SlideShare a Scribd company logo
Stack & Subroutines
                      Company
                        LOGO
The stack
   The stack is a group of memory location in the
    R/W memory that is used for temporary storage
    of binary information during the execution of a
    program
   The stack is a LIFO structure.
     – Last In First Out.
   The starting location of the stack is defined by
    loading a 16 bit address into the stack pointer
    that spaced is reserved, usually at the top of
    the memory map.


www.themeart.com                                       2
The stack
   The stack normally grows backwards into
    memory.
   The stack can be initialized anywhere in the
    user memory map , but stack is initialized at the
    highest memory location so that there will not
    be any interface with the program.
   In 8085 microprocessor system the beginning of
    the stack is defined in the program by using the
    instruction
    LXI SP,16 bit.
   The LXI SP,a 16 bit state that load the 16 bit
    address into the stack pointer register.
www.themeart.com                                        3
Information is stored and retrieved
          from the stack
•The 8085 provide two instruction PUSH & POP for storing infor
mation on the stack and retrieving it back.

•Information in the register pairs stored on the stack in reverse
order by using the instruction PUSH.

• Information retrieved from the stack by using the instruction
POP.

•PUSH & POP both instruction works with register pairs only.
•The storage and retrieval of the content of registers on the
stack fallows the LIFO(Last-In-First-Out) sequence.

•Information in the stack location may not be destroyed until
new information is stored in that memory location
www.themeart.com                                                    4
The PUSH Instruction

2000 LXI SP,2099H    Load the stack pointer register with the addre
                     ss 2099.
2003 LXI H ,42F2H    Loads data in the HL register pair.

2006 PUSH H          The content of the HL register pair pushed int
                     o stack.
2007 DELAY COUNTER
200F
2010 POP H           Saved data in stack pointer register to HL regi
                     ster pair.




 www.themeart.com                                                      5
PUSH H
   The stack pointer is decremented by one to 2098 H
    , and the contents of the h register are copied to
    memory location 2098H.                         8085 Register
                                                                      F
                                               A
   The stack pointer register is again        B                      C
                                                                      E
                                               D
     decremented by one to 2097H,and H 42                    F2       L
                                              SP        2097
     the contents of the L register are                Memory
    copied to memory location 2097H.
   The contents of the register pair                    F2     2097
                                                         42     2098
     HL are not destroyed ; however                       X     2099

     HL is made available for delay
     counter.                        Contents on the stack &in the register
                                          after the PUSH instruction
www.themeart.com                                                              6
POP H
   The contents of the top of the stack location shown by
    the stack pointer are copied in the L register and the
    stack pointer register is incremented by one to 2098
    H.                                             8085 Register

   The contents of the top of the stack A    B
                                                                       F
                                                                       C
     (now it is 2098H) are copied in the D                             E
                                              H    42         F2       L
     H register,and the stack pointer is SP            2099

     incremented by one.                              MEMORY
   The contents of memory location
                                                          F2       2097
    2097H and 2098 are not destroyed                      42      2098
    until some other data bytes are                       X       2099

    stored in these location. Contentsafterthe stack and in the registers
                                       on
                                            the POP instruction
www.themeart.com                                                            7
Operation of the stack
   During pushing, the stack operates in a “decrement
    then store” style.
    The stack pointer is decremented first, then the
    information is placed on the stack.
    During poping, the stack operates in a “use then
    increment” style.
    The information is retrieved from the top of the
    stack and then the pointer is incremented.
    The SP pointer always points to “the top of the
      stack’’.


www.themeart.com                                         8
PUSH PSW Register Pair
     PUSH PSW (1 Byte Instruction)          A        Flag
      Decrement SP
      Copy the contents of
                                         12           80
       register A to the memory
       location pointed to by SP
     Decrement SP
     Copy the contents of
      Flag register to the memory     FFFB
                                      FFFC
       location pointed to by SP
                                      FFFD       80
                                      FFFE       12
                                      FFFF


www.themeart.com                                             9
Pop PSW Register Pair
     POP PSW (1 Byte Instruction)    A   FLAG
     Copy the contents of the       12    80
      memory location pointed to
      by the SP to Flag register
     Increment SP
     Copy the contents of the
                                   FFFB
      memory location pointed to   FFFC
      by the SP to register A      FFFD   80
                                   FFFE   12
     Increment SP                 FFFF


www.themeart.com                                 10
Subroutines
     A subroutine is group of instruction written sepa
      rately from the main program to perform a func
      tion that occurs repeatedly in the main program
      .
     When a main program calls a subroutine the pro
      gram execution is transferred to the subroutine
      after the completion of the subroutine ,the prog
      ram execution returns to the main program.
     The microprocessor uses the stack to store the r
      eturn address of the subroutine.


www.themeart.com                                          11
Subroutines
   The 8085 has two instructions for dealing
    with subroutines.
   – The CALL instruction is used to redirect
    program execution to the subroutine.
   – The RET instruction is used to return to t
    he main program at the end of the subro
    utine .




www.themeart.com                                  12
The CALL instruction
   CALL ,16 bit
   Call subroutine in conditionally located at
    the memory address specified by the 16
    bit operand.
   This instruction places the address of the
    next instruction on the stack and transfer
    the program execution to the subroutine
    address.


www.themeart.com                                  13
The RET instruction
   Return unconditionally from the subrouti
    ne.
   This instruction locates the return addre
    ss on the top of the stack and transfers t
    he program execution back to the calling
    program.




www.themeart.com                                 14
General characteristics of CALL
       & RTE instruction
  1. The CALL instructions are 3-byte instruc
     tion; the second byte specifies the low
     order byte ,and the third byte specifies
     the high order byte of the subroutine
     address.
  2. The return instruction are 1-byte instruc
     tions.
  3. A CALL instruction must be used in
     conjunction with a return instruction in
     the subroutine .
www.themeart.com                                 15
Necessary steps to implement
          a subroutine

   The stack pointer register must be initiali
    zed ,preferably at the highest memory lo
    cation of the R/W memory.
   The call instruction should be used in the
    main program accompanied by the RET i
    nstruction in the subroutine.




www.themeart.com                                  16
Conditional CALL and RTE Instructions
      The 8085 supports conditional CALL and co
       nditional RTE instructions.
      – The same conditions used with conditional
       JUMP instructions can be used.
      – CC, call subroutine if Carry flag is set.
      – CNC, call subroutine if Carry flag is not set
      – RC, return from subroutine if Carry flag is
       set
      – RNC, return from subroutine if Carry flag
         is not set.
www.themeart.com                                        17
www.themeart.com   18
Ad

More Related Content

What's hot (20)

8086 modes
8086 modes8086 modes
8086 modes
PDFSHARE
 
Microprocessor 8086 instructions
Microprocessor 8086 instructionsMicroprocessor 8086 instructions
Microprocessor 8086 instructions
Ravi Anand
 
8085 DATA TRANSFER INSTRUCTIONS
8085 DATA TRANSFER INSTRUCTIONS8085 DATA TRANSFER INSTRUCTIONS
8085 DATA TRANSFER INSTRUCTIONS
RamaPrabha24
 
Stack and subroutine
Stack and subroutineStack and subroutine
Stack and subroutine
milandhara
 
8051 architecture
8051 architecture8051 architecture
8051 architecture
sb108ec
 
Subroutine
SubroutineSubroutine
Subroutine
PoojaChoudhary313113
 
4.programmable dma controller 8257
4.programmable dma controller 82574.programmable dma controller 8257
4.programmable dma controller 8257
MdFazleRabbi18
 
Interfacing of io device to 8085
Interfacing of io device to 8085Interfacing of io device to 8085
Interfacing of io device to 8085
Nitin Ahire
 
Stack and subroutine
Stack and subroutineStack and subroutine
Stack and subroutine
Suchismita Paul
 
Logical instruction of 8085
Logical instruction of 8085 Logical instruction of 8085
Logical instruction of 8085
Nemish Bhojani
 
8085 MICROPROCESSOR ARCHITECTURE AND ITS OPERATIONS
8085 MICROPROCESSOR ARCHITECTURE AND ITS OPERATIONS8085 MICROPROCESSOR ARCHITECTURE AND ITS OPERATIONS
8085 MICROPROCESSOR ARCHITECTURE AND ITS OPERATIONS
RamaPrabha24
 
8085 Microprocessor
8085 Microprocessor8085 Microprocessor
8085 Microprocessor
Maulana Abul Kalam Azad University of Technology
 
Pin Diagram and block diagram 8085 .pptx
Pin Diagram and block diagram 8085 .pptxPin Diagram and block diagram 8085 .pptx
Pin Diagram and block diagram 8085 .pptx
YashArya40
 
Architecture of 8086 microprocessor
Architecture of  8086 microprocessorArchitecture of  8086 microprocessor
Architecture of 8086 microprocessor
Anirban Saha Anik
 
8085 microprocessor ramesh gaonkar
8085 microprocessor   ramesh gaonkar8085 microprocessor   ramesh gaonkar
8085 microprocessor ramesh gaonkar
SAQUIB AHMAD
 
Instruction set-of-8085
Instruction set-of-8085Instruction set-of-8085
Instruction set-of-8085
saleForce
 
Addressing modes of 8051
Addressing modes of 8051Addressing modes of 8051
Addressing modes of 8051
Dr. AISHWARYA N
 
Introduction to Interrupts of 8085 microprocessor
Introduction to Interrupts of 8085 microprocessorIntroduction to Interrupts of 8085 microprocessor
Introduction to Interrupts of 8085 microprocessor
RAKESHCHOUDHARY164857
 
8085 microproceesor ppt
8085 microproceesor ppt8085 microproceesor ppt
8085 microproceesor ppt
RJ Aniket
 
Logical instruction of 8085
Logical instruction of 8085Logical instruction of 8085
Logical instruction of 8085
vishalgohel12195
 
8086 modes
8086 modes8086 modes
8086 modes
PDFSHARE
 
Microprocessor 8086 instructions
Microprocessor 8086 instructionsMicroprocessor 8086 instructions
Microprocessor 8086 instructions
Ravi Anand
 
8085 DATA TRANSFER INSTRUCTIONS
8085 DATA TRANSFER INSTRUCTIONS8085 DATA TRANSFER INSTRUCTIONS
8085 DATA TRANSFER INSTRUCTIONS
RamaPrabha24
 
Stack and subroutine
Stack and subroutineStack and subroutine
Stack and subroutine
milandhara
 
8051 architecture
8051 architecture8051 architecture
8051 architecture
sb108ec
 
4.programmable dma controller 8257
4.programmable dma controller 82574.programmable dma controller 8257
4.programmable dma controller 8257
MdFazleRabbi18
 
Interfacing of io device to 8085
Interfacing of io device to 8085Interfacing of io device to 8085
Interfacing of io device to 8085
Nitin Ahire
 
Logical instruction of 8085
Logical instruction of 8085 Logical instruction of 8085
Logical instruction of 8085
Nemish Bhojani
 
8085 MICROPROCESSOR ARCHITECTURE AND ITS OPERATIONS
8085 MICROPROCESSOR ARCHITECTURE AND ITS OPERATIONS8085 MICROPROCESSOR ARCHITECTURE AND ITS OPERATIONS
8085 MICROPROCESSOR ARCHITECTURE AND ITS OPERATIONS
RamaPrabha24
 
Pin Diagram and block diagram 8085 .pptx
Pin Diagram and block diagram 8085 .pptxPin Diagram and block diagram 8085 .pptx
Pin Diagram and block diagram 8085 .pptx
YashArya40
 
Architecture of 8086 microprocessor
Architecture of  8086 microprocessorArchitecture of  8086 microprocessor
Architecture of 8086 microprocessor
Anirban Saha Anik
 
8085 microprocessor ramesh gaonkar
8085 microprocessor   ramesh gaonkar8085 microprocessor   ramesh gaonkar
8085 microprocessor ramesh gaonkar
SAQUIB AHMAD
 
Instruction set-of-8085
Instruction set-of-8085Instruction set-of-8085
Instruction set-of-8085
saleForce
 
Addressing modes of 8051
Addressing modes of 8051Addressing modes of 8051
Addressing modes of 8051
Dr. AISHWARYA N
 
Introduction to Interrupts of 8085 microprocessor
Introduction to Interrupts of 8085 microprocessorIntroduction to Interrupts of 8085 microprocessor
Introduction to Interrupts of 8085 microprocessor
RAKESHCHOUDHARY164857
 
8085 microproceesor ppt
8085 microproceesor ppt8085 microproceesor ppt
8085 microproceesor ppt
RJ Aniket
 
Logical instruction of 8085
Logical instruction of 8085Logical instruction of 8085
Logical instruction of 8085
vishalgohel12195
 

Similar to Stack in microprocessor 8085(presantation) (20)

7. Stacks and subroutine.pptfor engineering student
7. Stacks and subroutine.pptfor engineering student7. Stacks and subroutine.pptfor engineering student
7. Stacks and subroutine.pptfor engineering student
ayushmishraaa09
 
B sc e 5.2 mp unit 2 soft ware(alp)
B sc e 5.2 mp unit 2 soft ware(alp)B sc e 5.2 mp unit 2 soft ware(alp)
B sc e 5.2 mp unit 2 soft ware(alp)
MahiboobAliMulla
 
Lecture 05 NOP and Stack Group of Instructions
Lecture 05 NOP and Stack Group of InstructionsLecture 05 NOP and Stack Group of Instructions
Lecture 05 NOP and Stack Group of Instructions
Zeeshan Ahmed
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
deval patel
 
Microprocessor and Microcontroller lec4
Microprocessor and Microcontroller lec4Microprocessor and Microcontroller lec4
Microprocessor and Microcontroller lec4
Ameen San
 
03 addr mode & instructions
03 addr mode & instructions03 addr mode & instructions
03 addr mode & instructions
ShubhamBakshi14
 
Embedded C programming session10
Embedded C programming  session10Embedded C programming  session10
Embedded C programming session10
Keroles karam khalil
 
Stacks & Subroutines.ppt.pptx
Stacks & Subroutines.ppt.pptxStacks & Subroutines.ppt.pptx
Stacks & Subroutines.ppt.pptx
ssuserdcfc6d
 
C programming session10
C programming  session10C programming  session10
C programming session10
Keroles karam khalil
 
Lec04
Lec04Lec04
Lec04
siddu kadiwal
 
Lec04
Lec04Lec04
Lec04
siddu kadiwal
 
Instructionset8085
Instructionset8085Instructionset8085
Instructionset8085
Fawad Pathan
 
Basic programming of 8085
Basic programming of 8085 Basic programming of 8085
Basic programming of 8085
vijaydeepakg
 
8085 instruction set
8085 instruction set8085 instruction set
8085 instruction set
JLoknathDora
 
8085 is details
8085 is details8085 is details
8085 is details
soumyaranjan panda
 
UNIT II.pptx
UNIT II.pptxUNIT II.pptx
UNIT II.pptx
ssuser47c811
 
8051 Programming (1).pptx
8051 Programming (1).pptx8051 Programming (1).pptx
8051 Programming (1).pptx
DhyeayaParmar
 
4. Instruction Set Of MP 8085.pptx
4. Instruction Set Of MP 8085.pptx4. Instruction Set Of MP 8085.pptx
4. Instruction Set Of MP 8085.pptx
ISMT College
 
T imingdiagram
T imingdiagramT imingdiagram
T imingdiagram
puja00
 
8085 instruction set
8085 instruction set8085 instruction set
8085 instruction set
Velalar College of Engineering and Technology
 
7. Stacks and subroutine.pptfor engineering student
7. Stacks and subroutine.pptfor engineering student7. Stacks and subroutine.pptfor engineering student
7. Stacks and subroutine.pptfor engineering student
ayushmishraaa09
 
B sc e 5.2 mp unit 2 soft ware(alp)
B sc e 5.2 mp unit 2 soft ware(alp)B sc e 5.2 mp unit 2 soft ware(alp)
B sc e 5.2 mp unit 2 soft ware(alp)
MahiboobAliMulla
 
Lecture 05 NOP and Stack Group of Instructions
Lecture 05 NOP and Stack Group of InstructionsLecture 05 NOP and Stack Group of Instructions
Lecture 05 NOP and Stack Group of Instructions
Zeeshan Ahmed
 
Microprocessor and Microcontroller lec4
Microprocessor and Microcontroller lec4Microprocessor and Microcontroller lec4
Microprocessor and Microcontroller lec4
Ameen San
 
03 addr mode & instructions
03 addr mode & instructions03 addr mode & instructions
03 addr mode & instructions
ShubhamBakshi14
 
Stacks & Subroutines.ppt.pptx
Stacks & Subroutines.ppt.pptxStacks & Subroutines.ppt.pptx
Stacks & Subroutines.ppt.pptx
ssuserdcfc6d
 
Instructionset8085
Instructionset8085Instructionset8085
Instructionset8085
Fawad Pathan
 
Basic programming of 8085
Basic programming of 8085 Basic programming of 8085
Basic programming of 8085
vijaydeepakg
 
8085 instruction set
8085 instruction set8085 instruction set
8085 instruction set
JLoknathDora
 
8051 Programming (1).pptx
8051 Programming (1).pptx8051 Programming (1).pptx
8051 Programming (1).pptx
DhyeayaParmar
 
4. Instruction Set Of MP 8085.pptx
4. Instruction Set Of MP 8085.pptx4. Instruction Set Of MP 8085.pptx
4. Instruction Set Of MP 8085.pptx
ISMT College
 
T imingdiagram
T imingdiagramT imingdiagram
T imingdiagram
puja00
 
Ad

Recently uploaded (20)

Computer Systems Quiz Presentation in Purple Bold Style (4).pdf
Computer Systems Quiz Presentation in Purple Bold Style (4).pdfComputer Systems Quiz Presentation in Purple Bold Style (4).pdf
Computer Systems Quiz Presentation in Purple Bold Style (4).pdf
fizarcse
 
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Wonjun Hwang
 
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Vasileios Komianos
 
React Native for Business Solutions: Building Scalable Apps for Success
React Native for Business Solutions: Building Scalable Apps for SuccessReact Native for Business Solutions: Building Scalable Apps for Success
React Native for Business Solutions: Building Scalable Apps for Success
Amelia Swank
 
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Alan Dix
 
Building a research repository that works by Clare Cady
Building a research repository that works by Clare CadyBuilding a research repository that works by Clare Cady
Building a research repository that works by Clare Cady
UXPA Boston
 
Dark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanizationDark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanization
Jakub Šimek
 
fennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solutionfennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solution
shallal2
 
Distributionally Robust Statistical Verification with Imprecise Neural Networks
Distributionally Robust Statistical Verification with Imprecise Neural NetworksDistributionally Robust Statistical Verification with Imprecise Neural Networks
Distributionally Robust Statistical Verification with Imprecise Neural Networks
Ivan Ruchkin
 
Cybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and MitigationCybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and Mitigation
VICTOR MAESTRE RAMIREZ
 
Building the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdfBuilding the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdf
Cheryl Hung
 
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdfICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
Eryk Budi Pratama
 
Master Data Management - Enterprise Application Integration
Master Data Management - Enterprise Application IntegrationMaster Data Management - Enterprise Application Integration
Master Data Management - Enterprise Application Integration
Sherif Rasmy
 
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptxIn-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
aptyai
 
IT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information TechnologyIT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information Technology
SHEHABALYAMANI
 
IT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information TechnologyIT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information Technology
SHEHABALYAMANI
 
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Maarten Verwaest
 
Understanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdfUnderstanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdf
Fulcrum Concepts, LLC
 
Refactoring meta-rauc-community: Cleaner Code, Better Maintenance, More Machines
Refactoring meta-rauc-community: Cleaner Code, Better Maintenance, More MachinesRefactoring meta-rauc-community: Cleaner Code, Better Maintenance, More Machines
Refactoring meta-rauc-community: Cleaner Code, Better Maintenance, More Machines
Leon Anavi
 
May Patch Tuesday
May Patch TuesdayMay Patch Tuesday
May Patch Tuesday
Ivanti
 
Computer Systems Quiz Presentation in Purple Bold Style (4).pdf
Computer Systems Quiz Presentation in Purple Bold Style (4).pdfComputer Systems Quiz Presentation in Purple Bold Style (4).pdf
Computer Systems Quiz Presentation in Purple Bold Style (4).pdf
fizarcse
 
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Wonjun Hwang
 
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Vasileios Komianos
 
React Native for Business Solutions: Building Scalable Apps for Success
React Native for Business Solutions: Building Scalable Apps for SuccessReact Native for Business Solutions: Building Scalable Apps for Success
React Native for Business Solutions: Building Scalable Apps for Success
Amelia Swank
 
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Alan Dix
 
Building a research repository that works by Clare Cady
Building a research repository that works by Clare CadyBuilding a research repository that works by Clare Cady
Building a research repository that works by Clare Cady
UXPA Boston
 
Dark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanizationDark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanization
Jakub Šimek
 
fennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solutionfennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solution
shallal2
 
Distributionally Robust Statistical Verification with Imprecise Neural Networks
Distributionally Robust Statistical Verification with Imprecise Neural NetworksDistributionally Robust Statistical Verification with Imprecise Neural Networks
Distributionally Robust Statistical Verification with Imprecise Neural Networks
Ivan Ruchkin
 
Cybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and MitigationCybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and Mitigation
VICTOR MAESTRE RAMIREZ
 
Building the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdfBuilding the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdf
Cheryl Hung
 
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdfICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
Eryk Budi Pratama
 
Master Data Management - Enterprise Application Integration
Master Data Management - Enterprise Application IntegrationMaster Data Management - Enterprise Application Integration
Master Data Management - Enterprise Application Integration
Sherif Rasmy
 
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptxIn-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
aptyai
 
IT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information TechnologyIT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information Technology
SHEHABALYAMANI
 
IT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information TechnologyIT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information Technology
SHEHABALYAMANI
 
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Maarten Verwaest
 
Understanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdfUnderstanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdf
Fulcrum Concepts, LLC
 
Refactoring meta-rauc-community: Cleaner Code, Better Maintenance, More Machines
Refactoring meta-rauc-community: Cleaner Code, Better Maintenance, More MachinesRefactoring meta-rauc-community: Cleaner Code, Better Maintenance, More Machines
Refactoring meta-rauc-community: Cleaner Code, Better Maintenance, More Machines
Leon Anavi
 
May Patch Tuesday
May Patch TuesdayMay Patch Tuesday
May Patch Tuesday
Ivanti
 
Ad

Stack in microprocessor 8085(presantation)

  • 1. Stack & Subroutines Company LOGO
  • 2. The stack  The stack is a group of memory location in the R/W memory that is used for temporary storage of binary information during the execution of a program  The stack is a LIFO structure. – Last In First Out.  The starting location of the stack is defined by loading a 16 bit address into the stack pointer that spaced is reserved, usually at the top of the memory map. www.themeart.com 2
  • 3. The stack  The stack normally grows backwards into memory.  The stack can be initialized anywhere in the user memory map , but stack is initialized at the highest memory location so that there will not be any interface with the program.  In 8085 microprocessor system the beginning of the stack is defined in the program by using the instruction  LXI SP,16 bit.  The LXI SP,a 16 bit state that load the 16 bit address into the stack pointer register. www.themeart.com 3
  • 4. Information is stored and retrieved from the stack •The 8085 provide two instruction PUSH & POP for storing infor mation on the stack and retrieving it back. •Information in the register pairs stored on the stack in reverse order by using the instruction PUSH. • Information retrieved from the stack by using the instruction POP. •PUSH & POP both instruction works with register pairs only. •The storage and retrieval of the content of registers on the stack fallows the LIFO(Last-In-First-Out) sequence. •Information in the stack location may not be destroyed until new information is stored in that memory location www.themeart.com 4
  • 5. The PUSH Instruction 2000 LXI SP,2099H Load the stack pointer register with the addre ss 2099. 2003 LXI H ,42F2H Loads data in the HL register pair. 2006 PUSH H The content of the HL register pair pushed int o stack. 2007 DELAY COUNTER 200F 2010 POP H Saved data in stack pointer register to HL regi ster pair. www.themeart.com 5
  • 6. PUSH H  The stack pointer is decremented by one to 2098 H , and the contents of the h register are copied to memory location 2098H. 8085 Register F A  The stack pointer register is again B C E D decremented by one to 2097H,and H 42 F2 L SP 2097 the contents of the L register are Memory copied to memory location 2097H.  The contents of the register pair F2 2097 42 2098 HL are not destroyed ; however X 2099 HL is made available for delay counter. Contents on the stack &in the register after the PUSH instruction www.themeart.com 6
  • 7. POP H  The contents of the top of the stack location shown by the stack pointer are copied in the L register and the stack pointer register is incremented by one to 2098 H. 8085 Register  The contents of the top of the stack A B F C (now it is 2098H) are copied in the D E H 42 F2 L H register,and the stack pointer is SP 2099 incremented by one. MEMORY  The contents of memory location F2 2097 2097H and 2098 are not destroyed 42 2098 until some other data bytes are X 2099 stored in these location. Contentsafterthe stack and in the registers on the POP instruction www.themeart.com 7
  • 8. Operation of the stack  During pushing, the stack operates in a “decrement then store” style.  The stack pointer is decremented first, then the information is placed on the stack.  During poping, the stack operates in a “use then increment” style.  The information is retrieved from the top of the stack and then the pointer is incremented.  The SP pointer always points to “the top of the stack’’. www.themeart.com 8
  • 9. PUSH PSW Register Pair  PUSH PSW (1 Byte Instruction) A Flag  Decrement SP  Copy the contents of 12 80 register A to the memory location pointed to by SP  Decrement SP  Copy the contents of Flag register to the memory FFFB FFFC location pointed to by SP FFFD 80 FFFE 12 FFFF www.themeart.com 9
  • 10. Pop PSW Register Pair  POP PSW (1 Byte Instruction) A FLAG  Copy the contents of the 12 80 memory location pointed to by the SP to Flag register  Increment SP  Copy the contents of the FFFB memory location pointed to FFFC by the SP to register A FFFD 80 FFFE 12  Increment SP FFFF www.themeart.com 10
  • 11. Subroutines  A subroutine is group of instruction written sepa rately from the main program to perform a func tion that occurs repeatedly in the main program .  When a main program calls a subroutine the pro gram execution is transferred to the subroutine after the completion of the subroutine ,the prog ram execution returns to the main program.  The microprocessor uses the stack to store the r eturn address of the subroutine. www.themeart.com 11
  • 12. Subroutines  The 8085 has two instructions for dealing with subroutines. – The CALL instruction is used to redirect program execution to the subroutine. – The RET instruction is used to return to t he main program at the end of the subro utine . www.themeart.com 12
  • 13. The CALL instruction  CALL ,16 bit  Call subroutine in conditionally located at the memory address specified by the 16 bit operand.  This instruction places the address of the next instruction on the stack and transfer the program execution to the subroutine address. www.themeart.com 13
  • 14. The RET instruction  Return unconditionally from the subrouti ne.  This instruction locates the return addre ss on the top of the stack and transfers t he program execution back to the calling program. www.themeart.com 14
  • 15. General characteristics of CALL & RTE instruction 1. The CALL instructions are 3-byte instruc tion; the second byte specifies the low order byte ,and the third byte specifies the high order byte of the subroutine address. 2. The return instruction are 1-byte instruc tions. 3. A CALL instruction must be used in conjunction with a return instruction in the subroutine . www.themeart.com 15
  • 16. Necessary steps to implement a subroutine  The stack pointer register must be initiali zed ,preferably at the highest memory lo cation of the R/W memory.  The call instruction should be used in the main program accompanied by the RET i nstruction in the subroutine. www.themeart.com 16
  • 17. Conditional CALL and RTE Instructions  The 8085 supports conditional CALL and co nditional RTE instructions. – The same conditions used with conditional JUMP instructions can be used. – CC, call subroutine if Carry flag is set. – CNC, call subroutine if Carry flag is not set – RC, return from subroutine if Carry flag is set – RNC, return from subroutine if Carry flag is not set. www.themeart.com 17
  翻译: