SlideShare a Scribd company logo
1
Chapter 2
8085 Microprocessor Architecture and
Microcomputer Systems
2
Microprocessor Architecture
• The microprocessor can be programmed to
perform functions on given data by writing
specific instructions into its memory.
– The microprocessor reads one instruction at a
time, matches it with its instruction set, and
performs the data manipulation specified.
– The result is either stored back into memory or
displayed on an output device.
3
The 8085 Architecture
• The 8085 uses three separate busses to perform
its operations
– The address bus.
– The data bus.
– The control bus.
4
The Address Bus
– 16 bits wide (A0 A1…A15)
• Therefore, the 8085 can access locations with numbers
from 0 to 65,536. Or, the 8085 can access a total of 64K
addresses.
– “Unidirectional”.
• Information flows out of the microprocessor and into the
memory or peripherals.
– When the 8085 wants to access a peripheral or a
memory location, it places the 16-bit address on
the address bus and then sends the appropriate
control signals.
5
The Data Bus
– 8 bits wide (D0 D1…D7)
– “Bi-directional”.
• Information flows both ways between the microprocessor
and memory or I/O.
– The 8085 uses the data bus to transfer the binary
information.
– Since the data bus has 8-bits only, then the 8085
can manipulate data 8 bits at-a-time only.
6
The Control Bus
– There is no real control bus. Instead, the control
bus is made up of a number of single bit control
signals.
7
Operation Types in a Microprocessor
• All of the operations of the microprocessor can
be classified into one of three types:
- Microprocessor Initiated Operations
- Internal Operations
- Peripheral Initiated Operations
8
Microprocessor Initiated Operations
• These are operations that the microprocessor
itself starts.
• These are usually one of 4 operations:
– Memory Read
– Memory Write
– I/O Read (Get data from an input device)
– I/O write (Send data to an output device)
9
Microprocessor Initiated Operations
• It is important to note that the microprocessor
treats memory and I/O devices the same way.
– Input and output devices simply look like memory
locations to the microprocessor.
• For example, the keyboard may look like memory
address A3F2H. To get what key is being pressed, the
microprocessor simply reads the data at location A3F2H.
– The communication process between the
microprocessor and peripheral devices consist of
the following three steps:
– Identify the address.
– Transfer the binary information.
– Provide the right timing signals.
10
The Read Operation
– To read the contents of a memory location, the
following steps take place:
• The microprocessor places the 16-bit address of the
memory location on the address bus.
• The microprocessor activates a control signal called
“memory read” which enables the memory chip.
• The memory decodes the address and identifies the right
location.
• The memory places the contents on the data bus.
• The microprocessor reads the value of the data bus after
a certain amount of time.
11
Internal Data Operations
• The 8085 can perform a number of internal
operations. Such as: storing data, Arithmetic &
Logic operations, Testing for condition, etc.
– To perform these operations, the microprocessor
needs an internal architecture similar to the
following:
Accumulator Flags
B C
D E
H L
Program Counter
Stack Pointer
DataAddress 816
12
8085 Internal Registers
13
8086 Internal Registers
14
The Internal Architecture
• We have already discussed the general purpose
registers, the Accumulator, and the flags.
• The Program Counter (PC)
– This is a register that is used to control the
sequencing of the execution of instructions.
– This register always holds the address of the next
instruction.
– Since it holds an address, it must be 16 bits wide.
15
The Internal Architecture
• The Stack pointer
– The stack pointer is also a 16-bit register that is
used to point into memory.
– The memory this register points to is a special
area called the stack.
– The stack is an area of memory used to hold data
that will be retreived soon.
– The stack is usually accessed in a Last In First
Out (LIFO) fashion.
16
Externally Initiated Operations
• External devices can initiate (start) one of the 4
following operations:
– Reset
• All operations are stopped and the program counter is
reset to 0000.
– Interrupt
• The microprocessor’s operations are interrupted and the
microprocessor executes what is called a “service
routine”.
• This routine “handles” the interrupt, (perform the
necessary operations). Then the microprocessor returns
to its previous operations and continues.
17
Externally Initiated Operations
– Ready
• The 8085 has a pin called RDY. This pin is used by
external devices to stop the 8085 until they catch up.
• As long as the RDY pin is low, the 8085 will be in a wait
state.
– Hold
• The 8085 has a pin called HOLD. This pin is used by
external devices to gain control of the busses.
• When the HOLD signal is activated by an external
device, the 8085 stops executing instructions and stops
using the busses.
• This would allow external devices to control the
information on the busses. Example DMA.
18
The Design and Operation of Memory
• Memory in a microprocessor system is where
information (data and instructions) is kept. It can
be classified into two main types:
• Main memory (RAM and ROM)
• Storage memory (Disks , CD ROMs, etc.)
– The simple view of RAM is that it is made up of
registers that are made up of flip-flops (or memory
elements).
• The number of flip-flops in a “memory register”
determines the size of the memory word.
– ROM on the other hand uses diodes instead of the
flip-flops to permanently hold the information.
19
Accessing Information in Memory
• For the microprocessor to access (Read or Write)
information in memory (RAM or ROM), it needs
to do the following:
– Select the right memory chip (using part of the
address bus).
– Identify the memory location (using the rest of the
address bus).
– Access the data (using the data bus).
2
0
Instruction Fetch
21
Tri-State Buffers
• An important circuit element that is used
extensively in memory.
• This buffer is a logic circuit that has three states:
– Logic 0, logic1, and high impedance.
– When this circuit is in high impedance mode it
looks as if it is disconnected from the output
completely.
The Output is Low The Output is High High Impedance
2
2
The Tri-State Buffer
• This circuit has two inputs and one output.
– The first input behaves like the normal input for
the circuit.
– The second input is an “enable”.
• If it is set high, the output follows the proper circuit
behavior.
• If it is set low, the output looks like a wire connected to
nothing.
Input Output
Enable
Input Output
Enable
OR
2
3
The Basic Memory Element
• The basic memory element is similar to a D latch.
• This latch has an input where the data comes in.
It has an enable input and an output on which
data comes out.
QD
EN
Data Input Data Output
Enable
2
4
The Basic Memory Element
• However, this is not safe.
– Data is always present on the input and the output
is always set to the contents of the latch.
– To avoid this, tri-state buffers are added at the
input and output of the latch.
QD
EN
Data Input Data Output
Enable
WR RD
2
5
The Basic Memory Element
• The WR signal controls the input buffer.
– The bar over WR means that this is an active low
signal.
– So, if WR is 0 the input data reaches the latch
input.
– If WR is 1 the input of the latch looks like a wire
connected to nothing.
• The RD signal controls the output in a similar
manner.
2
6
A Memory “Register”
• If we take four of these latches and connect them
together, we would have a 4-bit memory register
WR
RD
EN
Q
D
EN
Q
D
EN
Q
D
EN
Q
D
EN
I0 I1 I2 I3
O0 O1 O2 O3
2
7
A group of memory registers
– Expanding on this
scheme to add more
memory registers we get
the diagram to the right.
D
EN
Q D
EN
Q D
EN
Q D
EN
Q
D
