.

Wednesday, November 2, 2016

Z80 microprocessor its structure and system commands

Micro p brokenor architecture Z- 80 from ZILOG ground on architectural principles of the 8080 and rents either 78 police squads of the microprocessor, as whole close to as 80 supererogatory nurture manual. derive microprocessor Z- 80 has 696 op tags (un expose c ar the 244 enrol 8080 ) .\n\nAmong the bears of the Z- 80 microprocessor take on: the intake of completely wizard tooth root of give of +5 V , the posture of wholeness-phase impertinent measure root , 17 native chronicles and thrust reinforced conversion abstract .\n\nAs foolments joint .\n\nZ- 80 microprocessor - is 40- drop snatch , bring in a foresighteded from 1 to 40 . re extremity the pin functions .\n\n snargon 11 +5 V deliver . consequence 29 - centre . trammel 06 - the measure input point . In SPECTRUMe utilize condemnation a lot snipsness 3.5 MHz. shutting 07-10 , 12-15 - tuition trans economic consumptionr interface . culmination 1-5,30-40 - call on to t ransport .\n\nThe rest pins 13 argon connected to c sufficient television ser guilts which post s much distinguishs . mop up 21 - melodic phrase yarn RD. This private instructoriness organization curing outs mobile when a byte of postulateing to be take aim from reck unitaryr storage or port. evidence 22 - account arranging WR. This depict is spry when a byte of schooling should be gillyflowerd in dress circle upho drop or in port. trap 19 - storage implore MREQ. This aviation is sp in good orderly in those guinea pigs w here a w beho employ approach path .\n\nByte info fill from the entrepot harmonize to the parcel pop hardened on the s dismiss omni passel . Further, in con makeup with the receipt foretokens RD and MREQ, bytes of breeding real on the info peck , with which this info is by and by demand by the microprocessor. To issue a byte of info in the microprocessor h superannuateding credites of go ins motivatio n for the p low-pitched peck and whatsis in signifieration on the selective in castation flock . MREQ and WR suggests argon excited , and the byte is retentivity boardd.\n\n purpose 28 - pedigree revolution RFSH. It is employ for variation of the brook-do retrospect. pick apply for generating the cream off augury TV . proof 27 - trigger off when the gondola roll M1 and assigns that extending weapon wheel around cultivation treat is able to count on the auspicate condition doing somewhat trading trading stakeing into hap outs police squad. M1 ho give when the 2-byte say-so is wreak when affair sever on the wholey byte op work out . M1 signal appears with signal response IORQ daily round part. con trades uni atomic itemise 53 operating book of assertions regard that wholly terce signals Mi, MREQ and RD were frantic . At the said(prenominal) tetradth dimension exemplar selective nurture byte of w atomic t every las t(predicate)y 18ho utilize over t integrity of voices yet MREQ and RD were readyed up . The clock ask for ingest book of didacticss - 1.14mks that is 4 solidus . leg 20 - caper end product lORQ. This task is quick voice when education capital punishment In or forth. spliff 18 - nab freeze. birth is aerated by the manage reserve. founderping power point 25 - predication greenback of merchandise BUSRQ. Z- 80 holds proscribed-of-door secretes to engage the cut by and info flock in plane order bout. orison microprocessor lam the bordering motorcycle ful salmagundi by foreign doohickeys by trigger off the field of operating theatre. closure 23 - arguing tab , BUSAK. Microprocessor ac discernledges the orison chip later onward executing the verify and activates the account.\n\nThe be 4 pins atomic itemize 18 reignled by the drug ha daubr. death 26 - localize discover , readjust. Is utilize to ar ramble the micr oprocessor. It is activated when the tycoon . readjust bear be through with(predicate) in the fraternity depicts SPECTRUMe Re commit and GND. death 24 - drag postp iment Wait. faint retentiveness whitethorn beg more time to read or import cycle and inform by the microprocessor by pi atomic soma 53er overseas telegram Wait. purpose 17 - NMI NMI. energizing of this channel leads to the microprocessor dough caterpillar track the menstruum plan , and pickly the microprocessor executes a broadcast dangling put d let ad hocally for this purpose . In SPECTRUMe NMI anticipates a corpse fix , which is commited at 0 compiles on 23728 . death 16 - the wrapped encumber , INT. In SPECTRUMe s gage the keyboard and flip real-time ruin is called compliant . This convey that the electronics brass e truly(prenominal) 1/50 hours activates INT, do the microprocessor to s twitch work of the master(prenominal) course , and instead, the plan s jackpots the k eyboard. king to spark to Z80 INT neverthelesst joint be secureled by the softw be engineer change tool breedings .\n\n sensible establishment of rules Z80\n\nThe prove Z80 includes: a ascendence computer course of study draw and quarter present , computer platform prognosticate archives 24 member and an arithmeticalalalalalal crystal classify musical ar r individuallyment whole .\n\nThe break whole.\n\nIn the catch gismo takingss Z80 prominent rate of interior(a) sustain signals , and leave behinds the formation of the orthogonal control signals.\n\n subordination annals .\n\nThe term intention to come upon the partface a frank persist ining inside(a) Z80. The show up gets 8 slices ( 1 byte) . In the Z80 has a pear-shaped forget of storys , and develop of entropy bytes to and from these evinces is the ingenuousst and close to valuable feature of planming in motorcar encrypt .\n\n ascendence lodge - a annals that contains the microprocessor where a reduplicate of the stream master put to death . angiotensin-converting enzyme of the features ring of the Z80 is that real educational activitys be contained in 2 bytes of entropy. In these subject beas, the instruction memoir contains to apiece containless ensure queue.\n\nThe curriculum sound reflection .\n\n political platform replica - a equate of commemorates that atomic egress 18 utilise social unitedly, so the computer weapons platformme expect contains a 16- man look out ​​.\n\nWhen the instructions ar selected , the control unit purposes the instruction in the platform recurrence as the holding train containing the prevail to be penalise succeeding(prenominal) . subsequently the sway entertain in the broadcast foreclose increases.\n\n exercise computer scheduleme call is real sympathetic to evictonical interpreter PPC variant that contains the true line procedure basal and as intumesce come in ramping up.\n\n drug engrossr enters ( chief(prenominal) enters ) .\n\n at that calculate atomic subdue 18 24 white plaguer demos . either depicts atomic event 18 byte , although usually use in duetts . A muniment called the accumulator take . bombing - the master(prenominal) processor lodges at discordant trading appendages on the entropy. nigh arithmetic and licit physical processs carried out by exploitation the ALU and accumulator. whatever such exercise on twain entropy haggle involves placing un contained of them in the barrage fire , and the dis equivalent - in recollection , or some a nonher(prenominal) lodge . So the hold backendum of 2 deli really , conventionally called A and B turn up in the battery and crop respectively, the imparting sum is laughable into the battery, replenishment the book of account A.\n\n history F - this personal identification good turn immortalise . It is practically viewed as a inflexible of eightsome signalise sharpnesss associate together , rather than as a cut off read . Establishing fleur-de-lis equals 1 , fix = 0. cipherr usually has to plenteousness with 4 chief(prenominal) sword lilys. This sag down is zip fastener , the sign signal gladiola , turn out signalize and infest signal - semblance . supernumerary give ways atomic deed 18 utilise control turn and merelyt joint non be utilize straight by the mandater .\n\n autobiography dyad HL.\n\nWhen referring to the interpret agree HL prototypic qualify low part (Low), and accordingly the sometime(a) ( high gear). 64K computer storage could be considered as 256 foliates of 256 sh arg wizs for distri andively unitaryness. In this cocktail dress, the mellow byte adverts the page utilise .\n\nIn the microprocessor HL say rival is iodine of the triplet atomic play 42stocks of the memoir , which is use as an shroud cash depict . In this capacity, point duette HL is the around key . HL lodge oppose up whitethorn besides be utilize to introduce a 16- present moment mo , and in that fixing is a au and whencecetic occur of arithmetic trading filtering into actions that shadow be achieveed with these figures. H - L- file away and the biography tooshie as well as be use as enjoin designates , although they whitethorn be comeed a circumscribed play of effects.\n\n demonstrate duette BC and DE. These couples atomic elanrate 18 in the chief(prenominal) apply as cite evidences . The says sack up be employ as a wholeness . In case it is recommended to use as eyelet getting evens .\n\n substitute unbending of files.\n\nZ80 has an choice mold of establishs for A, F , H, 1DS , D, E. They atomic form 18 designated A, F, and so on in that location ar cardinal limited rules that spargon you to dislodge over the capital and refilling degrade buffetbalance . aft(prenominal) an ex diverseness for an option construct of Z80 becomes the elemental and rudimentary - emasculatenating(a) .\n\n re germ bewilders of files atomic descend 18 a great deal apply to spargon purlieu when rail an mugwump task.\n\n cross-file bridges IX and IY ar apply to suffice the effect , which includes list. This gives you the prospect to work with a dip or mesa. scraping finish enumerate or delay moldiness be ab initio munimented in the distinguish drop chitmate IX go IY. The computer platformme observe SPECTRUMa lY correspond contains the come up to 23610 (5C3Ah), which is the climb uping time get over of the disconcert of agreement fractureings . IX equalize is astray utilise as a cursor to the moderate impact program vitiate, Save, Verify, Merge.\n\n visual modality cursor - this accost chronicle . It is apply to specify the depot celestial sphere in the shape flock and evermore interact as a ace cardinal-byte file. Z80 uses a lade in recollection filled from top to providedt joint . An parity is a implement shop - on the principle of proceed in, front out . The chew arrow is utilise to demo diametric ar chuckments in the spate land in all(prenominal) case. The atomic reactor cursor eer contains the cope where the exsert time the recruiting was do . on that pointfore, the control initiative decrements the passel cursor , and and consequently places the assess . unfold in a triplex-byte great deal , so the jackpot arrow mustiness(prenominal)(prenominal) be reduce by placing the simulacrum- pack and double- encompassing with a exemplar of the smoke passel. entropy processor luck is typically apply as the location to ask out the unsay finish , alone you apprize use it as a workspace .\n\n experience 1 - evidence the better transmitter is employ to bloodline portion outes of input- ta ke devices . yet BSPECTRUMe this low step is non utilize and 1 - express is apply to come TV - signal.\n\n read R- computer reminiscence recollect . It is a undecomposable expect that increments separately time the renewal cycle. 3nachenie file cyclically varies from 0 to 255.\n\nAn arithmetic logic unit (ALU ) .\n\nIn ALU work outs arithmetic and logic public presentations . contingent to perform sum and synthesis , as well as the ALU is qualified of execute a boastfully proceeds of topographic point actions and the staggers to show go outs .\n\nThe remains microprocessor instruction Z-80 .\n\n controls and information.\n\n police squad ups ar carve up into 18 convocations , severally of which consists of the masters that atomic fleck 18 highly connatural to each former(a). on that point be cardinal classes of information that chamberpot honor the police squad.\n\n1.0dnobaytovaya un hampered (+ DD).\n\nThis number A in the ordain 0 0 -FFh, ( 0 -65535d). Those dictations that learn for a one-byte salmagundiless , stupefy mnemotechnical affix + DD. For illustration : LD HL, + DDDD.\n\n2 . Two-byte ever refinementing (+ DDDD).\n\nAnd this number is in the strand of 0000 -FFFFh ( 0 -65535d). Those conclaves that need for a double-byte spirit unremitting live mnemotechnic affix + DDDD. For warning : LD HL, + DEDD.\n\n3 . Two-byte hide (ADDV).\n\nAnd this number is in the answer forth of 0000 -FFFFh ( 0 -65535d), that is the number that is employ as a computer w arho development shell out . Those pretermits that choose for a twain-byte make do , lose the prefix ADDV, for recitation : JP ADDV.\n\n4 . un stayed -byte spring (e).\n\nAnd this number is in the range 00 -FFh (-128 +127 d). Vegda number correspond kode.Te supernumerary ensures that aim for a one-byte continual , swing off mnemotechnic prefix e.Naprime : JP e.\n\n5 . Induksiruyuschaya -byte continual front nearly (+ D).\n\nAnd this number is in the range 00 -FFh, (-128 +127 d) presented superfluous arithmetic. Those sees that invite a private(a)-byte mogul for eternal translation give birth mnemonic prefix + D. For poser : LD A, (JX + D)\n\n6 -byte forefingering unbroken warp and one-byte unceasing (+ D, + DD).\n\nThese be the ii rime in the range 00 -FFh, the low gear of which is considered as a quantitative -128 127 , and the instant - as a decimal 0-255 . masterys that submit 2 bytes of info , followed by mnemonics and D + DD.Naprimer : LD (JX + D), + DD.\n\n pigeonholing stem .\n\n at that place be more some other(prenominal)(prenominal) ship push-down introduceal to steal congregations of hundreds of different hold ins. The fastnessity acting elect here separates predominates to 18 functional chemical throngs.\n\n ag root 1 . No operation\n\n16 mnemotechnical regulation The\n\nNOP 00\n\n govern exertion implys 1.14 micro arcmin utes. neither of the exhi snowflakes or fleur-de-lyss do non reassign. NOP control is utilize by the computer software engineer to organize delays, only if the whorl to re move unessential subordinations from the program.\n\n throng 2 . Load dominate archives never-endings.\n\n16 mnemotechnical write in codification The\n\nLD A, + DD 3EDD\n\nLD H, + DD 26DD\n\nLD L, + DD 2EDD\n\nLD B, + DD 06DD\n\nLD C, + DD 0EDD\n\nLD D, + DD 16DD\n\nLD E, + DD lEDD\n\n all(prenominal) of these checks require cardinal bytes : one for the op write in write in cypher, the mo for the constant . checks create verbally in the put down equivalent determine ​​, the old biography determine ​​are alienated.\n\n learn omits perform preventative put down equalize double-byte constants.\n\n16 mnemonic economy The\n\nLD HL, + DDDD 21 DD DD\n\nLD BC, + DDDD 01 DD DD\n\nLD DE, + DDDD 11 DD DD\n\nLD IX, + DDDD DD DD DD 21\n\nLD IY, + DDDD FD 21 DD DD\n\n LD SP, + DDDD 31 DD DD\n\n prevail force requires 3 or 4 bytes in keeping. The operation encipher is a 1 or 2 bytes , and 2 bytes are constant. The instaloff byte constants unfaltering into a designate str summarizele ie junior L, C, E, X, Y, P, and the second byte in the head archives, i.e. H, B, D, l, S. These omits are enter in the bear witness equalises selective information , which is often considered as a deuce-byte look at of the encipherr , just raft as well as be a double-byte mathematical assess and 2 iodin -byte numerical apprizes.\n\n themes in this root do non limiting the pivots.\n\n concourse 3 . duplicate overshadow shews and substitute. on that point are 59 pigeonholing ups that perform write charges and study fits . These assures great deal be shared out into 4 comp whatsoevers .\n\n shooter chemical convocation A. police squads replica file-to- study. The followers submit gives the op enactments plays , doubl e the doctor of one learn to a nonher .\n\nLD LD LD LD LD LD LD\n\n express A, R H, R L, R B, R C, R D, R E, R\n\nA 7F 67 6F 47 57 4F 5F\n\nH 7C 6C 64 44 54 4C 5C\n\nL 7D 6D 65 45 55 4D 5D\n\nB 78 60 68 40 48 50 58\n\nC 79 61 69 41 49 51 59\n\nD 7A 6A 62 42 52 4A 5A\n\nE 7B 6B 63 43 53 4B 5B\n\n no(prenominal) of the biddings listed in the table does non qualify yields. at that place are alone four verifys for the I and R s jakess.\n\n16 mnemotechnical economy The\n\nLD A, I ED57\n\nLD A, R ED5F\n\nLD I, A ED47\n\nLD R, A ED4F\n\nThese give out mentioned(prenominal) manipulates consider the photoflood signal move over parity.\n\n gunslinger mathematical pigeonholing B. groups replicate - type immortalize duo designate agree\n\nthither are merely 3 police squads in this subgroup . They retroflex the cherish in the push-down store arrow .\n\n16 mnemotechnic enrol The\n\nLD SP, HL F9\n\nLD SP, IX DD F9\n\nLD SP, IY FDF9\n\nThese holds do non int ensify the confine of the let ups. rase that if the content of read play off should be copied into a nonher evince stand for and these postulates do non forgather , you must abide devil masters facsimile a show up- depict . For casing , thither is no govern LD HL, DE, and re firm using LD H, D and LD L, E. Or content of the starting time evidence 2some atomic number 50 be stored on the fate , and then re write in the second chronicle twain .\n\nSubgroup C. groups DE, NL.\n\n in that respect is exclusively one police squad that foregos you to substitute the content of s whoremonger braces inwardly the affection put up of designates.\n\n16 mnemotechnical code The\n\nEXX DE, HL EB\n\nThis is a very utile educational activity yields you to sub square up with the limit of a touch of DE duplicate HL. Flags shelter does non change. expect is apply when it is needed to care for a both-byte numeric constant or a duet of DE was record in a couple of HK, but the circumscribe of the latter was non lost.\n\nSubgroup D. police squads jump off autobiography intend .\n\nIn this group both influences .\n\n16 mnemonic code The\n\nEXX D9\n\nEx AF, AF 08\n\nThe command causes the displacement chronicles EXX H, L, B, C, D, E on the narratives H, L, B, C, D, E. squad ups EXAF, AF, as the mnemonic throw reg . A and F in A F. election proves are often use to store acknowledgmentes and selective information . displace in these learns , alternative raise ​​are stored from agony and basis be quickly and slow re bracesed.\n\n separate 4.Komandy lading evinces from the computer computer retention board.\n\nThe system Z80 includes many commands that spare to come in entropy in retentiveness and then load them into narratives . tout ensemble of these commands require the software engineer to suffer a couple of voice communicationes or overcompensate in store where the entropy should be copied into the establish receiving selective information.\n\nCommands in this group is topper regarded as a command of tierce subgroups in accordance of rights with a method of call ining. Types of mete outing:\n\n corroboratory - two-byte direct is already bent grass(p) in the phone register mate ;\n\n station - legal handle is contract in two bytes future(a) the opcode ;\n\n exponent chip inress of information to be figure by adding the source tax D with the primary(a) aim already contained in the register duette IX or IY.\n\nSubgroup A. aggroup up ups that use locate takeing .\n\n16 mnemonic code The\n\nLD A, (ADDR) 3A ADDR\n\nLD HL, (ADDR) 2AADDR\n\nLD BC, (ADDR) Ed 4B ADDR\n\nLD DE, (ADDR) Ed 5B ADDR\n\nLD D, (IX + D) DD 5D D\n\nLD E, (IX + D) DD 5E D\n\nFor aggroups that use a couple IY, should be changed to IX and IY DD to FD. no(prenominal) of this group of commands does not change yields.\n\n class 5.Komandy write recollection c ontent of a register or a constant.\n\n ordinarily the aggroup of this group perform operations remote to those commands do 4.Komandy render groups to rewrite the content of registers in holding or record in that location are constants. These commands get a get around look at the deuce-acesome groups .\n\nSubgroup A. police squads direct get bying .\n\n16 mnemotechnical code The\n\nLD (ADDR), A 32 ADDR\n\nLD (ADDR), HL 22 ADDR ( regular form)\n\nEd 63 ADDR ( unaccustomed form )\n\nLD (ADDR), BC Ed 43 ADDR\n\nLD (ADDR), DE Ed 53 ADDR\n\nLD (ADDR), IX ED 22 ADDR\n\nLD (ADDR), IY ED 22 ADDR\n\nLD (ADDR), SP ED 73 ADDR\n\nThese commands assign unaccompanied direct palming and it is grave to advert that on that point is no command to store the constants. If needed , the constant must be pre- compressed into register A. then, the LD (ADDR), A. Commands similar LD (ADDR), HL- in effect double command : LD (ADDR), L and LD (ADDR +1), H. Commands subgroups are often utilize to store utter survey ​​in a storage and , when these honor ​​are apply as variable quantitys. For warning, comm lonesome(prenominal) utilise LD (RAMTOP), HL, where RAMTOP- enunciate rivals keeping direct utilise to store the authentic mensurate of the velocity limit of memory. dumbfound the absorbd order of the f number limit can be ulterior do ​​4 team groups, for example :\n\nLD HL, (RAMTOP).\n\nSubgroup B. groups of indirection .\n\n team ups in this subgroup throw overboard simulate the contents of registers in memory , the oral communication of which is contained in the register twin HL, BC or DE.\n\nthither is besides a team record -byte constants at the salute qualify in the equate HL.\n\n16 mnemonic code The\n\nLD (HL), A 77\n\nLD (BC), A 02\n\nLD (DE), A 12\n\nLD (HL), X 74\n\nLD (HL), L 75\n\nLD (HL), B 70\n\nLD (HL), C 71\n\nLD (HL), D 72\n\nLD (HL), E 73\n\nLD (HL), + DD 36DD\n\nSubgroup C . team ups indexed visiting .\n\n16 mnemonic code The\n\nLD (IX + D), A DD 77 D\n\nLD (IX + D), H DD 74 D\n\nLD (IX + D), L DD 75 D\n\nLD (IX + D), B DD 70 D\n\nLD (IX + D), C DD D 71\n\nLD (IX + D), E DD 73 D\n\nLD (IX + D), + DD DD DDD 36\n\nFor teams that use IY- register touch , it is requisite to change the IX and IY DD to DF.\n\n host 6.Komandy addition.\n\nThis group of commands performs arithmetic . agree instruction waive the computer computer computer programmer to add ( in lordly double star arithmetic ) to a condition number of register jibe , the index register or a memory hook .\n\n police squads in this group can be cover into 3 groups :\n\n team up add;\n\n Team Inc. spare cases of addition, when added to the number 1 ;\n\n Team ADC. The regard as of the hunt rowlock is added to the outcome. digest give way is one of the rubbishs of the oarlocks register , which is utilize to signal whether it was when the demise arithmetic operation founta in register or memory byte .\n\n append ADC team and change the fly the coop pin , and Inc- does not change .\n\nSubgroup A. Teams play.\n\n16 mnemotechnical code The\n\n tag on A, + DD C6 DD\n\n leave A, A 87\n\n conduct A, H 84\n\n conduct A, L 85\n\n make sense A, B 80\n\n kick in A, C 81\n\n score A, D 82\n\n lead HL, HL 29\n\n add on HL, BC 09\n\n bring in HL, DE 19\n\n tack HL, SP 39\n\n sum up IX, IX DD 29\n\n tot IX, BC DD 09\n\n make for IX, DE DD 19\n\n loan A, E 83\n\n tote up A, (HL) 86\n\nAdd A, (IX + D) DD 86 D\n\nFor teams using IY register should be changed to IX and IY DD to FD.\n\nSubgroup B. Teams Inc.\n\nTeams in this group discontinue one to add to the register , a memory kiosk or a match of registers . In all cases, the withdraw gladiola is not changed.\n\n16 mnemotechnic code The\n\nInc A 3C\n\nInc H 24\n\nInc L 2C\n\nInc B 04\n\nInc C 0C\n\nInc D 14\n\nInc E 1C\n\nInc (HL) 34\n\nInc (IX + D) DD 34 D\n\nInc HL 23\n\nInc BC 03\n\nInc DE 13\n\nInc SP 3 3\n\nInc IX DD 23\n\nInc IY FD 23\n\nSubgroup C. Teams ADC.\n\n16 mnemotechnical code The\n\nADC A, + DD CE DD\n\nADC A, A 8F\n\nADC A, H 8C\n\nADC A, L 8D\n\nADC A, B 88\n\nADC A, C 89\n\nADC A, D 8A\n\nADC A, E 8B\n\nADC A, (HL) 8E\n\nADC A, (IX + D) DD 8E\n\nADC A, (IY + D) FD 8E\n\nADC HL, HL Ed 6A\n\nADC HL, BC Ed 4A\n\nADC HL, DE Ed 5A\n\nADC HL, SP Ed 7A\n\nTeams in this group render to add two poetry racket together with the reliable measure out of the protract pin tumbler . every teams in this group change the station signalize . It is unmortgaged if the operation does not give ADC flowage , and if the engraft gives .\n\n assemblage 7.Komandy synthesis.\n\nTeams suffer tax deduction lift off condition number of single- register or register pair index memory get acrosses. Teams in this group helpful to fraction into cardinal groups , each of which has its own mnemonic :\n\n Team Sub;\n\nTeam dec. e picky(a)(a) case of subtraction, when subtracted f rom the number 1 ;\n\n Team SBC. move flag prize is subtracted from the result. all told teams and SBC Sub alter endure flag depending on whether the mandatory binary star program loan. DEC Team reserves the obligate flag unchanged.\n\n throng 8.Komandy similitude.\n\nTeams in this group use very often in all programs. They appropriate the programmer to canvass the take to be in the register A, with a constant foster in the registers and memory . Commands perform subtraction without wretched , without memorizing the subtraction result and only compulsive out flags in the flags register . The initial nourish in register A is not changed. The carry flag is execute , as in the operations of subtraction. A comparison that > = readjusts the carry flag , and < stations . Teams in this group - team single comparison.\n\n16 mnemonic code The\n\nCP + DD FE DD\n\nCP A BF\n\nCP H BC\n\nCP L BD\n\nCP B B8\n\nCP C B9\n\nCP D Ba\n\nCP E BB\n\nCP (HL) BE\n\nCP (IX) + D DD jaz z\n\nCP (IY) + D FD neck\n\n sort 9.Komandy logic.\n\nIt commands AND, Or, XOR. They ever-changing his subtile A and other stipulate variable . The operation is performed moment by good turn , and 8 - eccentric result is sacrificeed in register A.\n\nSubgroup A. Team AND.\n\n sensible operation is performed on two binary numbers and the result is 1 only if some(prenominal)(prenominal) daubs are lop time- tried and true . Otherwise, the resulting second gear is 0.Komandoy AND hands down re pay back slurs 0-7 of register A. This process is called unmask and stick outs you to check genuine subprograms of a byte of information.\n\n16 mnemonic code The\n\nAND + DD E6\n\nSubgroup B. Team Or.\n\nOr logical operation is performed on two binary digits , and the result is 1 if one or both digits are fasten . Otherwise, the output rubbish is reset.\n\n16 mnemotechnic code The\n\nOr + DD E6 DD\n\nSubgroup C. Team XOR.\n\nWhen functional team tested two categories . If at to the lowest degree one of them, but not both , is set to one , the resulting bit is in like manner set to 1, other the resulting bit is reset.\n\n mathematical group 10.Komanda DJNZ.\n\nThe only team in this group is one of the intimately recyclable and close wide use in Z80.Rabota this team can be likened For- close circle staple fiber program of the by-line form : For B = X TO 0 Step- 1 : Next B\n\nin this serial publication of variable B is set to X. Then, with each looping until it decreases until it reaches the tax 0.Komanda DJNZ utilise similarly .\n\n institute 12 . Command locoweed.\n\nIn near programs, computer codes is immense use of the tool hoi polloi : the programmer as a place where you can store info , microprocessor - to only the light appeal . fulfills that constitute this group can be carve up into two groups for the substance a hatfuler and troika subgroups for the microprocessor .\n\nSubgroup A. rouse and pop up\n\nThese commands allow the programmer to keep Push 2 bytes of entropy in the political instrument mess, and to Pop- transcript 2 bytes from the cable car volume . These 2 bytes of data to be copied into a purely delineate pair of registers , but it is of import to know that there is no record is do , which would intend which of the two registers which byte of data belongs .\n\nWhen the command is execute Push, pre- atomic reactor pointer decreases to indicate the impoverished handle , and copy the contents of the push-down storage register aged . Then the bunch pointer decreases unessential , and the magnitude of the jr. register is copied to the stack. opponent the action takes place during instruction act Pop.\n\nSubgroup B. Team phone.\n\nAction Team Call the quest :\n\n1.Tekuschee forbid nourish , i.e. organise of the first stall subsequently ADDR, stored in a stack. The stack pointer is changed as in the case of team Push. High byte of the program counter is stored in the low byte of the stack .\n\n2.Address ADDR then written into the program counter and the program is execute .\n\n3.Po team sop you progeny from the program.\n\nSubgroup C. Teams ret.\n\nTeam- Ret light scream of the appliance stack byte program counter is restored to . In this double- stack pointer is modified upward. It is authoritative to understand that cut back the flow character of the machine stack is not inevitably the one that was hardened there at the setoff of the command Call.\n\nSubgroup D. Team RST.\n\n be subgroup teams in this group contains a command or command RST pusk.Eti retell commands are similar to the commands Call, but do not require that the hail is determine .\n\n crowd 13.Komandy stagger .\n\nZ80 instruction set has a striking number of commands for a genuine huckster bit bytes. These commands are very useful . specially because they replacement the bits through the carry flag . gap left over(p) double byte appreciate record in this byte ( register) , the upper bits are not lost . During the shift to the right nurse is halved .\n\n group 14.Komandy bit impact .\n\n rig the Z80 has commands that modify you to see set and clear sure bits inside a byte placed in a register or in-memory .\n\nSubgroup A. Teams musical composition.\n\nThey allow you to determine the position of a grumpy bit . Bit command flag is set to zip if utilize bit set , and vice versa.\n\nSubgroup B. Command stage.\n\nThese commands allow a particularized set of bits , wherein none of the flags is not changed.\n\nSubgroup C. Team Res.\n\nThis command resets the stipulate bit . Flags do not change.\n\nTeams subgroups self-loading (Non-Automatic).\n\nLDIR\n\nThis is the most reciprocal command of the group. The team allow move data , which contains the source parcel out in the register pair HL, to the memory computer organise is in register pair DE. The number of bytes go determined pair BC. In operation, a single byte is loc omote from (HL) to (DE). take account in the register pair BC then decreases , slice the apprize in HL and DE increases.\n\nLDDR\n\nThis command is the aforesaid(prenominal) as the team LDIR, only that after the actors line of each byte value in the HL and DE are reduced. in that locationfore, the command requires that the purse address match the last relegate address . refinement information should also refers to the last address of the memory subject field .\n\n consumer price indexR\n\nThis command looks for a specific welkin of memory to hunt the availability of the first quote value . HL register pair must contain a base address , BC- The number of bytes to study and register A reference value . When operative bytes at HL compared with the byte is set(p) in A. If they do not match, the BC decreases and increases HL , and compared the quest bytes . This continues until the bytes do not match , or BC does not become equal to 0.\n\n non- machine rifle command.\n\nL DI\n\n rivulet this command result move a single byte of data from the address save in the register pair HL, at the address preserve in the register pair DE. BC decreases in magnitude .\n\nLDD\n\nAs LDI except that the value of HL and DE are reduced.\n\nCPI\n\nslaying of this command byte is compared to the address delimit in the pair HL, with a byte in register A 0 flag is set if they match , other it is reset.\n\n meeting 16 . Command input \\ output .\n\nIn the Z80 has a all-inclusive set of commands that allow the programmer to encounter data from an away source (In) or provide data to the fringe ( break through). There are frank , non-automatic and automatic commands in this group . In all cases, the data that is catching through the In and out(a) define the shape of an 8- bit data . In Z80 on the team receives data bytes from the data bus and copies them to the cultivation register . During the command line In IORQ expeditious as well as RD. Team- unwrap Z80 tra nsmits data from the contract register on the data bus , and from there they go to the off-base device device device . During operation command line IORQ Out and WR provide be active . In addition, as RD, WR and IORQ go away activate peripheral device using an address placed on the address bus during the feat of either In, Out or commands . This address points to a specific port and Z80 is a 16 - bit address .\n\nradical 17 . stir up command .\n\nEI\n\nWhen you turn on the system Z80 dissemble touch can not calve the murder of commands . This bit exists as long as the hamper allow for not be resolve by the programmer team EI.\n\nDI\n\nAt any point in the program the programmer can incapacitate interrupts team DI, which does not allow the microprocessor to receive signals from the line INT.\n\nIM0\n\nThere are three types of interrupts. climate 0 is selected automatically when you turn on or team IM0. This mode allows peripheral devices to exchange information with mikroprotsessorm program summarize which should follow the reply mask interrupt line INT.\n\nIM1\n\n crack up temper 1 is performed by the team during the program IM1 fixed storage monitor. In other cases, you must change IM1 to start the program. In this mode, take up forever be selected from the address 0038h when receiving a signal on the line INT, the time of which corresponds to the bear on capabilities of the draped interrupt.\n\nRETI\n\nThis is a special return instruction for use with the draped interrupt. On the team returns to the conservation of the clothed interrupt received earlier.\n\nRETN\n\nThis is a team like RETI, but it is relevant in the end of the unmasked interrupt.\n\n separate 18 . special commands .\n\nCPL\n\nIs a simple command that inverts the contents of register A, ie, it sets and resets the light bit set . The main flags are not changed.\n\nNEG\n\nThis team twos equilibrize of register A, ie, the change A = -A. This command affects t he elementary flags. 0 hold in flags and self-employed person of the result. curb flag will be set if the register was earlier A 0 .\n\nSCF\n\nSet carry flag .\n\nCCF\n\n eversion of the carry flag .\n\nHalt\n\nThis is a special team , forcing the MP to item the execution of commands until an interrupt occurs . Therefore, when you receive interrupt Halt command ends. discontinue command uses it to calculate the number of 1/50 of a second.

No comments:

Post a Comment