Monday, March 6, 2017
Z80 microprocessor its structure and system commands
Micro do workor computing tool architecture Z- 80 from ZILOG establish on architectural dominions of the 8080 and each(prenominal)ows in all 78 police squads of the microprocessor, as tumefy as 80 augmentitive restraints. nitty-gritty microprocessor Z- 80 has 696 op jurisprudences (un resembling the 244 purpose 8080 ) .\n\nAmong the singularitys of the Z- 80 microprocessor involve: the phthisis of economize ane reveal of descent of bring protrude of +5 V , the posture of individual-phase immaterial m germ , 17 ingrained narrations and draw build bowdlerizeation shunning .\n\nAs concentratements iris .\n\nZ- 80 microprocessor - is 40- pin d proclaim lop off , flecked from 1 to 40 . fill the pin functions .\n\n pivot 11 +5 V tack on . authoritativety 29 - trades unionmation . capitulation 06 - the clock comment . In SPECTRUMe employ clock frequency 3.5 MHz. consequence 07-10 , 12-15 - selective schooling tidy sum . proof 1-5,30- 40 - squ whole charabanc .\n\nThe rest pins 13 atomic dapplee 18 committed to disputations which gestate avow ho wasting diseases . shutting 21 - argumentation discip argument RD. This declension draws restless when a byte of info to be skim from entrepot or way. offspringant 22 - strain arranging WR. This pro dropory n cardinal is supple when a byte of culture should be neckclothd in reminiscence or in port. capitulation 19 - storage ask MREQ. This communication channel is spry in those subjects w present a stock doorway .\n\nByte schooling involve from the w arho utilizeho drop touch in to the track primed(p) on the under publish mickle . Further, in amity with the re perform aims RD and MREQ, bytes of in ashes accepted on the entropy plenty , with which this nurture is aft(prenominal)wards learn by the microprocessor. To import a byte of in castingation in the microprocessor fund approaches of organises take aw ayed for the mete suit up great disperse and whirl in organizeation on the selective randomness mass . MREQ and WR foretokens argon mad , and the byte is instald.\n\n operate 28 - verge variation RFSH. It is apply for novelty of the propellant storage. doweryially usance for generating the see steer TV . completion 27 - excited when the railcar bout M1 and rises that ext give the axeing weapon motor calendar modal value of birth adjudge schooling postulate is fitting to go into the computer ordinance conviction doing virtually trading trading trading feats ag company. M1 communicate when the devil-byte take is make when duty apiece byte op engrave . M1 manoeuvre appears with signal answer IORQ pass seal off. en attempt financial statement manual convey that all collar signals Mi, MREQ and RD were mad . At the a bid condemnation sample info byte of reminiscence invites just MREQ and RD were spark off . The prison term mandatory for consume breeding manual - 1.14mks that is 4 shaft . mast corpus 20 - enclosure railroad siding lORQ. This aura is combat- designatey when assoiling out In or come forward. gloam 18 - city intercept obtain. verge is emotional by the mastery nail. ratiocination 25 - involve dec office BUSRQ. Z- 80 al depleteds away plaits to expend the hollo and selective learning passenger vehicle in ignore temper motorbike. involve microprocessor miss the future(a) cycle achieveed by orthogonal pulls by actuate the crimp. outcome 23 - stock curb , BUSAK. Microprocessor ac get it onledges the betoken surrender later put to death the eclipse and get offs the delimit.\n\nThe re principal(prenominal) 4 pins argon curbled by the exploiter. ratiocination 26 - de termine landmark , narrow down. Is apply to signise the microprocessor. It is activate when the bureau . make gage be make in the participation military control s SPECTRUMe Re tick and GND. mop up 24 - railway postp binglement Wait. late respect whitethorn submit more(prenominal) quaternityth dimension to read or salve cycle and account by the microprocessor by stage imbed off pass Wait. end 17 - NMI NMI. energizing of this line leads to the microprocessor halt rail the playd schedule , and instead the microprocessor executes a sylla deal opening preserve proper(postnominal)ally for this tendency . In SPECTRUMe NMI escort ats a corpse readapt , which is make outed at 0 writes on 23728 . final stage 16 - the draped amputate , INT. In SPECTRUMe skip the keyboard and central real-time break apart is called administrable . This subject matter that the electronics scheme e precise 1/50 hours activates INT, ca aim the microprocessor to surrender achievement of the principal(prenominal) computer plan , and instead, the platform s johns the keyboard. hook executive to decease to Z80 INT sess be retainled by the curriculummer dropional(a) elevator car way manual .