EN
Q D
EN
Q D
EN
Q D
EN
Q
D
EN
Q D
EN
Q D
EN
Q D
EN
Q
D
EN
Q D
EN
Q D
EN
Q D
EN
Q
D0 D1 D2 D3
D0 D1 D2 D3
oooo
oooo
WR
RD
2
8
A group of Memory Registers
– If we represent each memory location (Register)
as a block we get the following
Input Buffers
Output Buffers
Memory Reg. 0
Memory Reg. 1
Memory Reg. 2
Memory Reg. 3
I0 I1 I2 I3
O0 O1 O2 O3
WR
EN0
EN1
EN2
EN3
RD
2
9
The Design of a Memory Chip
• Using the RD and WR controls we can determine
the direction of flow either into or out of memory.
Then using the appropriate Enable input we
enable an individual memory register.
• What we have just designed is a memory with 4
locations and each location has 4 elements (bits).
This memory would be called 4 X 4 [Number of
location X number of bits per location].
3
0
The Enable Inputs
• How do we produce these enable line?
– Since we can never have more than one of these
enables active at the same time, we can have
them encoded to reduce the number of lines
coming into the chip.
– These encoded lines are the address lines for
memory.
31
The Design of a Memory Chip
– So, the previous diagram would now look like the
following:
Input Buffers
Output Buffers
Memory Reg. 0
Memory Reg. 1
Memory Reg. 2
Memory Reg. 3
I0 I1 I2 I3
O0 O1 O2 O3
WR
RD
A
d
d
r
e
s
s
D
e
c
o
d
e
r
A1
A0
3
2
The Design of a Memory Chip
• Since we have tri-state buffers on both the inputs
and outputs of the flip flops, we can actually use
one set of pins only.
– The chip would now look like this:
Input Buffers
Output Buffers
Memory Reg. 0
Memory Reg. 1
Memory Reg. 2
Memory Reg. 3
WR
RD
A
d
d
r
e
s
s
D
e
c
o
d
e
r
A1
A0
D0
D1
D2
D3
D0
D1
D2
D3
A1
A0
RD WR
3
3
The steps of writing into Memory
• What happens when the programmer issues the
STA instruction?
– The microprocessor would turn on the WR control
(WR = 0) and turn off the RD control (RD = 1).
– The address is applied to the address decoder
which generates a single Enable signal to turn on
only one of the memory registers.
– The data is then applied on the data lines and it is
stored into the enabled register.
3
4
Dimensions of Memory
• Memory is usually measured by two numbers: its
length and its width (Length X Width).
• The length is the total number of locations.
• The width is the number of bits in each location.
– The length (total number of locations) is a function
of the number of address lines.
# of memory locations = 2( # of address lines)
• So, a memory chip with 10 address lines would have
210 = 1024 locations (1K)
• Looking at it from the other side, a memory chip with 4K
locations would need
Log2 4096=12 address lines
3
5
The 8085 and Memory
• The 8085 has 16 address lines. That means it
can address
216 = 64K memory locations.
– Then it will need 1 memory chip with 64 k
locations, or 2 chips with 32 K in each, or 4 with
16 K each or 16 of the 4 K chips, etc.
• how would we use these address lines to control
the multiple chips?
3
6
Chip Select
• Usually, each memory chip has a CS (Chip
Select) input. The chip will only work if an active
signal is applied on that input.
• To allow the use of multiple chips in the make up
of memory, we need to use a number of the
address lines for the purpose of “chip selection”.
– These address lines are decoded to generate the
2n necessary CS inputs for the memory chips to
be used.
3
7
Chip Selection Example
– Assume that we need to build a memory system
made up of 4 of the 4 X 4 memory chips we
designed earlier.
– We will need to use 2 inputs and a decoder to
identify which chip will be used at what time.
– The resulting design would now look like the one
on the following slide.
3
8
Chip Selection Example
CS
RD WR
A0
A1
CS
RD WR
A0
A1
CS
RD WR
A0
A1
CS
RD WR
A0
A1
2 X4
DecoderA3
A2
A1
A0
RD
WR
D1
D0
3
9
Memory Map and Addresses
• The memory map is a picture representation of
the address range and shows where the different
memory chips are located within the address
range.
0000
FFFF
AddressRange
RAM 1
RAM 2
RAM 3
RAM 4
EPROM
0000
3FFF
4400
5FFF
6000
8FFF
9000
A3FF
A400
F7FF
Address Range of EPROM Chip
Address Range of 1st RAM Chip
Address Range of 2nd RAM Chip
Address Range of 3rd RAM Chip
Address Range of 4th RAM Chip
4
0
Address Range of a Memory Chip
• The address range of a particular chip is the list
of all addresses that are mapped to the chip.
– An example for the address range and its
relationship to the memory chips would be the
Post Office Boxes in the post office.
– Each box has its unique number that is assigned
sequentially. (memory locations)
– The boxes are grouped into groups. (memory chips)
– The first box in a group has the number immediately after
the last box in the previous group.
41
Address Range of a Memory Chip
– The above example can be modified slightly to
make it closer to our discussion on memory.
– Let’s say that this post office has only 1000 boxes.
– Let’s also say that these are grouped into 10 groups of 100
boxes each. Boxes 0000 to 0099 are in group 0, boxes
0100 to 0199 are in group 1 and so on.
– We can look at the box number as if it is made up
of two pieces:
– The group number and the box’s index within the group.
– So, box number 436 is the 36th box in the 4th group.
The upper digit of the box number identifies the group and the
lower two digits identify the box within the group.
4
2
The 8085 and Address Ranges
• The 8085 has 16 address lines. So, it can
address a total of 64K memory locations.
– If we use memory chips with 1K locations each,
then we will need 64 such chips.
– The 1K memory chip needs 10 address lines to
uniquely identify the 1K locations. (log2
1024 = 10)
– That leaves 6 address lines which is the exact
number needed for selecting between the 64
different chips (log2
64 = 6).
4
3
The 8085 and Address Ranges
• Now, we can break up the 16-bit address of the
8085 into two pieces:
A15 A14 A13 A12 A11 A10 A9 A8 A7 A6 A5 A4 A3 A2 A1 A0
– Depending on the combination on the address lines
A15 - A10 , the address range of the specified chip is
determined.
Location Selection within the ChipChip Selection
4
4
Chip Select Example
• A chip that uses the combination A15 - A10 =
001000 would have addresses that range from
2000H to 23FFH.
– Keep in mind that the 10 address lines on the chip gives a range of
00 0000 0000 to 11 1111 1111 or 000H to 3FFH for each of the
chips.
– The memory chip in this example would require the following circuit
on its chip select input:
CS
A10
A11
A12
A13
A14
A15
4
5
Chip Select Example
• If we change the above combination to the
following:
– Now the chip would have addresses ranging from:
2400 to 27FF.
– Changing the combination of the address bits
connected to the chip select changes the address
range for the memory chip.
CS
A10
A11
A12
A13
A14
A15
4
6
Chip Select Example
– To illustrate this with a picture:
• in the first case, the memory chip occupies the piece of
the memory map identified as before.
• In the second case, it occupies the piece identified as
after.
0000
2000
23FF
FFFF
0000
2400
27FF
FFFF
Before After
4
7
High-Order vs. Low-Order Address Lines
• The address lines from a microprocessor can be
classified into two types:
– High-Order
• Used for memory chip selection
– Low-Order
• Used for location selection within a memory chip.
– This classification is highly dependent on the
memory system design.
4
8
Data Lines
• All of the above discussion has been regarding
memory length. Lets look at memory width.
• We said that the width is the number of bits in
each memory word.
– We have been assuming so far that our memory
chips have the right width.
– What if they don’t?
• It is very common to find memory chips that have only 4
bits per location. How would you design a byte wide
memory system using these chips?
• We use two chips for the same address range. One chip
will supply 4 of the data bits per address and the other
chip supply the other 4 data bits for the same address.
4
9
Data Lines
CS
A0
…
A9
CS CS
D0
…
D3
D4
…
D7
Ad

More Related Content

What's hot (20)

Chapter 3 instruction set-of-8085
Chapter 3 instruction set-of-8085Chapter 3 instruction set-of-8085
Chapter 3 instruction set-of-8085
Shubham Singh
 
Microprogrammed Control Unit
Microprogrammed Control UnitMicroprogrammed Control Unit
Microprogrammed Control Unit
PreethiSureshkumar1
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
Er. Nawaraj Bhandari
 
CS304PC:Computer Organization and Architecture Session 11 general register or...
CS304PC:Computer Organization and Architecture Session 11 general register or...CS304PC:Computer Organization and Architecture Session 11 general register or...
CS304PC:Computer Organization and Architecture Session 11 general register or...
Guru Nanak Technical Institutions
 
8086 microprocessor-architecture
8086 microprocessor-architecture8086 microprocessor-architecture
8086 microprocessor-architecture
prasadpawaskar
 
General register organization (computer organization)
General register organization  (computer organization)General register organization  (computer organization)
General register organization (computer organization)
rishi ram khanal
 
Memory mapping
Memory mappingMemory mapping
Memory mapping
SnehalataAgasti
 
Memory Addressing
Memory AddressingMemory Addressing
Memory Addressing
chauhankapil
 
Register of 80386
Register of 80386Register of 80386
Register of 80386
aviban
 
Internal Architecture of 8086| msbte sem 4 microprocessor
Internal Architecture of 8086| msbte sem 4 microprocessorInternal Architecture of 8086| msbte sem 4 microprocessor
Internal Architecture of 8086| msbte sem 4 microprocessor
AKSHAYBHABAD5
 
Memory & I/O interfacing
Memory & I/O  interfacingMemory & I/O  interfacing
Memory & I/O interfacing
deval patel
 
Instruction sets of 8086
Instruction sets of 8086Instruction sets of 8086
Instruction sets of 8086
Mahalakshmiv11
 
8086 String Instructions.pdf
8086 String Instructions.pdf8086 String Instructions.pdf
8086 String Instructions.pdf
A. S. M. Badrudduza
 
Chapter 1-Microprocessors, Microcomputers, and Assembly Language
Chapter 1-Microprocessors, Microcomputers, and Assembly LanguageChapter 1-Microprocessors, Microcomputers, and Assembly Language
Chapter 1-Microprocessors, Microcomputers, and Assembly Language
cmkandemir
 
80486 microprocessor
80486 microprocessor80486 microprocessor
80486 microprocessor
Mihika Shah
 
8237 / 8257 DMA
8237 / 8257 DMA8237 / 8257 DMA
8237 / 8257 DMA
AJAL A J
 
Unit 2 mpmc
Unit 2 mpmcUnit 2 mpmc
Unit 2 mpmc
tamilnesaner
 
Instruction pipeline: Computer Architecture
Instruction pipeline: Computer ArchitectureInstruction pipeline: Computer Architecture
Instruction pipeline: Computer Architecture
InteX Research Lab
 
3.programmable interrupt controller 8259
3.programmable interrupt controller 82593.programmable interrupt controller 8259
3.programmable interrupt controller 8259
MdFazleRabbi18
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organization
chnrketan
 
Chapter 3 instruction set-of-8085
Chapter 3 instruction set-of-8085Chapter 3 instruction set-of-8085
Chapter 3 instruction set-of-8085
Shubham Singh
 
CS304PC:Computer Organization and Architecture Session 11 general register or...
CS304PC:Computer Organization and Architecture Session 11 general register or...CS304PC:Computer Organization and Architecture Session 11 general register or...
CS304PC:Computer Organization and Architecture Session 11 general register or...
Guru Nanak Technical Institutions
 
8086 microprocessor-architecture
8086 microprocessor-architecture8086 microprocessor-architecture
8086 microprocessor-architecture
prasadpawaskar
 
General register organization (computer organization)
General register organization  (computer organization)General register organization  (computer organization)
General register organization (computer organization)
rishi ram khanal
 
Register of 80386
Register of 80386Register of 80386
Register of 80386
aviban
 
Internal Architecture of 8086| msbte sem 4 microprocessor
Internal Architecture of 8086| msbte sem 4 microprocessorInternal Architecture of 8086| msbte sem 4 microprocessor
Internal Architecture of 8086| msbte sem 4 microprocessor
AKSHAYBHABAD5
 
Memory & I/O interfacing
Memory & I/O  interfacingMemory & I/O  interfacing
Memory & I/O interfacing
deval patel
 
Instruction sets of 8086
Instruction sets of 8086Instruction sets of 8086
Instruction sets of 8086
Mahalakshmiv11
 
Chapter 1-Microprocessors, Microcomputers, and Assembly Language
Chapter 1-Microprocessors, Microcomputers, and Assembly LanguageChapter 1-Microprocessors, Microcomputers, and Assembly Language
Chapter 1-Microprocessors, Microcomputers, and Assembly Language
cmkandemir
 
80486 microprocessor
80486 microprocessor80486 microprocessor
80486 microprocessor
Mihika Shah
 
8237 / 8257 DMA
8237 / 8257 DMA8237 / 8257 DMA
8237 / 8257 DMA
AJAL A J
 
Instruction pipeline: Computer Architecture
Instruction pipeline: Computer ArchitectureInstruction pipeline: Computer Architecture
Instruction pipeline: Computer Architecture
InteX Research Lab
 
3.programmable interrupt controller 8259
3.programmable interrupt controller 82593.programmable interrupt controller 8259
3.programmable interrupt controller 8259
MdFazleRabbi18
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organization
chnrketan
 

Similar to Chapter 2-8085 Microprocessor Architecture and Microcomputer Systems (20)

8085 Microprocessor Architecture
8085 Microprocessor Architecture8085 Microprocessor Architecture
8085 Microprocessor Architecture
deval patel
 
Microprocessor Architecture
Microprocessor ArchitectureMicroprocessor Architecture
Microprocessor Architecture
Avijeet Negel
 
1.microprocessor
1.microprocessor1.microprocessor
1.microprocessor
raja p
 
8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt
8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt
8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt
jeronimored
 
architect.ppt
architect.pptarchitect.ppt
architect.ppt
SELVAPRIYAA2
 
Microprocessor 8085 Chapter 3
Microprocessor 8085 Chapter 3Microprocessor 8085 Chapter 3
Microprocessor 8085 Chapter 3
Rishikesh Bhavsar
 
Unit 2.ppt
Unit 2.pptUnit 2.ppt
Unit 2.ppt
sharonmarishkawilfre
 
Microprocessor and Application (8085)
Microprocessor and Application (8085)Microprocessor and Application (8085)
Microprocessor and Application (8085)
ufaq kk
 
12 mt06ped001
12 mt06ped001 12 mt06ped001
12 mt06ped001
vijaydeepakg
 
Unit 2 - Microprocessor & Microcontroller.pptx
Unit 2 -  Microprocessor & Microcontroller.pptxUnit 2 -  Microprocessor & Microcontroller.pptx
Unit 2 - Microprocessor & Microcontroller.pptx
Charunnath S V
 
MP_MC.pdf
MP_MC.pdfMP_MC.pdf
MP_MC.pdf
KRamasamy2
 
Mp 8085
Mp 8085Mp 8085
Mp 8085
sharan Kumar
 
Part of UNIT2 Memory mapped IOjkl;'lk.pdf
Part of UNIT2 Memory mapped IOjkl;'lk.pdfPart of UNIT2 Memory mapped IOjkl;'lk.pdf
Part of UNIT2 Memory mapped IOjkl;'lk.pdf
Abhishekkumar397974
 
Module -4_microprocessor (1).pptx
Module -4_microprocessor (1).pptxModule -4_microprocessor (1).pptx
Module -4_microprocessor (1).pptx
DrVaibhavMeshram
 
8085 Microprocessor - Ramesh Gaonkar.pdf-27 (1).pptx
8085 Microprocessor - Ramesh Gaonkar.pdf-27 (1).pptx8085 Microprocessor - Ramesh Gaonkar.pdf-27 (1).pptx
8085 Microprocessor - Ramesh Gaonkar.pdf-27 (1).pptx
sruti009988
 
Computer Organization and ArchitectureCh 4 MARIE(PPT).pdf
Computer Organization and ArchitectureCh 4 MARIE(PPT).pdfComputer Organization and ArchitectureCh 4 MARIE(PPT).pdf
Computer Organization and ArchitectureCh 4 MARIE(PPT).pdf
gadisaAdamu
 
8085 Architecture
8085 Architecture8085 Architecture
8085 Architecture
deval patel
 
Introduction to 8085svv
Introduction to 8085svvIntroduction to 8085svv
Introduction to 8085svv
Shivashekharayya Viraktamath
 
8085 microprocessor architecture
8085 microprocessor architecture8085 microprocessor architecture
8085 microprocessor architecture
Arashdeepkaur16
 
Microprocessor history1
Microprocessor history1Microprocessor history1
Microprocessor history1
HarshitParkar6677
 
8085 Microprocessor Architecture
8085 Microprocessor Architecture8085 Microprocessor Architecture
8085 Microprocessor Architecture
deval patel
 
Microprocessor Architecture
Microprocessor ArchitectureMicroprocessor Architecture
Microprocessor Architecture
Avijeet Negel
 
1.microprocessor
1.microprocessor1.microprocessor
1.microprocessor
raja p
 
8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt
8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt
8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt
jeronimored
 
Microprocessor 8085 Chapter 3
Microprocessor 8085 Chapter 3Microprocessor 8085 Chapter 3
Microprocessor 8085 Chapter 3
Rishikesh Bhavsar
 
Microprocessor and Application (8085)
Microprocessor and Application (8085)Microprocessor and Application (8085)
Microprocessor and Application (8085)
ufaq kk
 
Unit 2 - Microprocessor & Microcontroller.pptx
Unit 2 -  Microprocessor & Microcontroller.pptxUnit 2 -  Microprocessor & Microcontroller.pptx
Unit 2 - Microprocessor & Microcontroller.pptx
Charunnath S V
 
Part of UNIT2 Memory mapped IOjkl;'lk.pdf
Part of UNIT2 Memory mapped IOjkl;'lk.pdfPart of UNIT2 Memory mapped IOjkl;'lk.pdf
Part of UNIT2 Memory mapped IOjkl;'lk.pdf
Abhishekkumar397974
 
Module -4_microprocessor (1).pptx
Module -4_microprocessor (1).pptxModule -4_microprocessor (1).pptx
Module -4_microprocessor (1).pptx
DrVaibhavMeshram
 
8085 Microprocessor - Ramesh Gaonkar.pdf-27 (1).pptx
8085 Microprocessor - Ramesh Gaonkar.pdf-27 (1).pptx8085 Microprocessor - Ramesh Gaonkar.pdf-27 (1).pptx
8085 Microprocessor - Ramesh Gaonkar.pdf-27 (1).pptx
sruti009988
 
Computer Organization and ArchitectureCh 4 MARIE(PPT).pdf
Computer Organization and ArchitectureCh 4 MARIE(PPT).pdfComputer Organization and ArchitectureCh 4 MARIE(PPT).pdf
Computer Organization and ArchitectureCh 4 MARIE(PPT).pdf
gadisaAdamu
 
8085 Architecture
8085 Architecture8085 Architecture
8085 Architecture
deval patel
 
8085 microprocessor architecture
8085 microprocessor architecture8085 microprocessor architecture
8085 microprocessor architecture
Arashdeepkaur16
 
Ad

More from cmkandemir (20)

Temel HTML Etiketleri ve Kullanım Örnekleri
Temel HTML Etiketleri ve Kullanım ÖrnekleriTemel HTML Etiketleri ve Kullanım Örnekleri
Temel HTML Etiketleri ve Kullanım Örnekleri
cmkandemir
 
Yapay Zeka Nedir?
Yapay Zeka Nedir?Yapay Zeka Nedir?
Yapay Zeka Nedir?
cmkandemir
 
Zekayı Anlamak
Zekayı AnlamakZekayı Anlamak
Zekayı Anlamak
cmkandemir
 
PHP - Kullanıcı Girişlerinin İşlenmesi
PHP - Kullanıcı Girişlerinin İşlenmesiPHP - Kullanıcı Girişlerinin İşlenmesi
PHP - Kullanıcı Girişlerinin İşlenmesi
cmkandemir
 
Chapter 7 - Programming Techniques with Additional Instructions
Chapter 7 - Programming Techniques with Additional InstructionsChapter 7 - Programming Techniques with Additional Instructions
Chapter 7 - Programming Techniques with Additional Instructions
cmkandemir
 
Chapter 6 - Introduction to 8085 Instructions
Chapter 6 - Introduction to 8085 InstructionsChapter 6 - Introduction to 8085 Instructions
Chapter 6 - Introduction to 8085 Instructions
cmkandemir
 
Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 2
Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 2Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 2
Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 2
cmkandemir
 
Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 1
Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 1Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 1
Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 1
cmkandemir
 
Matching Game In Java
Matching Game In JavaMatching Game In Java
Matching Game In Java
cmkandemir
 
impress.js Framework
impress.js Frameworkimpress.js Framework
impress.js Framework
cmkandemir
 
openCV and Java - Face Detection
openCV and Java - Face DetectionopenCV and Java - Face Detection
openCV and Java - Face Detection
cmkandemir
 
PHP ve MySQL Bağlantısı - Temel İşlemler
PHP ve MySQL Bağlantısı - Temel İşlemlerPHP ve MySQL Bağlantısı - Temel İşlemler
PHP ve MySQL Bağlantısı - Temel İşlemler
cmkandemir
 
CSS Uygulamaları 1
CSS Uygulamaları 1CSS Uygulamaları 1
CSS Uygulamaları 1
cmkandemir
 
CSS - Sunum Bileşenleri
CSS - Sunum BileşenleriCSS - Sunum Bileşenleri
CSS - Sunum Bileşenleri
cmkandemir
 
Kod Akış Kontrolü - Döngüler, Fonksiyonlar
Kod Akış Kontrolü - Döngüler, FonksiyonlarKod Akış Kontrolü - Döngüler, Fonksiyonlar
Kod Akış Kontrolü - Döngüler, Fonksiyonlar
cmkandemir
 
Web Sitesi Geliştirme Adımları
Web Sitesi Geliştirme AdımlarıWeb Sitesi Geliştirme Adımları
Web Sitesi Geliştirme Adımları
cmkandemir
 
CSS - Genel Bakış
CSS - Genel BakışCSS - Genel Bakış
CSS - Genel Bakış
cmkandemir
 
Threads and Game Programming In Java
Threads and Game Programming In JavaThreads and Game Programming In Java
Threads and Game Programming In Java
cmkandemir
 
JDK and Eclipse Installation and Configuration
JDK and Eclipse Installation and ConfigurationJDK and Eclipse Installation and Configuration
JDK and Eclipse Installation and Configuration
cmkandemir
 
Temel HTML Etiketleri - Tablo, Form
Temel HTML Etiketleri - Tablo, FormTemel HTML Etiketleri - Tablo, Form
Temel HTML Etiketleri - Tablo, Form
cmkandemir
 
Temel HTML Etiketleri ve Kullanım Örnekleri
Temel HTML Etiketleri ve Kullanım ÖrnekleriTemel HTML Etiketleri ve Kullanım Örnekleri
Temel HTML Etiketleri ve Kullanım Örnekleri
cmkandemir
 
Yapay Zeka Nedir?
Yapay Zeka Nedir?Yapay Zeka Nedir?
Yapay Zeka Nedir?
cmkandemir
 
Zekayı Anlamak
Zekayı AnlamakZekayı Anlamak
Zekayı Anlamak
cmkandemir
 
PHP - Kullanıcı Girişlerinin İşlenmesi
PHP - Kullanıcı Girişlerinin İşlenmesiPHP - Kullanıcı Girişlerinin İşlenmesi
PHP - Kullanıcı Girişlerinin İşlenmesi
cmkandemir
 
Chapter 7 - Programming Techniques with Additional Instructions
Chapter 7 - Programming Techniques with Additional InstructionsChapter 7 - Programming Techniques with Additional Instructions
Chapter 7 - Programming Techniques with Additional Instructions
cmkandemir
 
Chapter 6 - Introduction to 8085 Instructions
Chapter 6 - Introduction to 8085 InstructionsChapter 6 - Introduction to 8085 Instructions
Chapter 6 - Introduction to 8085 Instructions
cmkandemir
 
Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 2
Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 2Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 2
Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 2
cmkandemir
 
Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 1
Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 1Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 1
Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 1
cmkandemir
 
Matching Game In Java
Matching Game In JavaMatching Game In Java
Matching Game In Java
cmkandemir
 
impress.js Framework
impress.js Frameworkimpress.js Framework
impress.js Framework
cmkandemir
 
openCV and Java - Face Detection
openCV and Java - Face DetectionopenCV and Java - Face Detection
openCV and Java - Face Detection
cmkandemir
 
PHP ve MySQL Bağlantısı - Temel İşlemler
PHP ve MySQL Bağlantısı - Temel İşlemlerPHP ve MySQL Bağlantısı - Temel İşlemler
PHP ve MySQL Bağlantısı - Temel İşlemler
cmkandemir
 
CSS Uygulamaları 1
CSS Uygulamaları 1CSS Uygulamaları 1
CSS Uygulamaları 1
cmkandemir
 
CSS - Sunum Bileşenleri
CSS - Sunum BileşenleriCSS - Sunum Bileşenleri
CSS - Sunum Bileşenleri
cmkandemir
 
Kod Akış Kontrolü - Döngüler, Fonksiyonlar
Kod Akış Kontrolü - Döngüler, FonksiyonlarKod Akış Kontrolü - Döngüler, Fonksiyonlar
Kod Akış Kontrolü - Döngüler, Fonksiyonlar
cmkandemir
 
Web Sitesi Geliştirme Adımları
Web Sitesi Geliştirme AdımlarıWeb Sitesi Geliştirme Adımları
Web Sitesi Geliştirme Adımları
cmkandemir
 
CSS - Genel Bakış
CSS - Genel BakışCSS - Genel Bakış
CSS - Genel Bakış
cmkandemir
 
Threads and Game Programming In Java
Threads and Game Programming In JavaThreads and Game Programming In Java
Threads and Game Programming In Java
cmkandemir
 
JDK and Eclipse Installation and Configuration
JDK and Eclipse Installation and ConfigurationJDK and Eclipse Installation and Configuration
JDK and Eclipse Installation and Configuration
cmkandemir
 
Temel HTML Etiketleri - Tablo, Form
Temel HTML Etiketleri - Tablo, FormTemel HTML Etiketleri - Tablo, Form
Temel HTML Etiketleri - Tablo, Form
cmkandemir
 
Ad

Recently uploaded (20)

Ancient Stone Sculptures of India: As a Source of Indian History
Ancient Stone Sculptures of India: As a Source of Indian HistoryAncient Stone Sculptures of India: As a Source of Indian History
Ancient Stone Sculptures of India: As a Source of Indian History
Virag Sontakke
 
How to Clean Your Contacts Using the Deduplication Menu in Odoo 18
How to Clean Your Contacts Using the Deduplication Menu in Odoo 18How to Clean Your Contacts Using the Deduplication Menu in Odoo 18
How to Clean Your Contacts Using the Deduplication Menu in Odoo 18
Celine George
 
Myopathies (muscle disorders) for undergraduate
Myopathies (muscle disorders) for undergraduateMyopathies (muscle disorders) for undergraduate
Myopathies (muscle disorders) for undergraduate
Mohamed Rizk Khodair
 
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptxANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
Mayuri Chavan
 
Botany Assignment Help Guide - Academic Excellence
Botany Assignment Help Guide - Academic ExcellenceBotany Assignment Help Guide - Academic Excellence
Botany Assignment Help Guide - Academic Excellence
online college homework help
 
CNS infections (encephalitis, meningitis & Brain abscess
CNS infections (encephalitis, meningitis & Brain abscessCNS infections (encephalitis, meningitis & Brain abscess
CNS infections (encephalitis, meningitis & Brain abscess
Mohamed Rizk Khodair
 
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon DolabaniHistory Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
fruinkamel7m
 
Redesigning Education as a Cognitive Ecosystem: Practical Insights into Emerg...
Redesigning Education as a Cognitive Ecosystem: Practical Insights into Emerg...Redesigning Education as a Cognitive Ecosystem: Practical Insights into Emerg...
Redesigning Education as a Cognitive Ecosystem: Practical Insights into Emerg...
Leonel Morgado
 
How to Create Kanban View in Odoo 18 - Odoo Slides
How to Create Kanban View in Odoo 18 - Odoo SlidesHow to Create Kanban View in Odoo 18 - Odoo Slides
How to Create Kanban View in Odoo 18 - Odoo Slides
Celine George
 
