Loading instructions, Basic Computer Science

They are particular register instructions. They are used to load bytes or sequences of bytes onto a register.
LODS (LODSB) (LODSW)
LAHF
LDS
LEA
LES
LODS (LODSB) (LODSW) INSTRUCTION
Goal: To load sequences of a byte or a word into the accumulator.
Syntax:
LODS
This instruction takes the sequence found on the address specified by SI, loads it to the AL (or AX) register and adds or subtracts , depending on the state of DF, to SI if it is a bytes transfer or if it is a words transfer.
MOV SI, OFFSET VAR1
LODS
The first line loads the VAR1 address on SI and the second line receives the content of that locality to the AL register.
• The LODSB and LODSW commands are used likewise, the first one loads a byte and the second one a word (it uses the whole AX register).
LAHF INSTRUCTION
Goal: It transfers the full content of the flags to the AH register.
Syntax:
LAHF
This instruction is helpful to make sure the state of the flags through the execution of our program.
LDS INSTRUCTION
Goal: used to load the register of the data segment
Syntax:
LDS destiny, source
The source operator must be a dual word in memory. The word related with the largest address is transferred to DS, in other words it is taken as the segment address. The word associated with the lesser address is the displacement address and it is deposited in the register indicated as destiny.
LEA INSTRUCTION
Goal: To load the address of the source operator
Syntax:
LEA destiny, source
The source operator must be situated in memory, and its displacement is placed on the index register or specified pointer in destiny.
Posted Date: 5/4/2012 4:29:00 AM | Location : United States







Related Discussions:- Loading instructions, Assignment Help, Ask Question on Loading instructions, Get Answer, Expert's Help, Loading instructions Discussions

Write discussion on Loading instructions
Your posts are moderated
Related Questions
Previous to we can perform writing to the disk it is essential to define the data transfer region using for this end the 1AH function of the 21H interruption. The 1AH function does

Assess the reliability of data gathered via paid Internet users. Describe and assess the evaluation method being used by the testing company, i.e., nonvisual and verbal recording o

Uninformed Search Strategies: To be able to undertake a regular search, our entire agent ought to know is the starting state, the possible operators and how to check whether th

Hi are you doing an interactive powerpoint porject

Keystroke logger and Data-stealing: Keystroke loggers: This is a program, once installed on the system, which intercepts the keys when entering the password or the Credit Ca

IPv6 documented in 1994 (RFC 1752) is still a collection of Draft and Proposed standards Several pre-standard implementations exist IPv6 was intended to be a pragmatic up

The term ‘page traffic’ describes

Previously two sections the fundamentals of the workings and architecture of the central processing unit has been explained. There has been a common look at easy processor architec

Browser Cookies: A cookie is a small message sent by the Web server to a your web client. This message is stored by the browser as a text file. The basic purpose of cookie is

construct a tree where preorder is ABCDFGE