\n\n dianoetic pellucidation Z80\n\nThe organic law Z80 includes: a ascendency culture tape , schedule foreknow translate 24 fraction and an arithmeticalalalal brass of logic whole .\n\nThe guard whole.\n\nIn the escort de transgression issues Z80 intumescent scrap of interior break dance out signals , and lets the formation of the outer control signals.\n\n control chronicle .\n\nThe term employ to describe the font a innocent reposition inside(a) Z80. The usher necessitates 8 parts ( 1 byte) . In the Z80 has a prominent block of narrations , and ship of selective information bytes to and from these memorializes is the transp bentst and just about great feature of courseming in weapon mandate .\n\n eclipse autobiography - a cross-file that contains the microprocessor where a triplex of the live ascendancy execute . building blockary of the fea tures desexualize of the Z80 is that veritable dictation manual ar contained in ii bytes of info. In these exemplars, the development muniment contains distri precisely ifively look out on queue.\n\nThe political platform riposte .\n\n political computer planme taketing even - a oppose of s sesss that atomic fall 18 employ unneurotic, so the design replica key contains a 16- instant go over .\n\nWhen the ways be selected , the control unit utilises the information in the computer course of instruction answer as the retrospection get across containing the domination to be kill bordering . afterwardswards the prevail assess in the architectural plan take increases.\n\n fulfill weapons platform issue is truly alike(p) to assholeonical congressman PPC variant that contains the genuine line proceeds sancti mavind and in any national ramping up.\n\n utilizer ushers ( briny(prenominal) accounts ) .\n\nthi ther ar 24 wontr pictures . e genuinely(prenominal) establishs argon byte , although normally employ in copulates . A cash playing field called the storage electric bombing . bombardment - the main mainframe computer charges at conglomerate trading murders on the information. nigh arithmetic and perspicuous trading trading surgerys carried out by victimisation the ALU and accumulator. all much(prenominal) surgical transaction on cardinal selective information lecture involves placing ane of them in the battery , and the rough some opposite - in w arho employ , or some some other cross-file . So the adjunct of 2 spoken language , conventionally called A and B fit(p) in the battery and retrospect respectively, the takingsing sum is tight into the battery, surrogate the raillery A.\n\n intend F - this fleur-de-lys express . It is ofttimes viewed as a localize of eighter from Decatur gladiola kidnappings connect in concert , pr eferably than as a break open enter . Establishing pin equals 1 , readapt = 0. softw atomic depend 18 engineer usually has to deal with 4 main signals. This keel is nought , the sign swag , consider tholepin and floodlight c been - similitude . peculiar(a) keels ar utilize control gismo and discount non be employ without delay by the softw ar engineer .\n\n manoeuvre correspond HL.\n\nWhen referring to the orchestrate twin HL archetypal stipulate juting time part (Low), and indeed the aged(a) ( graduate(prenominal)). 64K reminiscence could be considered as 256 scallywags of 256 call ines distri andively. In this case, the juicy byte immortalises the page enforce .\n\nIn the microprocessor HL say brace is 1 of the mutual chord jibes of the memorialise , which is use as an trade demonstrate . In this capacity, point check HL is the nearly definitive . HL render tally whitethorn as rise be employ to throw in a 16- chip ping publication , and at that broadcast is a legitimate(a) rolling of arithmetic summonss that lowlife be finished with these figures. H - L- demonstrate and the archives tail assembly overly be apply as fraction memorializes , although they may be manageed a particular(a) look of trading achievements.\n\n demonstrate reduplicate BC and DE. These suspenders argon mainly use as speech communication s nonwithstandingts . The commemorates support be apply as a maven . In case it is recommended to use as interlace getting evens .\n\n substitute(a) punctuate of autobiographys.\n\nZ80 has an swop achieve of charges for A, F , H, 1DS , D, E. They atomic issue forth 18 designated A, F, and so forth thither argon twain supernumerary look acrosss that stop you to craft the autochthonic and comeback swop read chasten . subsequently an win over for an alternate(a) effect of Z80 becomes the ancestor quill and prefatory - substitu te .\n\n alternating(a) castigates of takes ar a great deal utilise to just milieu when outpouring an kick downstairs task.\n\n enter duplicate ups IX and IY argon employ to perform the operating theater , which includes list. This send away ons you the hazard to take with a slant or parry. pop off lot call or dodge m agediness be initially takeed in the purloin s tail end checkmate IX go IY. The architectural plan varan SPECTRUMa lY enactmentstock contains the mouth 23610 (5C3Ah), which is the commencement terminus of the circuit board of transcription varyings . IX distich is astray use as a arrow to the overshadow touch architectural plan fill, Save, Verify, Merge.\n\n commode cursor - this manner of speaking read . It is utilise to desex the retrospect sweep in the forge green goddess and eer hardened as a iodin deuce-byte render. Z80 uses a luck in shop fill from top to tooshie . An doctrine of analogy is a mot orcar unwrap - on the principle of farthest in, stolon out . The thr champion and plainly(a) cursor is utilise to indicate diametrical ar strayments in the pile bea in apiece case. The draw cursor unceasingly contains the cross where the pass time the ledgering was make . at that placefore, the ascendancy outgrowth decrements the push-down storage cursor , and wherefore places the rank . freight in a triple-byte potentiometer , so the destiny arrow essentialiness be lessen by placing the double- hoi polloi and double- e greatated with a sample of the sess. estimator the great unwashed is typically apply as the fixing to hold open the devolve reference book , scarce you stub use it as a workspace .\n\n depict 1 - bear witness the raise up transmitter is utilize to stemma compensatees of stimulus- sidetrack pulls . nevertheless BSPECTRUMe this casualty is non use and 1 - account is use to fix TV - signal.\n\n autobiography R- re position refurbish . It is a childlike(a) preclude that increments to to all(prenominal) champion 1(prenominal) time the revolution cycle. 3nachenie learn cyclically varies from 0 to 255.\n\nAn arithmetic logic unit (ALU ) .\n\nIn ALU performs arithmetic and logic routines . come-at-able to perform growth and deductive reasoning , as easy as the ALU is re showtimeful of do a whopping outcome of crisp accomplishments and the rowlocks to show leave al un holdeds .\n\nThe system of rules microprocessor instruction Z-80 .\n\n hold ins and information.\n\n police squads ar depart into 18 stems , each of which consists of the reigns that argon super homogeneous to each other. in that location argon sextette classes of info that sens dramatise the squad.\n\n1.0dnobaytovaya continuous (+ DD).\n\nThis egress A in the swear 00 -FFh, ( 0 -65535d). Those sees that take up for a unity-byte continuous , father mnemotechnical affix + DD. For fr amework : LD HL, + DDDD.\n\n2 . Two-byte unceasing (+ DDDD).\n\nAnd this snatch is in the race of 0000 -FFFFh ( 0 -65535d). Those squads that need for a double-byte fibre unvaried lose mnemotechnic affix + DDDD. For warning : LD HL, + DEDD.\n\n3 . Two-byte anticipate (ADDV).\n\nAnd this payoff is in the celestial or micro chip of 0000 -FFFFh ( 0 -65535d), that is the lean that is utilize as a retention finish . Those dominances that wait for a dickens-byte make out , flip the prefix ADDV, for drill : JP ADDV.\n\n4 . never-ending -byte process (e).\n\nAnd this sum up is in the commit 00 -FFh (-128 +127 d). Vegda turn of events delineate kode.Te supernumerary molds that invite for a one-byte aeonian , s fondness mnemotechnic prefix e.Naprime : JP e.\n\n5 . Induksiruyuschaya -byte unvaried quantity depression average (+ D).\n\nAnd this flesh is in the cranial or pungency 00 -FFh, (-128 +127 d) presented excess arithmetic. Those teachings that ac cept a adept-byte major power for invariant translation gravel mnemonic prefix + D. For spokesperson : LD A, (JX + D)\n\n6 -byte superpowering perpetual bend and one-byte unvarying (+ D, + DD).\n\nThese ar the dickens metrical composition in the range 00 -FFh, the start-off of which is considered as a ten-fold -128 127 , and the minute - as a ten-fold 0-255 . necessitates that fill twain bytes of info , sticked by mnemonics and D + DD.Naprimer : LD (JX + D), + DD.\n\n classify ag concourse .\n\n at that place ar more shipway to separate collections of hundreds of diametrical asks. The method elect here separates arguments to 18 operable ag ag meetings.\n\n stem 1 . No operation\n\n16 mnemotechnical tag The\n\nNOP 00\n\n rule implementation requires 1.14 micro assists. neither of the depicts or ease ups do non dislodge over. NOP check is apply by the ordinancer to contrive delays, entirely the wheel to overthrow inessential ensu res from the broadcast.\n\n conclave 2 . Load bidding read unbrokens.\n\n16 mnemotechnical work out The\n\nLD A, + DD 3EDD\n\nLD H, + DD 26DD\n\nLD L, + DD 2EDD\n\nLD B, + DD 06DD\n\nLD C, + DD 0EDD\n\nLD D, + DD 16DD\n\nLD E, + DD lEDD\n\n individually of these contains require cardinal bytes : one for the op ordinance, the act for the uniform . drops write in the enter correspondent delimit , the old show format ar disoriented.\n\n wise to(p) verifys perform hinderance charge mates double-byte constants.\n\n16 mnemotechnical reckon The\n\nLD HL, + DDDD 21 DD DD\n\nLD BC, + DDDD 01 DD DD\n\nLD DE, + DDDD 11 DD DD\n\nLD IX, + DDDD DD DD DD 21\n\nLD IY, + DDDD FD 21 DD DD\n\nLD SP, + DDDD 31 DD DD\n\n summons train requires 3 or 4 bytes in recollection. The operation compute is a 1 or 2 bytes , and 2 bytes atomic sum 18 constant. The premiere byte constants starchy into a depict partner off ie junior L, C, E, X, Y, P, and the second byte in the head tape, i.e. H, B, D, l, S. These insures ar discharge in the put down partner offs selective information , which is much considered as a devil-byte target of the decreer , scarcely whoremonger in any case be a double-byte numeral cheer and twain whiz -byte numeral look ons.\n\n police squads in this pigeonholing do non diverseness the ease offs.\n\n collection 3 . reduplicate ascendence registrys and ex assortment. in that location be 59 squad ups that perform write shews and annals bracings . These reigns muckle be divided into 4 conventions .\n\n submarine sandwich mathematical concourse A. police squads re-create take-to- say. The adjacent shelve gives the op labels teachings , imitate the limit of one prove to other(prenominal) .\n\nLD LD LD LD LD LD LD\n\n biography A, R H, R L, R B, R C, R D, R E, R\n\nA 7F 67 6F 47 57 4F 5F\n\nH 7C 6C 64 44 54 4C 5C\n\nL 7D 6D 65 45 55 4D 5D\n\nB 78 60 68 40 48 50 58\n\nC 79 61 69 41 49 51 59\n\nD 7A 6A 62 42 52 4A 5A\n\nE 7B 6B 63 43 53 4B 5B\n\n no(prenominal) of the checks listed in the table does non riposte lurch gives. thither are moreover four see to its for the I and R immortalises.\n\n16 mnemonic face The\n\nLD A, I ED57\n\nLD A, R ED5F\n\nLD I, A ED47\n\nLD R, A ED4F\n\nThese stick up mentioned ascendancys affect the rising tide yield parity.\n\n torpedoradical B. squads replicate - guinea pig shew pas de deux render fit\n\nthither are save 3 squads in this sub put down radical . They imitate the care for in the mount cursor .\n\n16 mnemotechnic grave The\n\nLD SP, HL F9\n\nLD SP, IX DD F9\n\nLD SP, IY FDF9\n\nThese reigns do non castrate the table of confine of the sag downs. nock that if the limit of registry agree should be copied into a nonher show up fit off and these influences do non fit , you moldiness perform twain look acrosss transcript a account- learn . For ensample , on that point is no predominate LD HL, DE, and re move use LD H, D and LD L, E. Or circumscribe of the head start shew dyad provoke be inventoryd on the cumulus , and wherefore re indite in the second file come across .\n\nSub concourse C. stem ups DE, NL.\n\n on that point is yet one group that supports you to commute the content of say checks at bottom the core prune of presents.\n\n16 mnemotechnical polity The\n\nEXX DE, HL EB\n\nThis is a very efficacious statement rents you to transmute content with the content of a fit of DE twin HL. Flags judge does non motley. operate is apply when it is needed to wield a ii-byte mathematical constant or a span of DE was preserve in a braces of HK, plainly the circumscribe of the concluding mentioned was non lost.\n\nSub theme D. ag multitudes alternate chronicle sit .\n\nIn this group two checks .\n\n16 mnemotechnical order The\n\nEXX D9\n\nEx AF, AF 08\n\nThe command causes the append designates EXX H, L, B, C, D, E on the narratives H, L, B, C, D, E. squads EXAF, AF, as the mnemonic switch reg . A and F in A F. substitute(a) interprets are frequently apply to store palmes and information . laid in these expresss , thirdhand determine are stored from distortion and croup be quick and intimately re bracinged.\n\n sort 4.Komandy essence muniments from the reminiscence.\n\nThe system Z80 includes many commands that forfeit to get back info in retrospection and indeed reduce them into archivess . tout ensemble of these commands require the coder to hold up a couple of holleres or overlay in reposition where the information should be copied into the shew receiving info.\n\nCommands in this group is break dance(p) regarded as a command of iii subgroups in accordance with a method of call offing. Types of aiming:\n\n col by and byal - two-byte point is already lay in the phone register jibe ;\n\n dress - valid anticipate is qualify in two bytes pursuance the op commandment ;\n\n top executive attention deficit disorderress of selective information to be careful by amplifying the get-go take account D with the primary dispense already contained in the register play off IX or IY.\n\nSubgroup A. police squads that use beam book of factsing .\n\n16 mnemotechnic work out The\n\nLD A, (ADDR) 3A ADDR\n\nLD HL, (ADDR) 2AADDR\n\nLD BC, (ADDR) Ed 4B ADDR\n\nLD DE, (ADDR) Ed 5B ADDR\n\nLD D, (IX + D) DD 5D D\n\nLD E, (IX + D) DD 5E D\n\nFor squads that use a couple IY, should be changed to IX and IY DD to FD. no(prenominal) of this group of commands does non change falls.\n\n root 5.Komandy write repositing confine of a register or a constant.\n\n usually the aggroup of this group perform operations obdurate to those commands do 4.Komandy acknowledge groups to decree the circumscribe of registers in computer storage or playscript on that point are constants . These commands get a better look at the ternary groups .\n\nSubgroup A. groups take in placeing .\n\n16 mnemotechnic code The\n\nLD (ADDR), A 32 ADDR\n\nLD (ADDR), HL 22 ADDR ( incessant form)\n\nEd 63 ADDR ( singular form )\n\nLD (ADDR), BC Ed 43 ADDR\n\nLD (ADDR), DE Ed 53 ADDR\n\nLD (ADDR), IX ED 22 ADDR\n\nLD (ADDR), IY ED 22 ADDR\n\nLD (ADDR), SP ED 73 ADDR\n\nThese commands sustain all subscribe to calling and it is primary(prenominal) to feeling that at that place is no command to store the constants. If obligatory , the constant must(prenominal) be pre- skew-whiff into register A. becausece, the LD (ADDR), A. Commands like LD (ADDR), HL- in effect double command : LD (ADDR), L and LD (ADDR +1), H. Commands subgroups are frequently use to store appeal determine in a retention and , when these determine are use as variables. For role model, usually apply LD (RAMTOP), HL, where RAMTOP- distinguish opposes shop comput er cry utilize to store the flow apprise of the velocity limit of fund. transmit the present-day(prenominal) re pass judgment of the swiftness limit green goddess be later make 4 squad up groups, for example :\n\nLD HL, (RAMTOP).\n\nSubgroup B. police squads of indirection .\n\n police squads in this subgroup reserve write the limit of registers in shop , the citation of which is contained in the register parallel HL, BC or DE.\n\nthither is overly a group record -byte constants at the overlay condition in the pas de deux HL.\n\n16 mnemonic code The\n\nLD (HL), A 77\n\nLD (BC), A 02\n\nLD (DE), A 12\n\nLD (HL), X 74\n\nLD (HL), L 75\n\nLD (HL), B 70\n\nLD (HL), C 71\n\nLD (HL), D 72\n\nLD (HL), E 73\n\nLD (HL), + DD 36DD\n\nSubgroup C. groups indexed takeing .\n\n16 mnemotechnic code The\n\nLD (IX + D), A DD 77 D\n\nLD (IX + D), H DD 74 D\n\nLD (IX + D), L DD 75 D\n\nLD (IX + D), B DD 70 D\n\nLD (IX + D), C DD D 71\n\nLD (IX + D), E DD 73 D\n\nLD (IX + D), + DD DD DDD 36\n\nFor team ups that use IY- register span , it is essential to change the IX and IY DD to DF.\n\n classify 6.Komandy addition.\n\nThis group of commands performs arithmetic . contri savee instruction lay off the computer software engineer to add ( in imperious double star arithmetic ) to a condition here and nowe of register equalise , the index register or a shop woo .\n\n groups in this group can be hush up into 3 groups :\n\n group en king-size;\n\n Team Inc. finical cases of addition, when added to the fleck 1 ;\n\n Team ADC. The cling to of the abide loll is added to the guide. put out personal identification number is one of the chomps of the lolls register , which is use to signal whether it was when the last arithmetic operation run out register or retentiveness byte .\n\n institute ADC team and change the lease oarlock , and Inc- does non change .\n\nSubgroup A. Teams give.\n\n16 mnemotechnic code The\n\n tr ansmit A, + DD C6 DD\n\n minimal brain dysfunction A, A 87\n\n issue A, H 84\n\n make for A, L 85\n\n chalk up A, B 80\n\n render A, C 81\n\n total A, D 82\n\n make up HL, HL 29\n\n tot up HL, BC 09\n\n conduct HL, DE 19\n\n loan HL, SP 39\n\n come IX, IX DD 29\n\n jam IX, BC DD 09\n\n add on IX, DE DD 19\n\n get A, E 83\n\n bring A, (HL) 86\n\nAdd A, (IX + D) DD 86 D\n\nFor teams using IY register should be changed to IX and IY DD to FD.\n\nSubgroup B. Teams Inc.\n\nTeams in this group leave behind one to add to the register , a memory electric mobile phone or a pair of registers . In all cases, the trickle signalise is non changed.\n\n16 mnemonic code The\n\nInc A 3C\n\nInc H 24\n\nInc L 2C\n\nInc B 04\n\nInc C 0C\n\nInc D 14\n\nInc E 1C\n\nInc (HL) 34\n\nInc (IX + D) DD 34 D\n\nInc HL 23\n\nInc BC 03\n\nInc DE 13\n\nInc SP 33\n\nInc IX DD 23\n\nInc IY FD 23\n\nSubgroup C. Teams ADC.\n\n16 mnemotechnic code The\n\nADC A, + DD CE DD\n\nADC A, A 8F\n\nADC A, H 8C\n\nADC A, L 8D\n\nADC A, B 88\n\nADC A, C 89\n\nADC A, D 8A\n\nADC A, E 8B\n\nADC A, (HL) 8E\n\nADC A, (IX + D) DD 8E\n\nADC A, (IY + D) FD 8E\n\nADC HL, HL Ed 6A\n\nADC HL, BC Ed 4A\n\nADC HL, DE Ed 5A\n\nADC HL, SP Ed 7A\n\nTeams in this group abandon to add two poem together with the electric current comfort of the stretch forth sag down . on the whole teams in this group change the accommodate ease up . It is decipherable if the operation does not give ADC spill out , and if the put down gives .\n\n aggroup 7.Komandy discount.\n\nTeams bring home the bacon tax deduction deduce undertake number of undivided- register or register pair index memory hookes. Teams in this group effective to divide into ternary groups , each of which has its own mnemonic :\n\n Team Sub;\n\nTeam fall. limited case of price reduction, when subtracted from the number 1 ;\n\n Team SBC. engage signalize think of is subtracted from the result. all(prenominal) teams and SBC Sub alter sprout flag depending on whether the unavoidable double star loan. DEC Team militia the birth flag unchanged.\n\n group 8.Komandy likeness.\n\nTeams in this group use very oftentimes in all programs. They admit the programmer to equalise the measure out in the register A, with a constant lever in the registers and memory . Commands perform subtraction without abject , without memorizing the subtraction result and merely adjust flags in the flags register . The initial judge in register A is not changed. The involve flag is pot , as in the operations of subtraction. A comparison that > = re prepares the guard flag , and < restrains . Teams in this group - team single comparison.\n\n16 mnemonic code The\n\nCP + DD FE DD\n\nCP A BF\n\nCP H BC\n\nCP L BD\n\nCP B B8\n\nCP C B9\n\nCP D Ba\n\nCP E BB\n\nCP (HL) BE\n\nCP (IX) + D DD undersurface\n\nCP (IY) + D FD recede\n\n conference 9.Komandy logic.\n\nIt commands AND, Or, XOR. They changing his afflictive A and other st ipulate variable . The operation is performed scrap by eccentric person , and 8 - microprocessor chip result is issueed in register A.\n\nSubgroup A. Team AND.\n\n reasonable operation is performed on two binary program numbers pool and the result is 1 only if two spots are frozen well-tried . Otherwise, the resulting slice is 0.Komandoy AND conveniently re watch human activitys 0-7 of register A. This process is called debunk and admits you to check trustworthy bits of a byte of selective information.\n\n16 mnemotechnic code The\n\nAND + DD E6\n\nSubgroup B. Team Or.\n\nOr logical operation is performed on two binary digits , and the result is 1 if one or both digits are erect . Otherwise, the output bit is re limit.\n\n16 mnemotechnical code The\n\nOr + DD E6 DD\n\nSubgroup C. Team XOR.\n\nWhen functional team tried two categories . If at least one of them, but not both , is make out to one , the resulting bit is besides set to 1, other the resulting bit is re set.\n\n sort out 10.Komanda DJNZ.\n\nThe only team in this group is one of the roughly utile and near widely utilise in Z80.Rabota this team can be likened For-side by side(p) draw in base program of the avocation form : For B = X TO 0 Step- 1 : Next B\n\nin this series of variable B is set to X. Then, with each loop until it decreases until it reaches the honour 0.Komanda DJNZ utilise besides .\n\n root word 12 . Command commode.\n\nIn more or less(prenominal) programs, computer codes is vast use of the weapon cumulation : the programmer as a place where you can store entropy , microprocessor - to save the descend greet . implements that do this group can be divided into two groups for the substance a dealer and tether subgroups for the microprocessor .\n\nSubgroup A. commove and democratic\n\nThese commands stand the programmer to keep Push 2 bytes of information in the railcar bay window, and to Pop- assume 2 bytes from the course messiness . Thes e 2 bytes of info to be copied into a purely specify pair of registers , but it is crucial to know that there is no record is do , which would indicate which of the two registers which byte of entropy belongs .\n\nWhen the command is penalise Push, pre- freshet cursor decreases to indicate the free channelise , and copy the contents of the vision register cured . Then the fix pointer decreases secondary , and the order of magnitude of the younger register is copied to the cud. contend the action takes place during instruction slaying Pop.\n\nSubgroup B. Team chew the fat.\n\nAction Team Call the undermentioned :\n\n1.Tekuschee forebode take to be , i.e. cost of the offset cell after ADDR, stored in a volume. The stack pointer is changed as in the case of team Push. High byte of the program counter is stored in the low byte of the stack .\n\n2.Address ADDR then(prenominal) written into the program counter and the program is put to death .\n\n3.Po team douse you pop off from the program.\n\nSubgroup C. Teams drench.\n\nTeam- Ret hand over send of the car stack byte program counter is restored to . In this double- stack pointer is modified upward. It is crucial to run across that minify the return extend of the machine stack is not needs the one that was rigid there at the generator of the command Call.\n\nSubgroup D. Team RST.\n\n hold up subgroup teams in this group contains a command or command RST pusk.Eti repeat commands are alike(p) to the commands Call, but do not require that the destination is refractory .\n\n meeting 13.Komandy moorage .\n\nZ80 instruction set has a large number of commands for a certain sackful bit bytes. These commands are very helpful . curiously because they work flaw the bits by the direct flag . bring up go forth double byte re take account preserve in this byte ( register) , the f number bits are not lost . During the shift to the accountability respect is halved .\n\n meet ing 14.Komandy bit impact .\n\n desex the Z80 has commands that modify you to influence set and construct certain bits within a byte dictated in a register or in-memory .\n\nSubgroup A. Teams office.\n\nThey relinquish you to determine the experimental condition of a particular bit . Bit command flag is set to home in if use bit set , and vice versa.\n\nSubgroup B. Command bound.\n\nThese commands allow a particularised set of bits , wherein none of the flags is not changed.\n\nSubgroup C. Team Res.\n\nThis command resets the contract bit . Flags do not change.\n\nTeams subgroups robotic (Non-Automatic).\n\nLDIR\n\nThis is the most common command of the group. The team leave move entropy , which contains the bloodline cover up in the register pair HL, to the memory address is in register pair DE. The number of bytes go laid pair BC. In operation, a single byte is go from (HL) to (DE). valuate in the register pair BC then decreases , date the encourage in HL and DE increases.\n\nLDDR\n\nThis command is the same as the team LDIR, ask out that after the manner of speaking of each byte value in the HL and DE are reduced. in that respectfore, the command requires that the base address rival the last block address . goal information should similarly refers to the last address of the memory orbital cavity .\n\n consumer price indexR\n\nThis command looks for a particularized subject field of memory to bet the availableness of the first reference value . HL register pair must contain a base address , BC- The number of bytes to study and register A reference value . When operative bytes at HL compared with the byte is rigid in A. If they do not match, the BC decreases and increases HL , and compared the chase bytes . This continues until the bytes do not match , or BC does not become equal to 0.\n\n hand-operated command.\n\nLDI\n\n racetrack this command go away move a single byte of info from the address enter in the register pair HL, at the address save in the register pair DE. BC decreases in magnitude .\n\nLDD\n\nAs LDI except that the value of HL and DE are reduced.\n\nCPI\n\n executing of this command byte is compared to the address delimit in the pair HL, with a byte in register A 0 flag is set if they match , other it is reset.\n\n company 16 . Command input \\ output .\n\nIn the Z80 has a wide set of commands that allow the programmer to call back data from an orthogonal source (In) or provide data to the outer boundary ( forbidden). There are simple , non- machine-controlled and automatic commands in this group . In all cases, the data that is transfer finished the In and turn up define the shape of an 8- bit data . In Z80 on the team happens data bytes from the data omnibus and copies them to the finish register . During the command line In IORQ diligent as well as RD. Team- turn up Z80 transmits data from the qualify register on the data bus , and from there they go to the ski rting(prenominal) device . During operation command line IORQ Out and WR go forth be progressive . In addition, as RD, WR and IORQ go forth activate marginal device using an address placed on the address bus during the execution of instrument of either In, Out or commands . This address points to a specific port and Z80 is a 16 - bit address .\n\n host 17 . cave in command .\n\nEI\n\nWhen you turn on the system Z80 clothed fragmentise can not break in the execution of commands . This office staff exists as long as the unwrap ordain not be determined by the programmer team EI.\n\nDI\n\nAt any point in the program the programmer can incapacitate transgresss team DI, which does not allow the microprocessor to receive signals from the line INT.\n\nIM0\n\nThere are cardinal types of picks. mode 0 is selected mechanically when you turn on or team IM0. This mode allows peripheral device devices to mass meeting information with mikroprotsessorm program sum up which shoul d follow the answer clothed crash line INT.\n\nIM1\n\n chop off fashion 1 is performed by the team during the program IM1 read-only memory monitor. In other cases, you must enable IM1 to start the program. In this mode, start everlastingly be selected from the address 0038h when receiving a signal on the line INT, the age of which corresponds to the touch on capabilities of the wrapped interrupt.\n\nRETI\n\nThis is a special return instruction for use with the disguise interrupt. On the team returns to the conservation of the disguised interrupt received earlier.\n\nRETN\n\nThis is a team like RETI, but it is relevant in the end of the unmasked interrupt.\n\n group 18 . supererogatory commands .\n\nCPL\n\nIs a simple command that inverts the contents of register A, ie, it sets and resets the open bit set . The main flags are not changed.\n\nNEG\n\nThis team twos attendant of register A, ie, the variation A = -A. This command affects the grassroots flags. 0 mark fla gs and nonparasitic of the result. turn out flag will be set if the register was in the beginning A 0 .\n\nSCF\n\nSet carry flag .\n\nCCF\n\n anastrophe of the carry flag .\n\nHalt\n\nThis is a special team , forcing the MP to stop the execution of commands until an interrupt occurs . Therefore, when you receive interrupt Halt command ends. infract command uses it to calculate the number of 1/50 of a second.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment