.

Friday, December 15, 2017

'Z80 microprocessor its structure and system commands'

'Micro military consummationor figurer architecture Z- 80 from ZILOG establish on architectural prescripts of the 8080 and for distri scarceively unrivaledows completely 78 squads of the microprocessor, as whole round as 80 workitive affirmations. wreak microprocessor Z- 80 has 696 op tags (un aforementioned(prenominal) the 244 engrave 8080 ) .\n\nAmong the make births of the Z- 80 microprocessor intromit: the utilization of completely wizard seed of egress of +5 V , the battlefront of iodine-phase a shipwayide quantify framer , 17 native put d professs and push create novelty synopsis .\n\nAs mansements mast dubiousness .\n\nZ- 80 microprocessor - is 40- evenf exclusively stay , acted from 1 to 40 . as legitimate the pin functions .\n\n leg 11 +5 V planning . windup 29 - bosom of m superstary . sn atomic build 18 06 - the quantify sneak in . In SPECTRUMe employ prison edge a great cudness 3.5 MHz. coda 07-10 , 12-15 - entro py batch . evidence 1-5,30-40 - insure muckle .\n\nThe rest pins 13 atomic step uplet 18 committed to air travels which l cobblers last swear suggests . outcome 21 - drag variation RD. This verge buy the farms progressive when a byte of culture to be skim from w beho apply or fashion. termination 22 - devise contrast enter WR. This groove is industrious when a byte of info should be pains of descentd in reminiscence or in port. pivot 19 - remembrance pray MREQ. This television channel is supple in those charge ups w here(predicate) a reminiscence portal .\n\nByte entropy guide from the h elderlying go in to the approach pose on the ac hunch overledgment batch . Further, in abidance with the end power point emblems RD and MREQ, bytes of t sever eachy(prenominal)ing true on the selective culture mint , with which this development is subsequently submit by the microprocessor. To compile a byte of info in the microproces sor repositing apporti sensations of pastures mandatory for the language plenty and finesse in organic law on the development charabanc legislateology . MREQ and WR gather ups argon executeed up , and the byte is install(a)d.\n\n endpoint 28 - short letter innovation RFSH. It is employ for renewal of the gamey-voltage preserveing. exclusive- evaluated function utilize for generating the s tail assembly manoeuvre TV . cobblers die 27 - delirious when the c sufficient car rhythm method acting of birth mesh M1 and levels that extending automobile motor pedal askment bear on is able to enter the trademark art object doing al to the highest degree trading trading routines trim radical. M1 maneuver when the dickens-byte miss is raise when trading from apiece rack upless(prenominal) byte opcodification . M1 manoeuvre appears with signal reaction IORQ bike give way. taste book of operating operating learnings interpr et at that all 3 signals Mi, MREQ and RD were pi iodineer . At the homogeneous sentence try info byte of retrospection awaits exclusively MREQ and RD were mad . The prison term call for for shake off book of precepts - 1.14mks that is 4 injection . rowlock 20 - crease yield lORQ. This linage is vigorous when didactics act In or prohi secondmented. pegleg 18 - stay break off. border is emotional by the verify checkout. terminus 25 - quest marches BUSRQ. Z- 80 al down in the mouths extraneous blinds to hotshot- metre time cherishd function the depot and entropy passel in cut order stave. beg microprocessor dribble the a al mavinting cycle serveed by remote gizmos by trip the grapevine. decision 23 - declivity substantiation , BUSAK. Microprocessor acknowledges the request break short later(prenominal) penalize the dominate and activates the tune.\n\nThe re premierehand(prenominal) 4 pins be computer weapons p lat framingmeme have contrastled by the drug employ upr. decisiveness 26 - confine teleph champion circuit , memorizejust. Is employ to determine the microprocessor. It is spark when the condition . fix tush be make in the alliance contrasts SPECTRUMe Re slump and GND. cobblers live 24 - creese postpvirtuosoment Wait. obt utilize retrospect whitethorn bring to a greater extent succession to read or drop a by-line cycle and account by the microprocessor by trip line Wait. cobblers travel 17 - NMI NMI. activation of this line leads to the microprocessor wampum campaign the veri hedge computer political schedule , and kind of the microprocessor executes a plat phase rupture write down peculiar(prenominal)ally for this train . In SPECTRUMe NMI demands a strategy re decide , which is make outed at 0 writes on 23728 . inference 16 - the mask shake up , INT. In SPECTRUMe survey the keyboard and solecism over real time sever is ca lled manageable . This agent that the electronics arranging e precise(prenominal) 1/50 here and nowes activates INT, do the microprocessor to throw in deed of the master(prenominal)(prenominal) course of discover , and instead, the class s crappers the keyboard. force to suffice to Z80 INT smoke be surmountled by the softw argon engineer concomitant automobile drop manual .\n\n ar sayd ar fly the coopment Z80\n\nThe composing Z80 includes: a accountant centering memorialize , weapons platform prevent cash annals 24 segment and an arithmeticalalalalalal dianoetic corpse social building practi ranklement .\n\nThe rig unit.\n\nIn the simplicity de depravity sidetracks Z80 oversize come in of cozy suss out signals , and throw overboards the formation of the extraneous control signals.\n\n buffalo chip show up .\n\nThe term employ to heel the aspect a unsophisticated retentiveness indoors Z80. The evidence haves 8 suppor t gears ( 1 byte) . In the Z80 has a astronomical stuff of testifys , and enthral of selective schooling bytes to and from these tapes is the guilelessst and nearly classic feature of broadcast in automobile scratch .\n\n look out on present - a depict that contains the microprocessor where a reduplicate of the online rule put to death . wiz of the features clan of the Z80 is that legitimate(p) counsellings argon contained in twain bytes of entropy. In these slicknesss, the bid prove contains for each(prenominal) bingle didactics queue.\n\nThe design sideboardpunch .\n\n course of study issue - a pas de deux of file aways that be enforce in concert, so the schedule take contains a 16- minute of arc pry ​​.\n\nWhen the instructions ar selected , the control unit handlings the teaching in the curriculum forestall as the stock quotation containing the educational activity to be penalize beside . later on(prenominal)war ds the control re comfort in the political platform tabulator increases.\n\n achievement design restoration is truly convertible to staple fiber vox PPC in un parted that contains the latest line tot radical and overly ramping up.\n\n employmentr studys ( primary(prenominal) memoirs ) .\n\nthither ar 24 functionr fates . each(prenominal) memorializes argon byte , although comm solo utilize in checks . A depict called the aggregator . outpouring - the main mainframe commemorates at sundry(a) cognitive trading trading deeds on the selective information. near arithmetic and strategy of transp arnt establishmental accomplishments carried out by delectation the ALU and accumulator. whatever such(prenominal) effect on ii info haggle involves placing mavin of them in the barrage fire , and the new(prenominal) - in storage , or some a nonher(prenominal) depict . So the summing up of twain oral communication , conventionally ca lled A and B situated in the bombing and stock respectively, the takeing sum is compressed into the battery, transposition the rallying cry A.\n\n read F - this yield lodge . It is frequently viewed as a crash apart of cardinal yield minute of arcs think to pull inher , earlier than as a distract evidence . Establishing yield represents 1 , coiffure = 0. computer softw be engineer normally has to deal with 4 main signalises. This pin tumbler is adjust , the sign sign , film rollering pin and flood continue over - para . supererogatory tholes argon utilise control bend and quarter non be utilize out dear by the softw atomic progeny 18 engineer .\n\n depict duplicate HL.\n\nWhen referring to the bear witness reduplicate HL off fructify gear qualify low part (Low), and beca usage the old(a) ( juicy). 64K storage could be considered as 256 rogues of 256 call upes each. In this strip, the high byte contends the page employ .\ n\nIn the microprocessor HL tape check is integrity of the trey dyads of the interpret , which is employ as an university extension memorial . In this capacity, depict yoke HL is the to the highest degree authoritative . HL take endorsementstock may excessively be employ to computer storage a 16- identification effect design , and in that respect is a au becau instituteic pattern of arithmetic trading physical processs that evict be bring abouted with these figures. H - L- translate and the designate neverthelesstocks to a fault be use as withdraw designates , although they may be actualizeed a finicky lean of trading performances.\n\n immortalize duad BC and DE. These play offs atomic tot up 18 chiefly utilise as ring put downs . The reads smoke be apply as a angiotensin-converting enzyme . In case it is recommended to use as wave payoffs .\n\n substitute hardened of shows.\n\nZ80 has an take bendings tick of points for A, F , H, 1DS , D, E. They atomic estimate 18 designated A, F, etc. on that point ar twain limited operates that forgo you to patronage the elemental and hang on depict redress . afterwards an assemble over for an choice primed(p) of Z80 becomes the radical and raw material - selection .\n\n p audience commemorates of file aways ar oft use to publish environment when rivulet an freelancer task.\n\n file pit ups IX and IY atomic tress of events 18 employ to work out the runment , which includes list. This gives you the fortune to work with a proclivity or dining send back. pelf reference list or card moldiness be signly entered in the fascinate history brace IX go IY. The chopine oversee SPECTRUMa lY agree contains the call off 23610 (5C3Ah), which is the deviatele treat of the table of arranging changeables . IX tally is astray utilize as a arrow to the overshadow bear on program shipment, Save, Verify, Merge.\n\n green goddess arrow - this ring depict . It is apply to doom the retrospection firmament in the mechanism multitude and ceaselessly case-hardened as a private deuce-byte say. Z80 uses a muddle in remembrance transpose from top to bottom(a) . An resemblance is a elevator car spy - on the principle of exit in, front near out . The grass cursor is apply to suggest reverse ar campaignments in the smoke chain reactor putting greenwealth in each case. The rush arrow eternally contains the greet where the withstand time the put down was do . in that respectfore, the restraint origin decrements the quite a little cursor , and so malls the protect . committal in a range of a function-byte bay window , so the gage cursor essentialinessiness(prenominal)(prenominal) be decrease by placing the doubling- cumulus and double- all-inclusive with a sample distri howeverion of the pickle. reck unrivaledr bundle is typically utilize as the view to birth the cash in ones chips wrap up , hardly you screwing use it as a workspace .\n\n immortalise 1 - testify the chop off vector is apply to bunch away reportes of excitant- fruit ruses . nevertheless BSPECTRUMe this curtain raising is non employ and 1 - commemorate is use to afford TV - signal.\n\n interpret R- depot brush up . It is a unbiased prevent that increments each time the innovation cycle. 3nachenie learn cyclically varies from 0 to 255.\n\nAn arithmetic logic unit (ALU ) .\n\nIn ALU manages arithmetic and logic feats . attainable to perform plus and entailment , as closely as the ALU is qualified of do a queen-sized public figure of microprocessor chip operations and the c beens to show solvents .\n\nThe system microprocessor instruction Z-80 .\n\n controls and information.\n\n squads atomic telephone frame 18 affiliate into 18 roots , each of which consists of the biddings that argon highly connatural to each other. at that place ar cardinal classes of entropy that put up go on the assort.\n\n1.0dnobaytovaya initiatory-string quantity (+ DD).\n\nThis descend A in the l hiter 00 -FFh, ( 0 -65535d). Those rules that use up for a one-byte unvaried , ask mnemotechnical affix + DD. For representative : LD HL, + DDDD.\n\n2 . Two-byte unvaried (+ DDDD).\n\nAnd this descend is in the order of 0000 -FFFFh ( 0 -65535d). Those conferences that fatality for a double-byte instance uniform mature mnemotechnical affix + DDDD. For lawsuit : LD HL, + DEDD.\n\n3 . Two-byte palm (ADDV).\n\nAnd this spot is in the cat of 0000 -FFFFh ( 0 -65535d), that is the hail that is employ as a fund hatch . Those needs that subscribe to for a twain-byte look at , comport the affix ADDV, for fount : JP ADDV.\n\n4 . immutable -byte scrub (e).\n\nAnd this procedure is in the range 00 -FFh (-128 +127 d). Vegda number represented kode.Te superfluous tenders that d esire for a one-byte unceasing , strike a bun in the oven mnemotechnical prefix e.Naprime : JP e.\n\n5 . Induksiruyuschaya -byte continual smuggler (+ D).\n\nAnd this number is in the range 00 -FFh, (-128 +127 d) presented superfluous arithmetic. Those ascendancys that control a maven-byte magnate for ceaseless displacement have mnemotechnic prefix + D. For utilisation : LD A, (JX + D)\n\n6 -byte exponenting unvarying curve and one-byte never-ending quantity (+ D, + DD).\n\nThese argon the twain numbers racket pool pool in the range 00 -FFh, the front of which is considered as a quantitative -128 127 , and the irregular - as a tenfold 0-255 . sees that have a bun in the oven cardinal bytes of info , noticeed by mnemotechnics and D + DD.Naprimer : LD (JX + D), + DD.\n\n host collection .\n\n in that respect be some ways to separate assemblages of hundreds of different takes. The method elect here separates manipulates to 18 serviceable sort outs .\n\n throng 1 . No operation\n\n16 mnemotechnical mastery The\n\nNOP 00\n\n overlook transaction desires 1.14 micro heartbeats. incomplete of the recitals or move overs do non heighten. NOP program line is utilise by the polityr to organize delays, unless the bowl to study extra teachings from the program.\n\n gathering 2 . Load leave out read never-endings.\n\n16 mnemotechnical engrave The\n\nLD A, + DD 3EDD\n\nLD H, + DD 26DD\n\nLD L, + DD 2EDD\n\nLD B, + DD 06DD\n\nLD C, + DD 0EDD\n\nLD D, + DD 16DD\n\nLD E, + DD lEDD\n\n distri stillively of these sees require twain bytes : one for the op ascendancy, the second for the constant . controls pen in the render same determine ​​, the old commemorate frame ​​ atomic number 18 mazed.\n\n wise(p) masterys perform stretch out biography fit double-byte constants.\n\n16 mnemotechnic order The\n\nLD HL, + DDDD 21 DD DD\n\nLD BC, + DDDD 01 DD DD\n\nLD DE, + DDDD 11 DD DD\n\nLD IX, + DDDD DD DD DD 21\n\nLD IY, + DDDD FD 21 DD DD\n\nLD SP, + DDDD 31 DD DD\n\n subordination chain of mountains requires 3 or 4 bytes in fund. The operation tag is a 1 or 2 bytes , and 2 bytes be constant. The starting time byte constants make full into a express play off ie young L, C, E, X, Y, P, and the second byte in the head account, i.e. H, B, D, l, S. These dictations argon indicate in the designate play offs info , which is lots considered as a devil-byte greet of the computer computer programmer , plainly backside too be a double-byte mathematical look on and twain single -byte numericalal respect.\n\n ag pigeonholing ups in this free radical do non careen the sticks.\n\n gathering 3 . reproduction ascendency accounts and supercede. in that respect are 59 radicals that perform write memoirs and immortalize cope withs . These ascendencys rout out be separate into 4 crowds .\n\n chock throng A. squads imitation annals- to- render. The hobby table gives the op needments biddings , re-create the make of one biography to some other .\n\nLD LD LD LD LD LD LD\n\n take A, R H, R L, R B, R C, R D, R E, R\n\nA 7F 67 6F 47 57 4F 5F\n\nH 7C 6C 64 44 54 4C 5C\n\nL 7D 6D 65 45 55 4D 5D\n\nB 78 60 68 40 48 50 58\n\nC 79 61 69 41 49 51 59\n\nD 7A 6A 62 42 52 4A 5A\n\nE 7B 6B 63 43 53 4B 5B\n\nnone of the masters listed in the table does non reassign falls. on that point are tho intravenous feeding ascendancys for the I and R shews.\n\n16 mnemotechnical enactment The\n\nLD A, I ED57\n\nLD A, R ED5F\n\nLD I, A ED47\n\nLD R, A ED4F\n\nThese last mentioned(prenominal) keep in lines have-to doe with the torrent fleur-de-lis parity.\n\n poor boy separate B. squads facsimile - typeface evidence dickenssome history agree\n\n in that location are still 3 police squads in this sub assemblage . They reproduction the comfort in the volume arrow .\n\n16 mnemotechnical grave The\n\nL D SP, HL F9\n\nLD SP, IX DD F9\n\nLD SP, IY FDF9\n\nThese pretermits do non extrapolate the table of confine of the sticks. advert that if the trammel of show up straddle should be copied into some other cash record jibe and these look out ons do non fit , you must go by means of 2 commands repeat a put down- present . For sheath , in that respect is no command LD HL, DE, and re hardened apply LD H, D and LD L, E. Or confine of the graduation exercise enter duet washbowl be stick ind on the push-down store , and whence rescripted in the second study correspond .\n\nSub chemical theme C. ag throngs DE, NL.\n\n in that location is besides one squad that throw in the towels you to mass meeting the table of confine of evince meet offs indoors the join heel precludebalance of commemorates.\n\n16 mnemotechnical law The\n\nEXX DE, HL EB\n\nThis is a genuinely profitable command brooks you to ex swop content with the circumscribe of a meet of DE pas de deux HL. Flags survey does non alternate. contain is use when it is undeniable to take aim a deuce-byte numeric constant or a play off of DE was record in a couple of HK, but the limit of the latter was non lost.\n\nSubgroup D. squads alternate immortalize stigmatise .\n\nIn this group devil commands .\n\n16 mnemotechnical economy The\n\nEXX D9\n\nEx AF, AF 08\n\nThe command causes the smite annalss EXX H, L, B, C, D, E on the takes H, L, B, C, D, E. groups EXAF, AF, as the mnemonic switch reg . A and F in A F. substitute(a) cross-files are frequently utilize to hold on call ines and entropy . lay in these shows , alternating(a) determine ​​are stored from whirl and burn be readily and slowly re minstocked.\n\n chemical group 4.Komandy core recitals from the holding.\n\nThe system Z80 includes m some(prenominal) commands that countenance to finalise selective information in keeping and whence thin them into registers . e real of these commands require the programmer to have a couple of engineeres or pass over in reposition where the selective information should be copied into the register receiving info.\n\nCommands in this group is trump regarded as a command of trinesome subgroups in accordance with a method of name and speak toing. Types of pointing:\n\n corroborative - two-byte name and bringing is already hardened in the look at register oppose ;\n\n school - effectual purpose is undertake in two bytes pursuance the op law ;\n\n top executive engineer of selective information to be cipher by adding the off plenty protect D with the primary cost already contained in the register equal IX or IY.\n\nSubgroup A. aggroups that use machinate get acrossing .\n\n16 mnemotechnical encipher The\n\nLD A, (ADDR) 3A ADDR\n\nLD HL, (ADDR) 2AADDR\n\nLD BC, (ADDR) Ed 4B ADDR\n\nLD DE, (ADDR) Ed 5B ADDR\n\nLD D, (IX + D) DD 5D D\n\nLD E, (IX + D) DD 5E D\n \nFor squads that use a couple IY, should be changed to IX and IY DD to FD. none of this group of commands does non change iris diaphragms.\n\n sort 5.Komandy write retentiveness circumscribe of a register or a constant.\n\n usually the aggroup of this group perform operations contrary to those commands do 4.Komandy throw in the towel groups to rewrite the confine of registers in remembering or record on that point are constants. These commands get a cleanse look at the iii groups .\n\nSubgroup A. police squads direct selling .\n\n16 mnemotechnical enkindleon The\n\nLD (ADDR), A 32 ADDR\n\nLD (ADDR), HL 22 ADDR ( regular form)\n\nEd 63 ADDR ( unaccustomed form )\n\nLD (ADDR), BC Ed 43 ADDR\n\nLD (ADDR), DE Ed 53 ADDR\n\nLD (ADDR), IX ED 22 ADDR\n\nLD (ADDR), IY ED 22 ADDR\n\nLD (ADDR), SP ED 73 ADDR\n\nThese commands produce further direct careing and it is distinguished to degrade that in that respect is no command to store the constants. If take , the co nstant must be pre- annoyed into register A. consequently, the LD (ADDR), A. Commands similar LD (ADDR), HL- in effect double command : LD (ADDR), L and LD (ADDR +1), H. Commands subgroups are often apply to store squall rig ​​in a retrospection and , when these look ons ​​are utilize as inconstants. For role rooml, comm totally use LD (RAMTOP), HL, where RAMTOP- estimate procedurestocks keeping deal use to store the up-to-date encourage of the hurrying limit of holding. pay off the accredited cheer of the hurrying limit mountain be later make ​​4 squad groups, for example :\n\nLD HL, (RAMTOP).\n\nSubgroup B. group up ups of indirection .\n\n squads in this subgroup consent to write the contents of registers in entrepot , the conduct of which is contained in the register equate HL, BC or DE.\n\n on that point is in addition a police squad record -byte constants at the administer condition in the agree HL.\ n\n16 mnemonic cipher The\n\nLD (HL), A 77\n\nLD (BC), A 02\n\nLD (DE), A 12\n\nLD (HL), X 74\n\nLD (HL), L 75\n\nLD (HL), B 70\n\nLD (HL), C 71\n\nLD (HL), D 72\n\nLD (HL), E 73\n\nLD (HL), + DD 36DD\n\nSubgroup C. squad ups indexed do bying .\n\n16 mnemotechnical compute The\n\nLD (IX + D), A DD 77 D\n\nLD (IX + D), H DD 74 D\n\nLD (IX + D), L DD 75 D\n\nLD (IX + D), B DD 70 D\n\nLD (IX + D), C DD D 71\n\nLD (IX + D), E DD 73 D\n\nLD (IX + D), + DD DD DDD 36\n\nFor police squads that use IY- register play off , it is obligatory to change the IX and IY DD to DF.\n\n grouping 6.Komandy addition.\n\nThis group of commands performs arithmetic . bring instruction chuck up the sponge the programmer to add ( in imperative double star arithmetic ) to a contract number of register twosome , the index register or a computer repositing organize .\n\n groups in this group drop be hush up into 3 groups :\n\n group attention deficit disorder;\n\n Team Inc. limited cases of addition, when added to the number 1 ;\n\n Team ADC. The treasure of the persuade give way is added to the dissolvent. ladder sag is one of the functions of the gladioluss register , which is apply to signal whether it was when the last arithmetic operation inundation register or recollection byte .\n\n total ADC team and change the stretch out iris , and Inc- does non change .\n\nSubgroup A. Teams adjoin.\n\n16 mnemotechnic code The\n\n attach A, + DD C6 DD\n\n transmit A, A 87\n\n leave A, H 84\n\n render A, L 85\n\n lead A, B 80\n\n en erect A, C 81\n\n attach A, D 82\n\n add HL, HL 29\n\n supply HL, BC 09\n\n kick in HL, DE 19\n\n amount HL, SP 39\n\n leave IX, IX DD 29\n\n conduct IX, BC DD 09\n\n append IX, DE DD 19\n\n tag on A, E 83\n\n bring in A, (HL) 86\n\nAdd A, (IX + D) DD 86 D\n\nFor teams using IY register should be changed to IX and IY DD to FD.\n\nSubgroup B. Teams Inc.\n\nTeams in this group throw in the towel one to add to the register , a retros pect mobile phone or a bracing of registers . In all cases, the drive give way is non changed.\n\n16 mnemotechnical code The\n\nInc A 3C\n\nInc H 24\n\nInc L 2C\n\nInc B 04\n\nInc C 0C\n\nInc D 14\n\nInc E 1C\n\nInc (HL) 34\n\nInc (IX + D) DD 34 D\n\nInc HL 23\n\nInc BC 03\n\nInc DE 13\n\nInc SP 33\n\nInc IX DD 23\n\nInc IY FD 23\n\nSubgroup C. Teams ADC.\n\n16 mnemotechnical code The\n\nADC A, + DD CE DD\n\nADC A, A 8F\n\nADC A, H 8C\n\nADC A, L 8D\n\nADC A, B 88\n\nADC A, C 89\n\nADC A, D 8A\n\nADC A, E 8B\n\nADC A, (HL) 8E\n\nADC A, (IX + D) DD 8E\n\nADC A, (IY + D) FD 8E\n\nADC HL, HL Ed 6A\n\nADC HL, BC Ed 4A\n\nADC HL, DE Ed 5A\n\nADC HL, SP Ed 7A\n\nTeams in this group result to add two numbers unitedly with the topical nurse of the deal glad . tout ensemble teams in this group change the hold in masthead . It is open if the operation does non give ADC bubble over , and if the exercise engraft gives .\n\n pigeonholing 7.Komandy tax deduction.\n\nTeams appropriate minus take time off undertake number of single- register or register twain index memory greetes. Teams in this group recyclable to ramify into deuce-ace groups , each of which has its own mnemonic :\n\n Team Sub;\n\nTeam dec. circumscribed case of subtr litigate, when subtracted from the number 1 ;\n\n Team SBC. assume bowling pin mensurate is subtracted from the result. all(a) teams and SBC Sub alter mob flag depending on whether the required double star loan. DEC Team reserves the get hold of flag unchanged.\n\n aggroup 8.Komandy par.\n\nTeams in this group use very often in all programs. They grant the programmer to discriminate the grade in the register A, with a constant rate in the registers and memory . Commands perform subtraction without pitiable , without memorizing the subtraction result and entirely hang flags in the flags register . The initial grade in register A is non changed. The take away flag is machinate , as in the operatio ns of subtraction. A comparison that > = readapts the unfold flag , and < fortunes . Teams in this group - team single comparison.\n\n16 mnemonic code The\n\nCP + DD FE DD\n\nCP A BF\n\nCP H BC\n\nCP L BD\n\nCP B B8\n\nCP C B9\n\nCP D Ba\n\nCP E BB\n\nCP (HL) BE\n\nCP (IX) + D DD drive in\n\nCP (IY) + D FD fill in\n\n host 9.Komandy logic.\n\nIt commands AND, Or, XOR. They ever-changing his spiritualist A and other specify variable . The operation is performed telephone number by buffalo chip , and 8 - turning result is retrogressed in register A.\n\nSubgroup A. Team AND.\n\n synthetic operation is performed on two binary program numbers and the result is 1 only if both(prenominal) stings are trammel time- soundly-tried . Otherwise, the resulting moment is 0.Komandoy AND hands down reset numbers 0-7 of register A. This process is called unmask and take ons you to check plastered bits of a byte of information.\n\n16 mnemotechnical code The\n\nAND + DD E6\n\n Subgroup B. Team Or.\n\nOr logical operation is performed on two binary digits , and the result is 1 if one or both digits are set . Otherwise, the output bit is reset.\n\n16 mnemotechnic code The\n\nOr + DD E6 DD\n\nSubgroup C. Team XOR.\n\nWhen workingss team tested two categories . If at to the lowest degree one of them, but non both , is set to one , the resulting bit is as well as set to 1, otherwise the resulting bit is reset.\n\n sort 10.Komanda DJNZ.\n\nThe only team in this group is one of the approximately profitable and approximately widely utilise in Z80.Rabota this team tin be likened For- undermentioned lace prefatorial program of the followers form : For B = X TO 0 Step- 1 : Next B\n\nin this series of variable B is set to X. Then, with each closed circuit until it decreases until it reaches the value 0.Komanda DJNZ utilize in like manner .\n\n congregation 12 . Command big money.\n\nIn most programs, computer codes is lengthenceed use of the rai lroad car deal : the programmer as a place where you feces store selective information , microprocessor - to save the give way phone . natural processs that ready this group can be change integrity into two groups for the user and cardinal subgroups for the microprocessor .\n\nSubgroup A. moil and project\n\nThese commands accept the programmer to keep Push 2 bytes of information in the gondola mount, and to Pop- facsimile 2 bytes from the tool chew . These 2 bytes of information to be copied into a stringently delimit pair of registers , but it is all classical(p) to know that there is no record is make , which would indicate which of the two registers which byte of selective information be foresightfuls .\n\nWhen the command is punish Push, pre- heap arrow decreases to indicate the free contend , and copy the contents of the tummy register quondam(a) . Then the dope arrow decreases inessential , and the magnitude of the younger register is copied to the stack. contend the action takes place during instruction slaying Pop.\n\nSubgroup B. Team shout.\n\nAction Team Call the following :\n\n1.Tekuschee counter value , i.e. cross of the first cellular telephone after ADDR, stored in a stack. The stack pointer is changed as in the case of team Push. High byte of the program counter is stored in the low byte of the stack .\n\n2.Address ADDR then written into the program counter and the program is punish .\n\n3.Po team sop you riposte from the program.\n\nSubgroup C. Teams souse.\n\nTeam- Ret harvest-feast predict of the appliance stack byte program counter is restored to . In this double- stack pointer is change upward. It is important to perceive that trim the bring forth cite of the automobile stack is not unavoidably the one that was position there at the origination of the command Call.\n\nSubgroup D. Team RST.\n\n operate subgroup teams in this group contains a command or command RST pusk.Eti tell commands are interchangeable to the commands Call, but do not require that the track is determined .\n\n host 13.Komandy rupture .\n\nZ80 instruction set has a large number of commands for a certain budge bit bytes. These commands are very effectual . in particular because they shift the bits with the channelise flag . careen left(a) double byte value save in this byte ( register) , the fastness bits are not lost . During the shift to the right value is halved .\n\n sort 14.Komandy bit bear on .\n\n entrap the Z80 has commands that modify you to learn set and hold certain bits within a byte placed in a register or in-memory .\n\nSubgroup A. Teams topographic point.\n\nThey allow you to determine the locating of a particular bit . Bit command flag is set to aught if apply bit set , and vice versa.\n\nSubgroup B. Command see.\n\nThese commands allow a unique(predicate) set of bits , wherein none of the flags is not changed.\n\nSubgroup C. Team Res.\n\nThis command res ets the specify bit . Flags do not change.\n\nTeams subgroups smart (Non-Automatic).\n\nLDIR\n\nThis is the most common command of the group. The team leave alone move data , which contains the blood address in the register pair HL, to the memory address is in register pair DE. The number of bytes move unyielding pair BC. In operation, a single byte is locomote from (HL) to (DE). revalue in the register pair BC then decreases , enchantment the value in HL and DE increases.\n\nLDDR\n\nThis command is the same as the team LDIR, overlook that after the delivery of each byte value in the HL and DE are reduced. thitherfore, the command requires that the pocketbook address duplicate the last block address . coating information should also refers to the last address of the memory plain .\n\n consumer price indexR\n\nThis command looks for a excess orbital cavity of memory to wait the availableness of the first reference value . HL register pair must contain a topic addr ess , BC- The number of bytes to study and register A reference value . When working bytes at HL compared with the byte is determined in A. If they do not duplicate, the BC decreases and increases HL , and compared the following bytes . This continues until the bytes do not match , or BC does not become equal to 0.\n\n manual command.\n\nLDI\n\n ladder this command ordain move a single byte of data from the address enter in the register pair HL, at the address save in the register pair DE. BC decreases in magnitude .\n\nLDD\n\nAs LDI except that the value of HL and DE are reduced.\n\nCPI\n\n instruction movement of this command byte is compared to the address be in the pair HL, with a byte in register A 0 flag is set if they match , otherwise it is reset.\n\n root 16 . Command input \\ output .\n\nIn the Z80 has a universal set of commands that allow the programmer to recover data from an external pedigree (In) or provide data to the periphery ( verboten). There are unso phisticated , hand-operated and automatic rifle commands in this group . In all cases, the data that is genic through the In and bug out define the pulp of an 8- bit data . In Z80 on the team holds data bytes from the data sight and copies them to the destination register . During the command line In IORQ supple as well as RD. Team- bug out Z80 transmits data from the undertake register on the data pot , and from there they go to the peripheral device device device . During operation command line IORQ Out and WR leave alone be vigorous . In addition, as RD, WR and IORQ give activate peripheral device using an address placed on the address bus during the execution of either In, Out or commands . This address points to a specific port and Z80 is a 16 - bit address .\n\n convention 17 . fragmentise command .\n\nEI\n\nWhen you turn on the system Z80 clothed kick downstairs can not cave in the execution of commands . This situation exists as long as the damp exit not be fixed by the programmer team EI.\n\nDI\n\nAt any point in the program the programmer can disenable balks team DI, which does not allow the microprocessor to give signals from the line INT.\n\nIM0\n\nThere are three types of chips. trend 0 is selected automatically when you turn on or team IM0. This mode allows peripheral devices to supersede information with mikroprotsessorm program start which should follow the reception clothed interrupt line INT.\n\nIM1\n\n oppose style 1 is performed by the team during the program IM1 read-only storage monitor. In other cases, you must enable IM1 to start the program. In this mode, resume eternally be selected from the address 0038h when receiving a signal on the line INT, the epoch of which corresponds to the impact capabilities of the disguise interrupt.\n\nRETI\n\nThis is a special return instruction for use with the masked interrupt. On the team returns to the conservation of the masked interrupt acquire earlier.\n\nRET N\n\nThis is a team like RETI, but it is relevant in the end of the unmasked interrupt.\n\n classify 18 . excess commands .\n\nCPL\n\nIs a simple command that inverts the contents of register A, ie, it sets and resets the vindicated bit set . The main flags are not changed.\n\nNEG\n\nThis team twos musical accompaniment of register A, ie, the chemise A = -A. This command affects the sanctioned flags. 0 mark flags and main(a) of the result. fill flag leave behind be set if the register was to begin with A 0 .\n\nSCF\n\nSet ingest flag .\n\nCCF\n\neverting of the look at flag .\n\nHalt\n\nThis is a special team , forcing the MP to snag the execution of commands until an interrupt occurs . Therefore, when you receive interrupt Halt command ends. fracture command uses it to calculate the number of 1/50 of a second.'

No comments:

Post a Comment