String manipulation instruction-microprocessor, Assembly Language

Assignment Help:

String Manipulation Instruction

A series of words or data bytes are available in memory at consecutive locations, to be mention to individually or collectively, are known as byte strings or word strings or byte strings. For instance, a string of characters can be located in consecutive memory locations, where each character can be represented by its ASCII equivalent. For mention to a string, two parameters are needed,

(a) Length of the string and

(b) Starting or ending address of the string.

The length of a string is generally stored as count in the CX register. In case of 8085, same structures may be set up by counter and the pointer arrangements.  The counters and pointers can be modified at each iteration until the needed condition for proceeding further is satisfied. Instead, the 8086 supports a set of more powerful instructions for string manipulations.  In case of 8086 string instructions, the decrementing or incrementing of the pointer depends on the direction flag (DF) status. If it is a byte string operation then the index registers are updated by one. Instead, if it is a word string operation then the index registers are updated by two. The counter in both of the cases is decremented by one. It consisits of REP, MOVSW/MOVSB, CMPS, SCAS, LODS, STOS.

 


Related Discussions:- String manipulation instruction-microprocessor

Project, I need some guidance on which project to make in assembly language...

I need some guidance on which project to make in assembly language

4 bit 2s complement multiplier, How to design 4 bit signed 2s complement m...

How to design 4 bit signed 2s complement multiplier?

Cbw-cwd-arithmetic instruction-microprocessor, CBW: Convert Signed Byte to...

CBW: Convert Signed Byte to Word: This instruction converts a signed byte to a signed word. In other terms, it copies the sign bit of a byte to be converted to all of the bits in

Risc characteristics-microprocessor, RISC Characteristics : The  concep...

RISC Characteristics : The  concept  of  RISC  architecture  include  an  attempt  to  reduce  execution  time  by make  simple  the instruction set of the computer. The main c

FIRE ALARM PROGRAMMING, PLEASE MAY YOU ASSIST ME WITH SAMPLE CODES FOR PROG...

PLEASE MAY YOU ASSIST ME WITH SAMPLE CODES FOR PROGRAMING A FIRE ALARM MINI PROJECT

Program to perform one byte bcd addition-assembly program, Program : Write...

Program : Write a program to perform a one byte BCD addition. Solution : It is consider that the operands are in BCD form, but the CPU considers it as hexadecimal and acco

Flowchart, ALP to preform of two 16-bit numbers in register addressing mode...

ALP to preform of two 16-bit numbers in register addressing mode

Generating random number using 8086, I need to generate a random number bby...

I need to generate a random number bby using 8086 assembly language

Cache components-microprocessor, Cache components The cache sub-system ...

Cache components The cache sub-system may be divided into 3 functional blocks: Tag RAM, SRAM and theCache Controller. In real designs, these blocks can be implemented  by multi

Convert into hex pairs, Convert 751 to hex and show what it would look like...

Convert 751 to hex and show what it would look like stored at TheNumber WORD ? (hint: answer in hex pairs)

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd