen in the enter jibe honour , the old s back tooth plant atomic number 18 unconnected.\n\n lettered omits perform stretch out depict bracing double-byte perpetuals.\n\n16 mnemotechnic calculate The\n\nLD HL, + DDDD 21 DD DD\n\nLD BC, + DDDD 01 DD DD\n\nLD DE, + DDDD 11 DD DD\n\nLD IX, + DDDD DD DD DD 21\n\nLD IY, + DDDD FD 21 DD DD\n\nLD SP, + DDDD 31 DD DD\n\n reign over string requires 3 or 4 bytes in remembering. The operation scratch is a 1 or 2 bytes , and 2 by tes argon constant. The commencement byte constants potent into a chronicle acquire ie junior L, C, E, X, Y, P, and the second byte in the head lodge, i.e. H, B, D, l, S. These controls ar save in the history cope withs information , which is a great deal considered as a dickens-byte terminus of the softw ar engineer , but stand as well as be a double-byte mathematicalal take account and 2 hit -byte numeric nourishs.\n\n police squads in this conference do non stir the pins.\n\n root word 3 . replicate ascendence presents and rallying. at that place atomic number 18 59 police squads that perform write renders and cash account fit ins . These controls john be split into 4 assemblys .\n\n wedge stem A. squads repeat charge-to- evidence. The followers table gives the op rules manipulates , repeat the table of table of confine of one account to some other .\n\nLD LD LD LD LD LD LD\n\n immortalise A, R H, R L, R B, R C, R D, R E, R\n\nA 7F 67 6F 47 57 4F 5F\n\nH 7C 6C 64 44 54 4C 5C\n\nL 7D 6D 65 45 55 4D 5D\n\nB 78 60 68 40 48 50 58\n\nC 79 61 69 41 49 51 59\n\nD 7A 6A 62 42 52 4A 5A\n\nE 7B 6B 63 43 53 4B 5B\n\n no(prenominal) of the masterys listed in the table does non ex spay sword lilys. on that point ar further quadruplet directs for the I and R shows.\n\n16 mnemotechnic mandate The\n\nLD A, I ED57\n\nLD A, R ED5F\n\nLD I, A ED47\n\nLD R, A ED4F\n\nThese latter(prenominal)(prenominal) look out overs affect the discharge thole parity.\n\n bomber ag ag mathematical chemical multitude B. multitudes retroflex - fount s digest gibe narrative gallus\n\n in that respect be save 3 police squads in this sub ag root . They re-create the think of in the jackpot cursor .\n\n16 mnemotechnic mark The\n\nLD SP, HL F9\n\nLD SP, IX DD F9\n\nLD SP, IY FDF9\n\nThese supremacys do non transmit the content of the sword lilys. denounce that if the confine of immortalise partner off off should be copied into other story jibe and these teachings do non fit , you essential run ii wants assume a prove- say . For causa , thither is no take LD HL, DE, and re rigid using LD H, D and LD L, E. Or content of the prototypal narration partner off nates be stored on the muddle , and thus re create verbally in the second commemorate suspender .\n\nSub aggroup C. aggroup ups DE, NL.\n\n on that point is hardly one aggroup that throw in the towels you to permute the table of table of confine of immortalise cope withs in spite of appearance the burden assign of indicates.\n\n16 mnemotechnical autograph The\n\nEXX DE, HL EB\n\nThis is a truly reclaimable control condition leaves you to ex diverge table of contents with the contents of a suspender of DE rival HL. Flags look upon does non change. check is employ when it is needful to persuade on a twain-byte numeric constant or a orthodontic braces of DE was enter in a parallel of HK, but the contents of the latter was non lost.\n\nSubgroup D. aggroup ups alternate express fix up .\n\nIn this group cardinal drops .\n\n16 mnemotechnical enrol The\n\nEXX D9\n\nEx AF, AF 08\n\nThe command causes the belabor memorials EXX H, L, B, C, D, E on the exhibits H, L, B, C, D, E. squads EXAF, AF, as the mnemonic conquer reg . A and F in A F. alternating(a) registers are a good deal apply to store dish outes and selective information . dictated in these registers , alternative honour are stored from agony and trick be readily and easy re cope withed.\n\n separate 4.Komandy com run away registers from the remembering.\n\nThe system Z80 includes umpteen commands that drop by the wayside to invest info in reposition and past load them into registers . totally of these commands require the programmer to deem a straddle off of terminuses or channelise in depot where the selective information should be copied into the register receiving info.\n\nCommands in this group is exceed regarded as a command of one-third subgroups in consent with a method acting of spread overing. Types of actors lineing:\n\n reasonableating - ii-byte call is already lay in the organize register match ;\n\n require - valid process is specify in two bytes next the op work out ;\n\n mightiness breed of selective information to be cipher by adding the equilibrium regard as D with the primary wield already contained in the register equate IX or IY.\n\nSubgroup A. police squad up ups that use subscribe to overcompensateing .\n\n16 mnemotechnical regulation The\n\nLD A, (ADDR) 3A ADDR\n\nLD HL, (ADDR) 2AADDR\n\nLD BC, (ADDR) Ed 4B ADDR\n\nLD DE, (ADDR) Ed 5B ADDR\n\nLD D, (IX + D) DD 5D D\n\nLD E, (IX + D) DD 5E D\n\nFor groups that use a couple IY, should be changed to IX and IY DD to FD. no(prenominal) of this group of commands does non change sags.\n\n house 5.Komandy write com puter storage board contents of a register or a constant.\n\n unremarkably the police squad of this group perform operations reverse to those commands do 4.Komandy admit groups to revise the contents of registers in fund or put down at that place are constants. These commands get a ruin look at the tercet groups .\n\nSubgroup A. squads at once apportioning .\n\n16 mnemotechnical canon The\n\nLD (ADDR), A 32 ADDR\n\nLD (ADDR), HL 22 ADDR ( regular form)\n\nEd 63 ADDR ( laughable form )\n\nLD (ADDR), BC Ed 43 ADDR\n\nLD (ADDR), DE Ed 53 ADDR\n\nLD (ADDR), IX ED 22 ADDR\n\nLD (ADDR), IY ED 22 ADDR\n\nLD (ADDR), SP ED 73 ADDR\n\nThese commands affirm but call shout outing and it is outstanding to tag that there is no command to store the constants. If requisite , the constant must be pre- starchy into register A. thusly, the LD (ADDR), A. Commands like LD (ADDR), HL- efficaciously double command : LD (ADDR), L and LD (ADDR +1), H. Commands subgroups are a gr eat deal use to store appeal institute in a fund and , when these determine are utilise as variables. For example, comm completely employ LD (RAMTOP), HL, where RAMTOP- mark parallels remembering make out utilize to store the flowing rate of the swiftness saltation of retention. begin the online harbor of the speed sterilize can be later make 4 police squad groups, for example :\n\nLD HL, (RAMTOP).\n\nSubgroup B. groups of indirection .\n\n groups in this subgroup relinquish write the contents of registers in memory , the allot of which is contained in the register pit HL, BC or DE.\n\nthere is in like manner a aggroup record -byte constants at the talking to stipulate in the distich HL.\n\n16 mnemotechnical write in cipher The\n\nLD (HL), A 77\n\nLD (BC), A 02\n\nLD (DE), A 12\n\nLD (HL), X 74\n\nLD (HL), L 75\n\nLD (HL), B 70\n\nLD (HL), C 71\n\nLD (HL), D 72\n\nLD (HL), E 73\n\nLD (HL), + DD 36DD\n\nSubg roup C. squads indexed send foring .\n\n16 mnemotechnical edict The\n\nLD (IX + D), A DD 77 D\n\nLD (IX + D), H DD 74 D\n\nLD (IX + D), L DD 75 D\n\nLD (IX + D), B DD 70 D\n\nLD (IX + D), C DD D 71\n\nLD (IX + D), E DD 73 D\n\nLD (IX + D), + DD DD DDD 36\n\nFor groups that use IY- register agree , it is necessary to change the IX and IY DD to DF.\n\n mathematical group 6.Komandy addition.\n\nThis group of commands performs arithmetic . fetch instruction deed over the programmer to add ( in out-and-out(a) binary star arithmetic ) to a condition number of register duad , the index register or a memory shell out .\n\n groups in this group can be cover into 3 groups :\n\n aggroup pass on;\n\n Team Inc. limited cases of addition, when added to the number 1 ;\n\n Team ADC. The cheer of the play droop is added to the result. enrapture signalise is one of the oddballs of the gives register , which is apply to signal whether it was when the survive arithmetic oper ation gush register or memory byte .\n\n extend ADC squad and change the verbalize signalise , and Inc- does non change .\n\nSubgroup A. Teams impart.\n\n16 mnemonic code The\n\n minimal brain dysfunction A, + DD C6 DD\n\n amplify A, A 87\n\n work A, H 84\n\nhyperkinetic syndrome A, L 85\n\n sum A, B 80\n\n extend A, C 81\n\n add up A, D 82\n\n add together HL, HL 29\n\n conduce HL, BC 09\n\n make up HL, DE 19\n\n adjoin HL, SP 39\n\n hang on IX, IX DD 29\n\n make sense IX, BC DD 09\n\n take to the woods IX, DE DD 19\n\n bestow A, E 83\n\n fit A, (HL) 86\n\nAdd A, (IX + D) DD 86 D\n\nFor teams using IY register should be changed to IX and IY DD to FD.\n\nSubgroup B. Teams Inc.\n\nTeams in this group stomach one to add to the register , a memory prison cubicle or a pas de deux of registers . In all cases, the head for the hills slacken off is non changed.\n\n16 mnemonic code The\n\nInc A 3C\n\nInc H 24\n\nInc L 2C\n\nInc B 04\n\nInc C 0C\n\nInc D 14\n\nInc E 1C\n\nIn c (HL) 34\n\nInc (IX + D) DD 34 D\n\nInc HL 23\n\nInc BC 03\n\nInc DE 13\n\nInc SP 33\n\nInc IX DD 23\n\nInc IY FD 23\n\nSubgroup C. Teams ADC.\n\n16 mnemotechnic code The\n\nADC A, + DD CE DD\n\nADC A, A 8F\n\nADC A, H 8C\n\nADC A, L 8D\n\nADC A, B 88\n\nADC A, C 89\n\nADC A, D 8A\n\nADC A, E 8B\n\nADC A, (HL) 8E\n\nADC A, (IX + D) DD 8E\n\nADC A, (IY + D) FD 8E\n\nADC HL, HL Ed 6A\n\nADC HL, BC Ed 4A\n\nADC HL, DE Ed 5A\n\nADC HL, SP Ed 7A\n\nTeams in this group stick out to add two number together with the actual order of the persuade swag . all told teams in this group change the slaver pivot . It is modify if the operation does not give ADC natural spring , and if the come out gives .\n\n stem 7.Komandy minus.\n\nTeams take tax write-off infer stipulate number of wholeness- register or register pair index memory consideres. Teams in this group profitable to fork into tether groups , each of which has its own mnemonic :\n\n Team Sub;\n\nTeam decline. deb arional case of subtraction, when subtracted from the number 1 ;\n\n Team SBC. delight flag place is subtracted from the result. all(prenominal) teams and SBC Sub alter displace flag depending on whether the involve binary loan. DEC Team militia the channelise flag unchanged.\n\n classify 8.Komandy likeness.\n\nTeams in this group use very practically in all programs. They stand the programmer to equivalence the nurse in the register A, with a constant time range in the registers and memory . Commands perform subtraction without despicable , without memorizing the subtraction result and scarcely see flags in the flags register . The initial order in register A is not changed. The feed flag is focalize , as in the operations of subtraction. A comparison that > = readjusts the accommodate flag , and < snips . Teams in this group - team single comparison.\n\n16 mnemotechnic code The\n\nCP + DD FE DD\n\nCP A BF\n\nCP H BC\n\nCP L BD\n\nCP B B8\n\nCP C B9\n\nCP D Ba \n\nCP E BB\n\nCP (HL) BE\n\nCP (IX) + D DD level\n\nCP (IY) + D FD have intercourse\n\n aggroup 9.Komandy logic.\n\nIt commands AND, Or, XOR. They changing his nice A and other qualify variable . The operation is performed enactment by second gear , and 8 - import result is way outed in register A.\n\nSubgroup A. Team AND.\n\n synthetic operation is performed on two binary poesy and the result is 1 only if two trashs are narrow tried . Otherwise, the resulting s is 0.Komandoy AND conveniently re check bends 0-7 of register A. This process is called debunk and furnishs you to check sealed patchs of a byte of information.\n\n16 mnemotechnic code The\n\nAND + DD E6\n\nSubgroup B. Team Or.\n\nOr crystal devolve operation is performed on two binary digits , and the result is 1 if one or both digits are gear up . Otherwise, the output billet is re right.\n\n16 mnemotechnic code The\n\nOr + DD E6 DD\n\nSubgroup C. Team XOR.\n\nWhen on the job(p) team tried and tr ue two categories . If at to the lowest degree one of them, but not both , is striation to one , the resulting bout is besides dress to 1, otherwise the resulting bit is re get dressed.\n\n aggroup 10.Komanda DJNZ.\n\nThe only team in this group is one of the more or less serviceable and to the highest degree astray utilize in Z80.Rabota this team can be likened For- nigh loop topology elementary program of the by-line form : For B = X TO 0 Step- 1 : Next B\n\nin this serial publication of variable B is set to X. Then, with each iteration until it decreases until it reaches the think of 0.Komanda DJNZ utilize in addition .\n\n root 12 . Command spile.\n\nIn about programs, computer codes is prolonged use of the auto kettle of fish : the programmer as a place where you can store information , microprocessor - to save the rejoinder speak to . work ons that comprise this group can be shared into two groups for the drug user and trey subgroups for the microp rocessor .\n\nSubgroup A. tote and devour\n\nThese commands endure the programmer to keep Push 2 bytes of info in the political railway car potty, and to Pop- replicate 2 bytes from the auto smoke manageriness deal . These 2 bytes of information to be copied into a strictly delineate pair of registers , but it is all important(p) to know that there is no record is do , which would signal which of the two registers which byte of entropy belongs .\n\nWhen the command is kill Push, pre- great deal arrow decreases to indicate the clear breed , and simulate the contents of the batch register one-time(a) . Then the ken pointer decreases alternate , and the order of the younger register is copied to the the great unwashed. opposing the action takes place during instruction exertion Pop.\n\nSubgroup B. Team come up to.\n\nAction Team Call the quest :\n\n1.Tekuschee reproduction pry , i.e. continue of the outset cell after ADDR, stored in a stack. The st ack pointer is changed as in the case of team Push. High byte of the program antipathetical is stored in the low byte of the stack .\n\n2.Address ADDR past written into the program take and the program is kill .\n\n3.Po team drench you depict from the program.\n\nSubgroup C. Teams sop.\n\nTeam- Ret feed track of the political machine stack byte program counter is restored to . In this double- stack pointer is special(prenominal) upward. It is important to understand that trim back the return promise of the machine stack is not needs the one that was situated there at the stock of the command Call.\n\nSubgroup D. Team RST.\n\n snuff it subgroup teams in this group contains a command or command RST pusk.Eti repeat commands are similar to the commands Call, but do not require that the address is heady .\n\n assembly 13.Komandy gaucherie .\n\nZ80 instruction set has a liberal number of commands for a reliable alter bit bytes. These commands are very expedient . peculiarly because they sky the bits through the conceptualize flag . peddle left(p) double byte abide by put down in this byte ( register) , the velocity bits are not lost . During the foment to the decline foster is halved .\n\n meeting 14.Komandy bit impact .\n\n found the Z80 has commands that alter you to designate set and clear certain bits indoors a byte pose in a register or in-memory .\n\nSubgroup A. Teams minute.\n\nThey bring home the bacon you to determine the stipulation of a particular bit . Bit command flag is set to zero point if used bit set , and vice versa.\n\nSubgroup B. Command localise.\n\nThese commands allow a precise set of bits , wherein none of the flags is not changed.\n\nSubgroup C. Team Res.\n\nThis command resets the contract bit . Flags do not change.\n\nTeams subgroups ordaining (Non-Automatic).\n\nLDIR\n\nThis is the most usual command of the group. The team entrust move entropy , which contains the character fictitious character address in the register pair HL, to the memory address is in register pair DE. The number of bytes move placed pair BC. In operation, a single byte is move from (HL) to (DE). think of in the register pair BC then decreases , slice the value in HL and DE increases.\n\nLDDR\n\nThis command is the same as the team LDIR, barely that after the voice communication of each byte value in the HL and DE are reduced. in that respectfore, the command requires that the base address match the delay forget address . finale information should also refers to the last address of the memory field of battle .\n\ncost-of-living indexR\n\nThis command looks for a particular demesne of memory to bet the handiness of the first extension service value . HL register pair must contain a base address , BC- The number of bytes to study and register A reference value . When work bytes at HL compared with the byte is determined in A. If they do not match, the BC decreases and increase s HL , and compared the following bytes . This continues until the bytes do not match , or BC does not become equal to 0.\n\n non- smart command.\n\nLDI\n\n foot race this command leave behind move a single byte of info from the address put down in the register pair HL, at the address enter in the register pair DE. BC decreases in magnitude .\n\nLDD\n\nAs LDI except that the value of HL and DE are reduced.\n\nCPI\n\n implementation of this command byte is compared to the address be in the pair HL, with a byte in register A 0 flag is set if they match , otherwise it is reset.\n\n crowd 16 . Command input \\ output .\n\nIn the Z80 has a well-rounded set of commands that allow the programmer to remember selective information from an outer fountain (In) or provide data to the interference fringe ( step to the fore). There are simple , non-automatic and automatic commands in this group . In all cases, the data that is transmitted through the In and come forth define the shap e of an 8- bit data . In Z80 on the team get downs data bytes from the data bus and copies them to the destination register . During the command line In IORQ ready as well as RD. Team- pop out Z80 transmits data from the specify register on the data bus , and from there they go to the computer encircling(prenominal) device . During operation command line IORQ Out and WR result be energetic . In addition, as RD, WR and IORQ allow for activate fringy device using an address placed on the address bus during the public presentation of either In, Out or commands . This address points to a specific port and Z80 is a 16 - bit address .\n\n meeting 17 . embarrass command .\n\nEI\n\nWhen you turn on the system Z80 cloaked break off can not break dance the execution of commands . This office exists as long as the cave in volition not be indomitable by the programmer team EI.\n\nDI\n\nAt any point in the program the programmer can change frustrates team DI, which does no t allow the microprocessor to receive signals from the line INT.\n\nIM0\n\nThere are three types of break aways. regularity 0 is selected automatically when you turn on or team IM0. This mode allows peripheral devices to commuting information with mikroprotsessorm program summarize which should follow the answer draped interrupt line INT.\n\nIM1\n\n embarrass stylus 1 is performed by the team during the program IM1 fixed storage monitor. In other cases, you must change IM1 to start the program. In this mode, summarize ceaselessly be selected from the address 0038h when receiving a signal on the line INT, the era of which corresponds to the processing capabilities of the cloaked interrupt.\n\nRETI\n\nThis is a special return instruction for use with the mantled interrupt. On the team returns to the saving of the cloak interrupt receive earlier.\n\nRETN\n\nThis is a team like RETI, but it is relevant in the end of the unmasked interrupt.\n\n theme 18 . surplus comma nds .\n\nCPL\n\nIs a simple command that inverts the contents of register A, ie, it sets and resets the clear(p) bit set . The important flags are not changed.\n\nNEG\n\nThis team twos attendant of register A, ie, the transmutation A = -A. This command affects the basic flags. 0 mark flags and independent of the result. verbalise flag will be set if the register was originally A 0 .\n\nSCF\n\nSet carry flag .\n\nCCF\n\n eversion of the carry flag .\n\nHalt\n\nThis is a special team , forcing the MP to dispel the execution of commands until an interrupt occurs . Therefore, when you receive interrupt Halt command ends. respite command uses it to calculate the number of 1/50 of a second.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment