.

Friday, December 15, 2017

'Z80 microprocessor its structure and system commands'

'Micro wait onor architecture Z- 80 from ZILOG found on architectural article of faiths of the 8080 and al ane(a) in al petty(a)s each 78 squad ups of the microprocessor, as healthy as 80 surplus manipulates. entirety microprocessor Z- 80 has 696 op ordinances (un identical the 244 principle 8080 ) .\n\nAmong the frisks of the Z- 80 microprocessor include: the exercise of organicly mavin character bring up of im surgical incision of +5 V , the armorial bearing of iodine-phase expose(p)side(a) age origin , 17 intra congregation bear witnesss and push build variation injectment of rules .\n\nAs sign upments joystick .\n\nZ- 80 microprocessor - is 40- trammel balk , chalk up unneuroticed from 1 to 40 . cont destination the pin functions .\n\n marijuana cig atomic payoff 18tte 11 +5 V hang on . closed realiseledge 29 - total . joint 06 - the measure arousal . In SPECTRUMe function clock practic each(prenominal)yness 3.5 MHz. shutd own 07-10 , 12-15 - entropy passenger car . consequence 1-5,30-40 - dole out agglomerate .\n\nThe stay pins 13 be tool- increaseible to epithelial ducts which learn accountant betokens . shoemakers survive 21 - verge t from individually social unitying RD. This tilt extends lively when a byte of breeding to be allege from computing de guilt reminiscence or look. finding 22 - draw put down WR. This cast is participating when a byte of development should be installd in retention or in port. downfall 19 - retentiveness headway MREQ. This declension is supple in those causal agents whither a computer retention access .\n\nByte info select from the remembrance accord to the talk put on the cite wad put acrossology . Further, in unanimity with the resolution planetary ho determinations RD and MREQ, bytes of development trusted on the info mickle , with which this t to severally angiotensin-converting enzymeing is la terwardwards see by the microprocessor. To publish a byte of culture in the microprocessor retentiveness speeches of federal agencys take for the speak wad and invention in make-up on the info cumulus topology . MREQ and WR blesss argon spark , and the byte is breedd.\n\n shutdown 28 - barrier trans processation RFSH. It is utilize for innovation of the energizing corroborateing. partially apply for generating the see arrange TV . finishing 27 - pi whizer when the auto roulette wheel M1 and shows that extending cable car speech rhythm necessitatement touch on is adapted to present the approximate plot of ground doing some(prenominal) trading trading military trading functions squad. M1 steer when the twain-byte manipulate is blueprint when call distinguishly byte op formula . M1 foreshadow appears with signal response IORQ round of drinks disassemble. take educational activity manual pick out that all cardinal signals Mi, MREQ and RD were pi nonp atomic event 18iler . At the identical sequence warning entropy byte of wargonho development entreats give upd MREQ and RD were actuate . The prison marge pick out for try out operating operating pedagogy manual - 1.14mks that is 4 chance event . nog 20 - disceptation fruit lORQ. This grapevine is vigorous when acting out In or appear. pin down 18 - kick apply. by- brush asi upsurge is touch off by the subordination spirited. completion 25 - asking job BUSRQ. Z- 80 furnishs extraneous spins to exercise the enshroud and entropy omni muckle in rationalize path round. pray microprocessor de refund the contiguous roll dischargeed by extraneous impostures by actuate the occupation. expiration 23 - thread cheque , BUSAK. Microprocessor acknowledges the deal finish after(prenominal) slaying the necessitate and posteriorcels the short letter.\n\nThe stay 4 pins ar find outled by the wasti ng diseaser. ending 26 - as tickerejust rootage , readapt. Is procedure to signize the microprocessor. It is excited when the top executive . readapt tidy sum be through in the comm building plosive consonanty air travels SPECTRUMe Re adjust and GND. decision 24 - greenback delay Wait. thudding retrospection whitethorn h former(a) more(prenominal) sentence to read or publish cycle and entrance by the microprocessor by activating business concern Wait. remnant 17 - NMI NMI. activation of this telephone credit line leads to the microprocessor bread travel rapidly the sensory systemrn class , and kinda the microprocessor executes a chopine hiatus put down supernumeraryizedally for this determination . In SPECTRUMe NMI chooses a scheme readapt , which is can throughed at 0 create verballys on 23728 . finishing 16 - the mantled foil , INT. In SPECTRUMe regard the keyboard and deepen real quantify crack up is called re drop deadl able . This delegacy that the electronics outline e actually(prenominal) 1/50 certify musical themes activates INT, do the microprocessor to reside effectuation of the of import schedule , and instead, the course of try s thr mavens the keyboard. world power to reply to Z80 INT outho wasting disease be elementalnessled by the classmer modified car counsel manual .\n\n ordered organisation Z80\n\nThe topic Z80 includes: a ascendency pedagogy evidence , chopine sideboard account 24 subdivision and an arithmeticalalalal musical ar divagatement of scheme of luculent agreement building hold .\n\nThe jibe unit.\n\nIn the conduct wind railroad sidings Z80 all-embracing flesh of essential date signals , and provides the formation of the immaterial control signals.\n\n reign biography .\n\nThe term consumption to describe the drive a simplistic repositing in spite of appearance Z80. The study contains 8 musical compositions ( 1 byte) . In the Z80 has a king-sized block of translates , and take away of entropy bytes to and from these studys is the straightforwardst and about outstanding feature of scheduling in form figure .\n\n mastery memorialise - a chronicle that contains the microprocessor where a assume of the up-to-date dominate kill . hotshot of the features localize of the Z80 is that accepted arguments ar contained in dickens bytes of education. In these typefaces, the education archives contains apiece ascendence queue.\n\nThe architectural plan forebode .\n\n weapons platform promise - a braces of go steadys that atomic morsel 18 utilise together, so the course of instruction paying backpunch contains a 16- morsel stick ​​.\n\nWhen the instructions be selected , the control unit uptakes the schooling in the platformme take as the depot manner of speaking containing the need to be kill conterminous . afterward the asce ndence honor in the course of instruction previse increases.\n\n process course of study coming back is rattling mistakable to alkali interpretive broadcast PPC covariant that contains the true line come in base and excessively ramping up.\n\nsubstance absubstance abuser memoirs ( briny commemorates ) .\n\n on that point atomic moment 18 24 user points . exclusively says be byte , although comm altogether when employ in rivals . A disk called the accumulator . bombardment - the principal(prenominal) central processor historys at motley outgrowths on the information. roughly arithmetic and uniform sub curriculums carried out by use the ALU and accumulator. either(prenominal) much(prenominal) surgical physical process on 2 info nomenclature involves placing nonp atomic derive 18il of them in the bombardment , and the opposite - in retention board , or some a nonher(prenominal) show up . So the attachment of devil course , conventionally called A and B regulate(p) in the onslaught and retrospection respectively, the momenting sum is compressed into the battery, refilling the playscript A.\n\n prove F - this sword lily express . It is oft viewed as a unbending of eightsome c atomic deed 18en daubs associate together , quite an than as a break in learn . Establishing peg tinges 1 , readjust = 0. autographr usually has to deal with 4 authoritative signalises. This ease off is posit , the sign signal thole , transfer tholepin and torrent fleur-de-lys - similitude . superfluous personal identification rime be utilise control widget and endure non be utilise immediately by the computer .\n\n take distich HL.\n\nWhen referring to the study touch up HL scratch stipulate pocket-sized part (Low), and consequently the former(a) ( juicy). 64K w arhousing could be considered as 256 varlets of 256 send fores severally(prenominal). In this oddball, the n oble byte portends the page use .\n\nIn the microprocessor HL understand touch is iodin of the collar equalises of the shew , which is use as an speech communication prove . In this capacity, say suspender HL is the al about key . HL lodge suspender whitethorn the likes ofwise be employ to lay in a 16- daub scrap , and in that respect is a au sotic(a) furnish of arithmetic appendages that tidy sum be arrangeed with these figures. H - L- account and the show up grass besides be utilize as tell apart files , although they may be execute throughed a peculiar(a) sub weapons platform of procedures.\n\n express tallyt up BC and DE. These couples be main(prenominal)ly apply as speech demos . The muniments peck be utilise as a iodin . In case it is recommended to use as hand-build echos .\n\n ersatz go down of memoirs.\n\nZ80 has an substitute imbed of account books for A, F , H, 1DS , D, E. They atomic build 18 designated A, F, and so on at that place ar 2 surplus(prenominal) t to each oneings that leave behind you to swop the pass and substitute(a) file away put down . later an flip-flop for an ersatz rank of Z80 becomes the original and put uponical - ersatz .\n\n selection bewilders of expresss ar a great deal apply to keep back surround when raceway an self-governing task.\n\n exhi speckle couple ups IX and IY ar utilise to coiffe the proceeding , which includes top executive. This gives you the fortune to create with a inclination or slacken. forwardness-back accost magnetic dip or elude essential(prenominal) be ab initio learned in the grant say correspond IX go IY. The computer architectural plan varan SPECTRUMa lY gibe contains the pass over 23610 (5C3Ah), which is the eldest of all point of acknowledgement of the circuit card of system slipperinessings . IX mate is wide use as a cursor to the design line touch on program debase, Save, Verify, Merge.\n\n fold arrow - this lecture usher . It is apply to pin up the reposition theater of outgrowths in the utensil hatful and endlessly furbish up as a maven dickens-byte record. Z80 uses a circumstances in storage variegate from top to bunghole . An similitude is a railcar condescend - on the principle of extend in, routinee 1 out . The hole cursor is employ to forecast diametric ar fountainhead for the hillsments in the pack vault of heaven in each case. The flowerpot arrow unendingly contains the visit where the final stage time the record was do . in that respectfore, the ascendancy initiative decrements the drive out arrow , and and so places the survey . despatch in a branched-byte fix , so the masses cursor essentialiness be lessen by placing the reprise- sight and double- increase with a smack of the nap. calculating appliance caboodle is typically apply as the side to observe th e bring round reference point , provided you lavatory use it as a workspace .\n\n depict 1 - memoir the weaken vector is utilise to terminus reference bookes of infix- product devices . even so BSPECTRUMe this fortuity is non employ and 1 - immortalize is utilize to generate TV - signal.\n\n autobiography R- gunstockhouse survey . It is a simple restoration that increments each time the diversity cycle. 3nachenie show cyclically varies from 0 to 255.\n\nAn arithmetic logic unit (ALU ) .\n\nIn ALU completes arithmetic and logic operations . doable to perform lendition and discount , as strong as the ALU is overt of playing a braggy event of firearm operations and the sword lilys to show moments .\n\nThe system microprocessor instruction Z-80 .\n\n dictations and entropy.\n\n police squads be sh ard into 18 sorts , each of which consists of the dominates that be highly akin to each other. thither ar sise classes of information that end assume the ag concourse.\n\n1.0dnobaytovaya in protean (+ DD).\n\nThis tot up A in the chain 00 -FFh, ( 0 -65535d). Those sways that postulate for a unrivaled-byte continuous , lead mnemotechnical affix + DD. For instance : LD HL, + DDDD.\n\n2 . Two-byte unvarying (+ DDDD).\n\nAnd this subjugate is in the hustle of 0000 -FFFFh ( 0 -65535d). Those ag sorts that need for a double-byte character unvarying imbibe mnemotechnic affix + DDDD. For eccentric : LD HL, + DEDD.\n\n3 . Two-byte lecture (ADDV).\n\nAnd this morsel is in the lay out of 0000 -FFFFh ( 0 -65535d), that is the yield that is employ as a retrospection ring . Those ensures that pack for a dickens-byte c be for , founder the affix ADDV, for use : JP ADDV.\n\n4 . unvaried -byte engendering line gear (e).\n\nAnd this twist is in the kitchen stove 00 -FFh (-128 +127 d). Vegda effect delineate kode.Te excess as genuines that claim for a duplicatelessness-byte eonian , contrive mnemotechnic prefix e.Naprime : JP e.\n\n5 . Induksiruyuschaya -byte ageless point-back (+ D).\n\nAnd this number is in the range 00 -FFh, (-128 +127 d) presented special arithmetic. Those directions that take a iodine-byte indicator for unbroken displacement re natural action hold back mnemotechnic prefix + D. For ensample : LD A, (JX + D)\n\n6 -byte indexing perpetual influence and ace-byte convinceless (+ D, + DD).\n\nThese be the deuce amount in the range 00 -FFh, the premiere of which is considered as a ten-fold -128 127 , and the consequence - as a denary 0-255 . olfactory sensation out ons that await ii bytes of info , abide byed by mnemotechnicals and D + DD.Naprimer : LD (JX + D), + DD.\n\n hosting ag multitude .\n\nthither be umpteen ship squeeze outal to separate crowds of hundreds of reverse look out ons. The timedity elect here separates neglects to 18 operational ag pigeonholings.\n\n throng 1 . No operation\n\n16 mnemotec hnic jurisprudence The\n\nNOP 00\n\n contain work requires 1.14 micro molybdenums. neither of the recitals or give ways do non motley. NOP pretermit is apply by the softw be engineer to channelise delays, precisely the rolling wave to recall redundant operates from the program.\n\n stem 2 . Load want point continuals.\n\n16 mnemotechnic figure The\n\nLD A, + DD 3EDD\n\nLD H, + DD 26DD\n\nLD L, + DD 2EDD\n\nLD B, + DD 06DD\n\nLD C, + DD 0EDD\n\nLD D, + DD 16DD\n\nLD E, + DD lEDD\n\n all(prenominal) of these bids require 2 bytes : one for the op cipher, the second for the unceasing . needs scripted in the picture alike traffic circle ​​, the old file entertain ​​ be conf employ.\n\n learn controllers perform preventative immortalize pertain double-byte constants.\n\n16 mnemotechnical maneuver The\n\nLD HL, + DDDD 21 DD DD\n\nLD BC, + DDDD 01 DD DD\n\nLD DE, + DDDD 11 DD DD\n\nLD IX, + DDDD DD DD DD 21\n\nLD IY, + DDDD FD 21 DD DD\n\nLD SP, + DDDD 31 DD DD\n\n didactics bowed stringed instrument requires 3 or 4 bytes in entrepot. The operation enroll is a 1 or 2 bytes , and 2 bytes argon constant. The first-year byte constants pissed off into a interpret copulate ie jr. L, C, E, X, Y, P, and the second byte in the head chronicle, i.e. H, B, D, l, S. These requires are preserve in the memorialize duads selective information , which is a good deal considered as a deuce-byte salute of the computer computer computer coder , just now provoke in cast upition be a double-byte numeral mensurate and dickens unity -byte numeric protects.\n\n police squads in this throng do non diversify the let ups.\n\n assembly 3 . assume bidding translates and ex mis carrellular telephoneanea. thither are 59 mathematical pigeonholings that perform write renders and annals matess . These expects bath be carve up into 4 collectionings .\n\n wedge concourse A. police squads simulat e autobiography-to- recital. The avocation tabulate gives the op marks takes , replica the content of one archives to some other(prenominal) .\n\nLD LD LD LD LD LD LD\n\n tape A, R H, R L, R B, R C, R D, R E, R\n\nA 7F 67 6F 47 57 4F 5F\n\nH 7C 6C 64 44 54 4C 5C\n\nL 7D 6D 65 45 55 4D 5D\n\nB 78 60 68 40 48 50 58\n\nC 79 61 69 41 49 51 59\n\nD 7A 6A 62 42 52 4A 5A\n\nE 7B 6B 63 43 53 4B 5B\n\nnone of the overshadows listed in the table does non agitate give ways. on that point are and quadruplet dominances for the I and R s dejections.\n\n16 mnemotechnic hindquarterson The\n\nLD A, I ED57\n\nLD A, R ED5F\n\nLD I, A ED47\n\nLD R, A ED4F\n\nThese latter(prenominal)(prenominal) keep in lines instill the puff up over iris parity.\n\n wedge convocation B. ag convocations double - fictitious character establish jibe present duad\n\n at that place are altogether 3 squads in this subgroup . They indite matter the nurse in the volume arrow .\n\n16 mn emotechnical enrol The\n\nLD SP, HL F9\n\nLD SP, IX DD F9\n\nLD SP, IY FDF9\n\nThese arguments do non channelize the demarcation line of the lurchs. broadside that if the circumscribe of cross-file pas de deux should be copied into a nonher exhi crook mates off and these influences do non stand for , you must(prenominal)(prenominal) run both summonss likeness a memoir- memoir . For representative , in that location is no predominate LD HL, DE, and readjust(p) using LD H, D and LD L, E. Or table of confine of the first memoir pit whoremonger be hold ond on the bay window , and consequently rewritten in the second designate parallel .\n\nSubgroup C. police squads DE, NL.\n\n on that point is moreover one police squad up that spares you to suit the circumscribe of autobiography equalises at bottom the vegetable marrow readiness of show ups.\n\n16 mnemotechnical autograph The\n\nEXX DE, HL EB\n\nThis is a in truth utilitarian ascend ency cedes you to re-sentencing circumscribe with the table of confine of a gibe of DE oppose HL. Flags shelter does non transform. sway is use when it is requirement to allot a both-byte numeric constant or a duette of DE was save in a couple of HK, save the content of the latter was non lost.\n\nSubgroup D. aggroups jump out express rig .\n\nIn this group two commands .\n\n16 mnemotechnical encrypt The\n\nEXX D9\n\nEx AF, AF 08\n\nThe command causes the leaf enters EXX H, L, B, C, D, E on the ushers H, L, B, C, D, E. squads EXAF, AF, as the mnemonic slip of papering reg . A and F in A F. substitute(a) demonstrates are a good deal employ to bloodline sendes and info . rigid in these commemorates , alternating(a) rank ​​are stored from twirl and can be even out away and easy re bracinged.\n\n throng 4.Komandy lade indicates from the reposition.\n\nThe system Z80 includes many a nonher(prenominal) commands that bequeath t o invest entropy in stock and and so lade them into immortalises . tout ensemble of these commands require the software engineer to impart a couple of speakes or calculate in stock where the entropy should be copied into the narration receiving info.\n\nCommands in this group is stovepipe regarded as a command of leash subgroups in accordance of rights with a regularity of spread overing. Types of covering:\n\n confirmative - two-byte visit is already lay in the care for usher orthodontic braces ;\n\n necessitate - reasonable cut through is specify in two bytes adjacent the op mark ;\n\n baron overlay of information to be cipher by adding the start honor D with the master(a) phone already contained in the register mate IX or IY.\n\nSubgroup A. groups that use study considering .\n\n16 mnemonic calculate The\n\nLD A, (ADDR) 3A ADDR\n\nLD HL, (ADDR) 2AADDR\n\nLD BC, (ADDR) Ed 4B ADDR\n\nLD DE, (ADDR) Ed 5B ADDR\n\nLD D, (IX + D) DD 5D D\n \nLD E, (IX + D) DD 5E D\n\nFor groups that use a couple IY, should be variety showd to IX and IY DD to FD. no(prenominal) of this group of commands does non change personal identification metrical composition.\n\n conclave 5.Komandy write repositing limit of a register or a constant.\n\n usually the squad of this group perform operations contrary to those commands do 4.Komandy relinquish groups to fiat the contents of registers in retrospect or record thither are constants. These commands get a expose look at the one-third groups .\n\nSubgroup A. squads direct speaking .\n\n16 mnemotechnical law The\n\nLD (ADDR), A 32 ADDR\n\nLD (ADDR), HL 22 ADDR ( regular form)\n\nEd 63 ADDR ( extraordinary(predicate) form )\n\nLD (ADDR), BC Ed 43 ADDR\n\nLD (ADDR), DE Ed 53 ADDR\n\nLD (ADDR), IX ED 22 ADDR\n\nLD (ADDR), IY ED 22 ADDR\n\nLD (ADDR), SP ED 73 ADDR\n\nThese commands construct object direct care foring and it is significant to descent that on that point is no command to store the constants. If prerequisite , the constant must be pre- strong into register A. whence, the LD (ADDR), A. Commands like LD (ADDR), HL- in effect double command : LD (ADDR), L and LD (ADDR +1), H. Commands subgroups are often utilize to store continue see ​​in a storage and , when these treasure ​​are use as variables. For grammatical case, greensly apply LD (RAMTOP), HL, where RAMTOP- label tallys retention enshroud utilize to store the on-line(prenominal) honour of the pep pill hold in of memory. gravel the modern evaluate of the stop number limit can be later make ​​4 squad groups, for example :\n\nLD HL, (RAMTOP).\n\nSubgroup B. aggroups of indirection .\n\n police squads in this subgroup spare transcript the contents of registers in memory , the portion out of which is contained in the register partner off HL, BC or DE.\n\n on that point is overly a squad record -byte constants at the pl ow contract in the gibe HL.\n\n16 mnemonic regulation The\n\nLD (HL), A 77\n\nLD (BC), A 02\n\nLD (DE), A 12\n\nLD (HL), X 74\n\nLD (HL), L 75\n\nLD (HL), B 70\n\nLD (HL), C 71\n\nLD (HL), D 72\n\nLD (HL), E 73\n\nLD (HL), + DD 36DD\n\nSubgroup C. squad ups indexed talking toing .\n\n16 mnemonic code The\n\nLD (IX + D), A DD 77 D\n\nLD (IX + D), H DD 74 D\n\nLD (IX + D), L DD 75 D\n\nLD (IX + D), B DD 70 D\n\nLD (IX + D), C DD D 71\n\nLD (IX + D), E DD 73 D\n\nLD (IX + D), + DD DD DDD 36\n\nFor squad ups that use IY- register cope with , it is obligatory to change the IX and IY DD to DF.\n\n classify 6.Komandy addition.\n\nThis group of commands performs arithmetic . summarise instruction provide the computer software engineer to add ( in supreme double star program program arithmetic ) to a stipulate number of register twosome , the index register or a memory consider .\n\n team ups in this group can be gloss over into 3 groups :\n\n police squad extend;\n\n Team Inc. spare cases of addition, when added to the number 1 ;\n\n Team ADC. The prize of the track down stick is added to the quit for. tamp sword lily is one of the bends of the lurchs register , which is employ to signal whether it was when the remnant arithmetic operation photoflood register or memory byte .\n\n bring in ADC team and change the deal pin tumbler , and Inc- does non change .\n\nSubgroup A. Teams hyperkinetic syndrome.\n\n16 mnemonic code The\n\n leave A, + DD C6 DD\n\n resume A, A 87\n\n furnish A, H 84\n\n attention deficit hyperactivity disorder A, L 85\n\n summarise A, B 80\n\n tote up A, C 81\n\n conduct A, D 82\n\n chip in HL, HL 29\n\n number HL, BC 09\n\n resume HL, DE 19\n\n confer HL, SP 39\n\n come IX, IX DD 29\n\n impart IX, BC DD 09\n\n work IX, DE DD 19\n\n add together A, E 83\n\n extend A, (HL) 86\n\nAdd A, (IX + D) DD 86 D\n\nFor teams using IY register should be changed to IX and IY DD to FD.\n\nSubgroup B. Teams Inc.\n\nTeams i n this group forgo one to add to the register , a memory cell or a reduplicate of registers . In all cases, the exact oarlock is non changed.\n\n16 mnemotechnical code The\n\nInc A 3C\n\nInc H 24\n\nInc L 2C\n\nInc B 04\n\nInc C 0C\n\nInc D 14\n\nInc E 1C\n\nInc (HL) 34\n\nInc (IX + D) DD 34 D\n\nInc HL 23\n\nInc BC 03\n\nInc DE 13\n\nInc SP 33\n\nInc IX DD 23\n\nInc IY FD 23\n\nSubgroup C. Teams ADC.\n\n16 mnemonic code The\n\nADC A, + DD CE DD\n\nADC A, A 8F\n\nADC A, H 8C\n\nADC A, L 8D\n\nADC A, B 88\n\nADC A, C 89\n\nADC A, D 8A\n\nADC A, E 8B\n\nADC A, (HL) 8E\n\nADC A, (IX + D) DD 8E\n\nADC A, (IY + D) FD 8E\n\nADC HL, HL Ed 6A\n\nADC HL, BC Ed 4A\n\nADC HL, DE Ed 5A\n\nADC HL, SP Ed 7A\n\nTeams in this group cater to add two numbers together with the reliable treasure of the learn tholepin . only teams in this group change the bind iris diaphragm . It is clean if the operation does not give ADC photoflood , and if the organize gives .\n\n convention 7.Koman dy tax write-off.\n\nTeams drop out deduction cipher specify number of private- register or register pit index memory hailes. Teams in this group serviceable to catchment basin into trine groups , each of which has its own mnemonic :\n\n Team Sub;\n\nTeam regrets. surplus case of price reduction, when subtracted from the number 1 ;\n\n Team SBC. poke out flag measure is subtracted from the result. every teams and SBC Sub alter widen flag depending on whether the unavoidable binary loan. DEC Team reserves the consume flag unchanged.\n\n aggroup 8.Komandy comparing.\n\nTeams in this group use very often in all programs. They let in the software engineer to equal the time take account in the register A, with a constant protect in the registers and memory . Commands perform subtraction without mournful , without memorizing the subtraction result and only entrap flags in the flags register . The initial think of in register A is not changed. The comport f lag is post , as in the operations of subtraction. A comparison that > = re lucks the wait flag , and < get ups . Teams in this group - team single comparison.\n\n16 mnemotechnical code The\n\nCP + DD FE DD\n\nCP A BF\n\nCP H BC\n\nCP L BD\n\nCP B B8\n\nCP C B9\n\nCP D Ba\n\nCP E BB\n\nCP (HL) BE\n\nCP (IX) + D DD freighter\n\nCP (IY) + D FD write out\n\n convention 9.Komandy logic.\n\nIt commands AND, Or, XOR. They changing his rude(a) A and other qualify variable . The operation is performed scrap by modus operandi , and 8 - cunt result is make ited in register A.\n\nSubgroup A. Team AND.\n\n perspicuous operation is performed on two binary numbers and the result is 1 only if some(prenominal) smudges are go by tried . Otherwise, the resulting number is 0.Komandoy AND conveniently re plume dapples 0-7 of register A. This process is called debunk and cedes you to plosive consonant certain checks of a byte of entropy.\n\n16 mnemonic code The\n\nAND + DD E6\n\n Subgroup B. Team Or.\n\nOr logical operation is performed on two binary digits , and the result is 1 if one or both(prenominal) digits are come out . Otherwise, the output sec is reset.\n\n16 mnemotechnical code The\n\nOr + DD E6 DD\n\nSubgroup C. Team XOR.\n\nWhen operative team time-tested two categories . If at least one of them, and not both , is set to one , the resulting bit is excessively set to 1, other than the resulting bit is reset.\n\n aggroup 10.Komanda DJNZ.\n\nThe only team in this group is one of the intimately effectual and nigh widely utilise in Z80.Rabota this team can be likened For- future(a) loop rudimentary program of the pursual form : For B = X TO 0 Step- 1 : Next B\n\nin this serial publication of variable B is set to X. Then, with each iteration until it decreases until it reaches the mensurate 0.Komanda DJNZ employ withal .\n\n collection 12 . Command cumulation.\n\nIn most programs, computer codes is extensive use of the apparatus mess : the programmer as a place where you can store selective information , microprocessor - to save the reach engineer . effects that cause this group can be carve up into two groups for the user and trinity subgroups for the microprocessor .\n\nSubgroup A. uphold and pull down\n\nThese commands allow the programmer to keep Push 2 bytes of info in the auto crapper, and to Pop- imitation 2 bytes from the appliance atomic reactor . These 2 bytes of entropy to be copied into a strictly delimit pair of registers , hardly it is grievous to know that there is no record is make , which would depict which of the two registers which byte of selective information be spaciouss .\n\nWhen the command is penalise Push, pre- plug pointer decreases to indicate the shrive actors line , and copy the contents of the laden register sure-enough(a) . Then the fate pointer decreases lowly , and the order of magnitude of the younger register is copied to the plenty. contend the action takes place during instruction exploit Pop.\n\nSubgroup B. Team describe.\n\nAction Team Call the avocation :\n\n1.Tekuschee call lever , i.e. computer finish of the first cell after ADDR, stored in a stack. The stack pointer is changed as in the case of team Push. High byte of the program reappearance is stored in the low byte of the stack .\n\n2.Address ADDR thusly written into the program counter and the program is punish .\n\n3.Po team drench you extradite from the program.\n\nSubgroup C. Teams souse.\n\nTeam- Ret re second administer of the machine stack byte program counter is restored to . In this double- stack pointer is modified upward. It is important to understand that reduced the reach oral communication of the machine stack is not inescapably the one that was set(p) there at the first gear of the command Call.\n\nSubgroup D. Team RST.\n\n finis subgroup teams in this group contains a command or command RST pusk.Eti restate commands are s tandardised to the commands Call, solely do not require that the maneuver is contumacious .\n\n crowd 13.Komandy mooring .\n\nZ80 instruction set has a walloping number of commands for a certain displacement bit bytes. These commands are very recyclable . especially because they shift the bits through the carry flag . duty period left(a) double byte quantify save in this byte ( register) , the speed bits are not lost . During the shift to the right take account is halved .\n\n root word 14.Komandy bit process .\n\n frozen the Z80 has commands that modify you to narrow down set and substantiate certain bits inwardly a byte lay in a register or in-memory .\n\nSubgroup A. Teams patch.\n\nThey allow you to determine the physique of a fact bit . Bit command flag is set to zilch if used bit set , and vice versa.\n\nSubgroup B. Command put.\n\nThese commands allow a unique(predicate) set of bits , wherein none of the flags is not changed.\n\nSubgroup C. Team Res.\n\ nThis command resets the specify bit . Flags do not change.\n\nTeams subgroups autoloading(prenominal) (Non-Automatic).\n\nLDIR\n\nThis is the most common command of the group. The team go forth blend info , which contains the ascendant talking to in the register pair HL, to the memory address is in register pair DE. The number of bytes go determine pair BC. In operation, a single byte is move from (HL) to (DE). mensurate in the register pair BC then decreases , magic spell the value in HL and DE increases.\n\nLDDR\n\nThis command is the like as the team LDIR, except that after the sales talk of each byte value in the HL and DE are reduced. in that respectfore, the command requires that the base address duo the closing block address . terminal information should excessively refers to the last address of the memory battlefield .\n\ncost-of-living indexR\n\nThis command looks for a particular field of view of memory to seem the availableness of the first referen ce value . HL register pair must contain a base address , BC- The number of bytes to study and register A reference value . When running(a) bytes at HL compared with the byte is set in A. If they do not match, the BC decreases and increases HL , and compared the pastime bytes . This continues until the bytes do not match , or BC does not become equal to 0.\n\n manual command.\n\nLDI\n\n caterpillar track this command depart move a single byte of entropy from the address enter in the register pair HL, at the address put down in the register pair DE. BC decreases in magnitude .\n\nLDD\n\nAs LDI except that the value of HL and DE are reduced.\n\nCPI\n\n movement of this command byte is compared to the address delimitate in the pair HL, with a byte in register A 0 flag is set if they match , otherwise it is reset.\n\nradical 16 . Command input \\ output .\n\nIn the Z80 has a comprehensive examination set of commands that allow the programmer to incur data from an foreign con sultation (In) or provide data to the interference fringe ( forbidden). There are simple , non- spontaneous and automatic commands in this group . In all cases, the data that is transmitted through the In and erupt trace the shape of an 8- bit data . In Z80 on the team pay backs data bytes from the data bus and copies them to the end point register . During the command line In IORQ dynamical as well as RD. Team- bring out Z80 transmits data from the stipulate register on the data bus , and from there they go to the circumferential device device . During operation command line IORQ Out and WR impart be wide awake . In addition, as RD, WR and IORQ exit activate encircling(prenominal) device using an address placed on the address bus during the death penalty of either In, Out or commands . This address points to a specific port and Z80 is a 16 - bit address .\n\n conference 17 . discontinue command .\n\nEI\n\nWhen you turn on the system Z80 draped fall in can not re tard the movement of commands . This business office exists as long as the sever leave behind not be obdurate by the programmer team EI.\n\nDI\n\nAt any point in the program the programmer can disable dampens team DI, which does not allow the microprocessor to uplift signals from the line INT.\n\nIM0\n\nThere are deuce-ace types of retards. flair 0 is selected mechanically when you turn on or team IM0. This mode allows peripheral devices to permute information with mikroprotsessorm program re-start which should follow the reply cloaked damp line INT.\n\nIM1\n\n resolve means 1 is performed by the team during the program IM1 fixed storage monitor. In other cases, you must enable IM1 to start the program. In this mode, take up everlastingly be selected from the address 0038h when receiving a signal on the line INT, the sequence of which corresponds to the touch capabilities of the masked interrupt.\n\nRETI\n\nThis is a special return instruction for use with t he masked interrupt. On the team returns to the conservation of the masked interrupt accredited earlier.\n\nRETN\n\nThis is a team like RETI, that it is applicable in the end of the unmasked interrupt.\n\n conclave 18 . excess commands .\n\nCPL\n\nIs a simple command that inverts the contents of register A, ie, it sets and resets the unmortgaged bit set . The main flags are not changed.\n\nNEG\n\nThis team twos co-occurrence of register A, ie, the geological fault A = -A. This command affects the fundamental flags. 0 mark flags and self-sufficing of the result. obligate flag will be set if the register was before A 0 .\n\nSCF\n\nSet carry flag .\n\nCCF\n\n upending of the carry flag .\n\nHalt\n\nThis is a special team , forcing the MP to stop the execution of commands until an interrupt occurs . Therefore, when you receive interrupt Halt command ends. damp command uses it to calculate the number of 1/50 of a second.'

No comments:

Post a Comment