E-Filing_of_Income_Tax.pptx and concept of form 26AS
E-Filing_of_Income_Tax.pptx and concept of form 26ASE-Filing_of_Income_Tax.pptx and concept of form 26AS
E-Filing_of_Income_Tax.pptx and concept of form 26AS
Abinash Palangdar
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
Nguyen Thanh Tu Collection
 
Transform tomorrow: Master benefits analysis with Gen AI today webinar, 30 A...
Transform tomorrow: Master benefits analysis with Gen AI today webinar,  30 A...Transform tomorrow: Master benefits analysis with Gen AI today webinar,  30 A...
Transform tomorrow: Master benefits analysis with Gen AI today webinar, 30 A...
Association for Project Management
 
Overview Well-Being and Creative Careers
Overview Well-Being and Creative CareersOverview Well-Being and Creative Careers
Overview Well-Being and Creative Careers
University of Amsterdam
 
Classification of mental disorder in 5th semester bsc. nursing and also used ...
Classification of mental disorder in 5th semester bsc. nursing and also used ...Classification of mental disorder in 5th semester bsc. nursing and also used ...
Classification of mental disorder in 5th semester bsc. nursing and also used ...
parmarjuli1412
 
puzzle Irregular Verbs- Simple Past Tense
puzzle Irregular Verbs- Simple Past Tensepuzzle Irregular Verbs- Simple Past Tense
puzzle Irregular Verbs- Simple Past Tense
OlgaLeonorTorresSnch
 
What is the Philosophy of Statistics? (and how I was drawn to it)
What is the Philosophy of Statistics? (and how I was drawn to it)What is the Philosophy of Statistics? (and how I was drawn to it)
What is the Philosophy of Statistics? (and how I was drawn to it)
jemille6
 
The role of wall art in interior designing
The role of wall art in interior designingThe role of wall art in interior designing
The role of wall art in interior designing
meghaark2110
 
How To Maximize Sales Performance using Odoo 18 Diverse views in sales module
How To Maximize Sales Performance using Odoo 18 Diverse views in sales moduleHow To Maximize Sales Performance using Odoo 18 Diverse views in sales module
How To Maximize Sales Performance using Odoo 18 Diverse views in sales module
Celine George
 
Cultivation Practice of Turmeric in Nepal.pptx
Cultivation Practice of Turmeric in Nepal.pptxCultivation Practice of Turmeric in Nepal.pptx
Cultivation Practice of Turmeric in Nepal.pptx
UmeshTimilsina1
 
Pope Leo XIV, the first Pope from North America.pptx
Pope Leo XIV, the first Pope from North America.pptxPope Leo XIV, the first Pope from North America.pptx
Pope Leo XIV, the first Pope from North America.pptx
Martin M Flynn
 
Ancient Stone Sculptures of India: As a Source of Indian History
Ancient Stone Sculptures of India: As a Source of Indian HistoryAncient Stone Sculptures of India: As a Source of Indian History
Ancient Stone Sculptures of India: As a Source of Indian History
Virag Sontakke
 
How to Clean Your Contacts Using the Deduplication Menu in Odoo 18
How to Clean Your Contacts Using the Deduplication Menu in Odoo 18How to Clean Your Contacts Using the Deduplication Menu in Odoo 18
How to Clean Your Contacts Using the Deduplication Menu in Odoo 18
Celine George
 
Myopathies (muscle disorders) for undergraduate
Myopathies (muscle disorders) for undergraduateMyopathies (muscle disorders) for undergraduate
Myopathies (muscle disorders) for undergraduate
Mohamed Rizk Khodair
 
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptxANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
Mayuri Chavan
 
Botany Assignment Help Guide - Academic Excellence
Botany Assignment Help Guide - Academic ExcellenceBotany Assignment Help Guide - Academic Excellence
Botany Assignment Help Guide - Academic Excellence
online college homework help
 
CNS infections (encephalitis, meningitis & Brain abscess
CNS infections (encephalitis, meningitis & Brain abscessCNS infections (encephalitis, meningitis & Brain abscess
CNS infections (encephalitis, meningitis & Brain abscess
Mohamed Rizk Khodair
 
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon DolabaniHistory Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
fruinkamel7m
 
Redesigning Education as a Cognitive Ecosystem: Practical Insights into Emerg...
Redesigning Education as a Cognitive Ecosystem: Practical Insights into Emerg...Redesigning Education as a Cognitive Ecosystem: Practical Insights into Emerg...
Redesigning Education as a Cognitive Ecosystem: Practical Insights into Emerg...
Leonel Morgado
 
How to Create Kanban View in Odoo 18 - Odoo Slides
How to Create Kanban View in Odoo 18 - Odoo SlidesHow to Create Kanban View in Odoo 18 - Odoo Slides
How to Create Kanban View in Odoo 18 - Odoo Slides
Celine George
 
E-Filing_of_Income_Tax.pptx and concept of form 26AS
E-Filing_of_Income_Tax.pptx and concept of form 26ASE-Filing_of_Income_Tax.pptx and concept of form 26AS
E-Filing_of_Income_Tax.pptx and concept of form 26AS
Abinash Palangdar
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
Nguyen Thanh Tu Collection
 
Transform tomorrow: Master benefits analysis with Gen AI today webinar, 30 A...
Transform tomorrow: Master benefits analysis with Gen AI today webinar,  30 A...Transform tomorrow: Master benefits analysis with Gen AI today webinar,  30 A...
Transform tomorrow: Master benefits analysis with Gen AI today webinar, 30 A...
Association for Project Management
 
Overview Well-Being and Creative Careers
Overview Well-Being and Creative CareersOverview Well-Being and Creative Careers
Overview Well-Being and Creative Careers
University of Amsterdam
 
Classification of mental disorder in 5th semester bsc. nursing and also used ...
Classification of mental disorder in 5th semester bsc. nursing and also used ...Classification of mental disorder in 5th semester bsc. nursing and also used ...
Classification of mental disorder in 5th semester bsc. nursing and also used ...
parmarjuli1412
 
puzzle Irregular Verbs- Simple Past Tense
puzzle Irregular Verbs- Simple Past Tensepuzzle Irregular Verbs- Simple Past Tense
puzzle Irregular Verbs- Simple Past Tense
OlgaLeonorTorresSnch
 
What is the Philosophy of Statistics? (and how I was drawn to it)
What is the Philosophy of Statistics? (and how I was drawn to it)What is the Philosophy of Statistics? (and how I was drawn to it)
What is the Philosophy of Statistics? (and how I was drawn to it)
jemille6
 
The role of wall art in interior designing
The role of wall art in interior designingThe role of wall art in interior designing
The role of wall art in interior designing
meghaark2110
 
How To Maximize Sales Performance using Odoo 18 Diverse views in sales module
How To Maximize Sales Performance using Odoo 18 Diverse views in sales moduleHow To Maximize Sales Performance using Odoo 18 Diverse views in sales module
How To Maximize Sales Performance using Odoo 18 Diverse views in sales module
Celine George
 
Cultivation Practice of Turmeric in Nepal.pptx
Cultivation Practice of Turmeric in Nepal.pptxCultivation Practice of Turmeric in Nepal.pptx
Cultivation Practice of Turmeric in Nepal.pptx
UmeshTimilsina1
 
Pope Leo XIV, the first Pope from North America.pptx
Pope Leo XIV, the first Pope from North America.pptxPope Leo XIV, the first Pope from North America.pptx
Pope Leo XIV, the first Pope from North America.pptx
Martin M Flynn
 

Chapter 2-8085 Microprocessor Architecture and Microcomputer Systems

  • 1. 1 Chapter 2 8085 Microprocessor Architecture and Microcomputer Systems
  • 2. 2 Microprocessor Architecture • The microprocessor can be programmed to perform functions on given data by writing specific instructions into its memory. – The microprocessor reads one instruction at a time, matches it with its instruction set, and performs the data manipulation specified. – The result is either stored back into memory or displayed on an output device.
  • 3. 3 The 8085 Architecture • The 8085 uses three separate busses to perform its operations – The address bus. – The data bus. – The control bus.
  • 4. 4 The Address Bus – 16 bits wide (A0 A1…A15) • Therefore, the 8085 can access locations with numbers from 0 to 65,536. Or, the 8085 can access a total of 64K addresses. – “Unidirectional”. • Information flows out of the microprocessor and into the memory or peripherals. – When the 8085 wants to access a peripheral or a memory location, it places the 16-bit address on the address bus and then sends the appropriate control signals.
  • 5. 5 The Data Bus – 8 bits wide (D0 D1…D7) – “Bi-directional”. • Information flows both ways between the microprocessor and memory or I/O. – The 8085 uses the data bus to transfer the binary information. – Since the data bus has 8-bits only, then the 8085 can manipulate data 8 bits at-a-time only.
  • 6. 6 The Control Bus – There is no real control bus. Instead, the control bus is made up of a number of single bit control signals.
  • 7. 7 Operation Types in a Microprocessor • All of the operations of the microprocessor can be classified into one of three types: - Microprocessor Initiated Operations - Internal Operations - Peripheral Initiated Operations
  • 8. 8 Microprocessor Initiated Operations • These are operations that the microprocessor itself starts. • These are usually one of 4 operations: – Memory Read – Memory Write – I/O Read (Get data from an input device) – I/O write (Send data to an output device)
  • 9. 9 Microprocessor Initiated Operations • It is important to note that the microprocessor treats memory and I/O devices the same way. – Input and output devices simply look like memory locations to the microprocessor. • For example, the keyboard may look like memory address A3F2H. To get what key is being pressed, the microprocessor simply reads the data at location A3F2H. – The communication process between the microprocessor and peripheral devices consist of the following three steps: – Identify the address. – Transfer the binary information. – Provide the right timing signals.
  • 10. 10 The Read Operation – To read the contents of a memory location, the following steps take place: • The microprocessor places the 16-bit address of the memory location on the address bus. • The microprocessor activates a control signal called “memory read” which enables the memory chip. • The memory decodes the address and identifies the right location. • The memory places the contents on the data bus. • The microprocessor reads the value of the data bus after a certain amount of time.
  • 11. 11 Internal Data Operations • The 8085 can perform a number of internal operations. Such as: storing data, Arithmetic & Logic operations, Testing for condition, etc. – To perform these operations, the microprocessor needs an internal architecture similar to the following: Accumulator Flags B C D E H L Program Counter Stack Pointer DataAddress 816
  • 14. 14 The Internal Architecture • We have already discussed the general purpose registers, the Accumulator, and the flags. • The Program Counter (PC) – This is a register that is used to control the sequencing of the execution of instructions. – This register always holds the address of the next instruction. – Since it holds an address, it must be 16 bits wide.
  • 15. 15 The Internal Architecture • The Stack pointer – The stack pointer is also a 16-bit register that is used to point into memory. – The memory this register points to is a special area called the stack. – The stack is an area of memory used to hold data that will be retreived soon. – The stack is usually accessed in a Last In First Out (LIFO) fashion.
  • 16. 16 Externally Initiated Operations • External devices can initiate (start) one of the 4 following operations: – Reset • All operations are stopped and the program counter is reset to 0000. – Interrupt • The microprocessor’s operations are interrupted and the microprocessor executes what is called a “service routine”. • This routine “handles” the interrupt, (perform the necessary operations). Then the microprocessor returns to its previous operations and continues.
  • 17. 17 Externally Initiated Operations – Ready • The 8085 has a pin called RDY. This pin is used by external devices to stop the 8085 until they catch up. • As long as the RDY pin is low, the 8085 will be in a wait state. – Hold • The 8085 has a pin called HOLD. This pin is used by external devices to gain control of the busses. • When the HOLD signal is activated by an external device, the 8085 stops executing instructions and stops using the busses. • This would allow external devices to control the information on the busses. Example DMA.
  • 18. 18 The Design and Operation of Memory • Memory in a microprocessor system is where information (data and instructions) is kept. It can be classified into two main types: • Main memory (RAM and ROM) • Storage memory (Disks , CD ROMs, etc.) – The simple view of RAM is that it is made up of registers that are made up of flip-flops (or memory elements). • The number of flip-flops in a “memory register” determines the size of the memory word. – ROM on the other hand uses diodes instead of the flip-flops to permanently hold the information.
  • 19. 19 Accessing Information in Memory • For the microprocessor to access (Read or Write) information in memory (RAM or ROM), it needs to do the following: – Select the right memory chip (using part of the address bus). – Identify the memory location (using the rest of the address bus). – Access the data (using the data bus).
  • 21. 21 Tri-State Buffers • An important circuit element that is used extensively in memory. • This buffer is a logic circuit that has three states: – Logic 0, logic1, and high impedance. – When this circuit is in high impedance mode it looks as if it is disconnected from the output completely. The Output is Low The Output is High High Impedance
  • 22. 2 2 The Tri-State Buffer • This circuit has two inputs and one output. – The first input behaves like the normal input for the circuit. – The second input is an “enable”. • If it is set high, the output follows the proper circuit behavior. • If it is set low, the output looks like a wire connected to nothing. Input Output Enable Input Output Enable OR
  • 23. 2 3 The Basic Memory Element • The basic memory element is similar to a D latch. • This latch has an input where the data comes in. It has an enable input and an output on which data comes out. QD EN Data Input Data Output Enable
  • 24. 2 4 The Basic Memory Element • However, this is not safe. – Data is always present on the input and the output is always set to the contents of the latch. – To avoid this, tri-state buffers are added at the input and output of the latch. QD EN Data Input Data Output Enable WR RD
  • 25. 2 5 The Basic Memory Element • The WR signal controls the input buffer. – The bar over WR means that this is an active low signal. – So, if WR is 0 the input data reaches the latch input. – If WR is 1 the input of the latch looks like a wire connected to nothing. • The RD signal controls the output in a similar manner.
  • 26. 2 6 A Memory “Register” • If we take four of these latches and connect them together, we would have a 4-bit memory register WR RD EN Q D EN Q D EN Q D EN Q D EN I0 I1 I2 I3 O0 O1 O2 O3
  • 27. 2 7 A group of memory registers – Expanding on this scheme to add more memory registers we get the diagram to the right. D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D0 D1 D2 D3 D0 D1 D2 D3 oooo oooo WR RD
  • 28. 2 8 A group of Memory Registers – If we represent each memory location (Register) as a block we get the following Input Buffers Output Buffers Memory Reg. 0 Memory Reg. 1 Memory Reg. 2 Memory Reg. 3 I0 I1 I2 I3 O0 O1 O2 O3 WR EN0 EN1 EN2 EN3 RD
  • 29. 2 9 The Design of a Memory Chip • Using the RD and WR controls we can determine the direction of flow either into or out of memory. Then using the appropriate Enable input we enable an individual memory register. • What we have just designed is a memory with 4 locations and each location has 4 elements (bits). This memory would be called 4 X 4 [Number of location X number of bits per location].
  • 30. 3 0 The Enable Inputs • How do we produce these enable line? – Since we can never have more than one of these enables active at the same time, we can have them encoded to reduce the number of lines coming into the chip. – These encoded lines are the address lines for memory.
  • 31. 31 The Design of a Memory Chip – So, the previous diagram would now look like the following: Input Buffers Output Buffers Memory Reg. 0 Memory Reg. 1 Memory Reg. 2 Memory Reg. 3 I0 I1 I2 I3 O0 O1 O2 O3 WR RD A d d r e s s D e c o d e r A1 A0
  • 32. 3 2 The Design of a Memory Chip • Since we have tri-state buffers on both the inputs and outputs of the flip flops, we can actually use one set of pins only. – The chip would now look like this: Input Buffers Output Buffers Memory Reg. 0 Memory Reg. 1 Memory Reg. 2 Memory Reg. 3 WR RD A d d r e s s D e c o d e r A1 A0 D0 D1 D2 D3 D0 D1 D2 D3 A1 A0 RD WR
  • 33. 3 3 The steps of writing into Memory • What happens when the programmer issues the STA instruction? – The microprocessor would turn on the WR control (WR = 0) and turn off the RD control (RD = 1). – The address is applied to the address decoder which generates a single Enable signal to turn on only one of the memory registers. – The data is then applied on the data lines and it is stored into the enabled register.
  • 34. 3 4 Dimensions of Memory • Memory is usually measured by two numbers: its length and its width (Length X Width). • The length is the total number of locations. • The width is the number of bits in each location. – The length (total number of locations) is a function of the number of address lines. # of memory locations = 2( # of address lines) • So, a memory chip with 10 address lines would have 210 = 1024 locations (1K) • Looking at it from the other side, a memory chip with 4K locations would need Log2 4096=12 address lines
  • 35. 3 5 The 8085 and Memory • The 8085 has 16 address lines. That means it can address 216 = 64K memory locations. – Then it will need 1 memory chip with 64 k locations, or 2 chips with 32 K in each, or 4 with 16 K each or 16 of the 4 K chips, etc. • how would we use these address lines to control the multiple chips?
  • 36. 3 6 Chip Select • Usually, each memory chip has a CS (Chip Select) input. The chip will only work if an active signal is applied on that input. • To allow the use of multiple chips in the make up of memory, we need to use a number of the address lines for the purpose of “chip selection”. – These address lines are decoded to generate the 2n necessary CS inputs for the memory chips to be used.
  • 37. 3 7 Chip Selection Example – Assume that we need to build a memory system made up of 4 of the 4 X 4 memory chips we designed earlier. – We will need to use 2 inputs and a decoder to identify which chip will be used at what time. – The resulting design would now look like the one on the following slide.
  • 38. 3 8 Chip Selection Example CS RD WR A0 A1 CS RD WR A0 A1 CS RD WR A0 A1 CS RD WR A0 A1 2 X4 DecoderA3 A2 A1 A0 RD WR D1 D0
  • 39. 3 9 Memory Map and Addresses • The memory map is a picture representation of the address range and shows where the different memory chips are located within the address range. 0000 FFFF AddressRange RAM 1 RAM 2 RAM 3 RAM 4 EPROM 0000 3FFF 4400 5FFF 6000 8FFF 9000 A3FF A400 F7FF Address Range of EPROM Chip Address Range of 1st RAM Chip Address Range of 2nd RAM Chip Address Range of 3rd RAM Chip Address Range of 4th RAM Chip
  • 40. 4 0 Address Range of a Memory Chip • The address range of a particular chip is the list of all addresses that are mapped to the chip. – An example for the address range and its relationship to the memory chips would be the Post Office Boxes in the post office. – Each box has its unique number that is assigned sequentially. (memory locations) – The boxes are grouped into groups. (memory chips) – The first box in a group has the number immediately after the last box in the previous group.
  • 41. 41 Address Range of a Memory Chip – The above example can be modified slightly to make it closer to our discussion on memory. – Let’s say that this post office has only 1000 boxes. – Let’s also say that these are grouped into 10 groups of 100 boxes each. Boxes 0000 to 0099 are in group 0, boxes 0100 to 0199 are in group 1 and so on. – We can look at the box number as if it is made up of two pieces: – The group number and the box’s index within the group. – So, box number 436 is the 36th box in the 4th group. The upper digit of the box number identifies the group and the lower two digits identify the box within the group.
  • 42. 4 2 The 8085 and Address Ranges • The 8085 has 16 address lines. So, it can address a total of 64K memory locations. – If we use memory chips with 1K locations each, then we will need 64 such chips. – The 1K memory chip needs 10 address lines to uniquely identify the 1K locations. (log2 1024 = 10) – That leaves 6 address lines which is the exact number needed for selecting between the 64 different chips (log2 64 = 6).
  • 43. 4 3 The 8085 and Address Ranges • Now, we can break up the 16-bit address of the 8085 into two pieces: A15 A14 A13 A12 A11 A10 A9 A8 A7 A6 A5 A4 A3 A2 A1 A0 – Depending on the combination on the address lines A15 - A10 , the address range of the specified chip is determined. Location Selection within the ChipChip Selection
  • 44. 4 4 Chip Select Example • A chip that uses the combination A15 - A10 = 001000 would have addresses that range from 2000H to 23FFH. – Keep in mind that the 10 address lines on the chip gives a range of 00 0000 0000 to 11 1111 1111 or 000H to 3FFH for each of the chips. – The memory chip in this example would require the following circuit on its chip select input: CS A10 A11 A12 A13 A14 A15
  • 45. 4 5 Chip Select Example • If we change the above combination to the following: – Now the chip would have addresses ranging from: 2400 to 27FF. – Changing the combination of the address bits connected to the chip select changes the address range for the memory chip. CS A10 A11 A12 A13 A14 A15
  • 46. 4 6 Chip Select Example – To illustrate this with a picture: • in the first case, the memory chip occupies the piece of the memory map identified as before. • In the second case, it occupies the piece identified as after. 0000 2000 23FF FFFF 0000 2400 27FF FFFF Before After
  • 47. 4 7 High-Order vs. Low-Order Address Lines • The address lines from a microprocessor can be classified into two types: – High-Order • Used for memory chip selection – Low-Order • Used for location selection within a memory chip. – This classification is highly dependent on the memory system design.
  • 48. 4 8 Data Lines • All of the above discussion has been regarding memory length. Lets look at memory width. • We said that the width is the number of bits in each memory word. – We have been assuming so far that our memory chips have the right width. – What if they don’t? • It is very common to find memory chips that have only 4 bits per location. How would you design a byte wide memory system using these chips? • We use two chips for the same address range. One chip will supply 4 of the data bits per address and the other chip supply the other 4 data bits for the same address.
  翻译: