Loading instructions, Basic Computer Science

They are particular register instructions. They are used to load bytes or sequences of bytes onto a register.
LODS (LODSB) (LODSW)
LAHF
LDS
LEA
LES
LODS (LODSB) (LODSW) INSTRUCTION
Goal: To load sequences of a byte or a word into the accumulator.
Syntax:
LODS
This instruction takes the sequence found on the address specified by SI, loads it to the AL (or AX) register and adds or subtracts , depending on the state of DF, to SI if it is a bytes transfer or if it is a words transfer.
MOV SI, OFFSET VAR1
LODS
The first line loads the VAR1 address on SI and the second line receives the content of that locality to the AL register.
• The LODSB and LODSW commands are used likewise, the first one loads a byte and the second one a word (it uses the whole AX register).
LAHF INSTRUCTION
Goal: It transfers the full content of the flags to the AH register.
Syntax:
LAHF
This instruction is helpful to make sure the state of the flags through the execution of our program.
LDS INSTRUCTION
Goal: used to load the register of the data segment
Syntax:
LDS destiny, source
The source operator must be a dual word in memory. The word related with the largest address is transferred to DS, in other words it is taken as the segment address. The word associated with the lesser address is the displacement address and it is deposited in the register indicated as destiny.
LEA INSTRUCTION
Goal: To load the address of the source operator
Syntax:
LEA destiny, source
The source operator must be situated in memory, and its displacement is placed on the index register or specified pointer in destiny.
Posted Date: 5/4/2012 4:29:00 AM | Location : United States







Related Discussions:- Loading instructions, Assignment Help, Ask Question on Loading instructions, Get Answer, Expert's Help, Loading instructions Discussions

Write discussion on Loading instructions
Your posts are moderated
Related Questions

Types of Search Engine:   Some of the basic categories of Search engines are :  a. Primary Search Engines: Such search engines use web crawlers or spiders to traverse the w


create a simple Visual Basic project

Internet searching:  The Internet consists of millions of private/public/academic/business and government networks having local to global scope. It has billions of web pages o

The project designs a school computer lab with the necessary hardware and software components along with the IP address for different components. The computer lab consists of one I

Question 1 Explain the protection features of MS Access? 2 What is Query Parameter? 3 What are the steps to be taken for improving performance of Microsoft Access database? 4 W

different types of software interfaces which falls in different categories

Question 1 Classify and explain the different types of computers Question 2 List and explain the commonly used input devices Question 3 What is binary number system? Exp

concepts and components of computer security