Inherent addressing, Computer Engineering

Assignment Help:

Inherent addressing

  Here the address is already built in to the instruction i.e. inherent to the code
 
  ABA  ; Add A to B and store the answer in A 

Simple programs using the 68HC11 language

  This section of functions include instructions such as ALU functions, simple movement and logically operations .Let us consider the addition of two 8 bit numbers

Program One: Data is immediate
 
  LDAA #$fe  ; Load hex fe into accumulator A
  ADDA #$1  ; Add 1 hex to A i.e total = ff hex
 
Program two:  Direct addressing and extended addressing

  Assume the data is stored at the following Ram address

Address Data
501    fe     Number One
502    01    Number Two
503            Result
 
LDAA $501  ;Load fe from address 501 into A
ADDA $502  ;Add 01 from address 502 into A
STAA $503  ;Store the answer ff at address 503
 
Program three: Index addressing

  Assume the data is stored at the following Ram address

Address Data
500     fe    Number One
501    01    Number Two
502             Result
  
LDX #$500    ;Load IX with 500 base address
LDAA  $0,X    ;Load data from 500 + 0 into A i.e fe
ADDA  $1,X    ;Add data from 500+1  to A i.e ff
STAA  $2,X    ;Store A at address 500+2


Related Discussions:- Inherent addressing

cell array to a spreadsheet, The xlswrite function can write the contents ...

The xlswrite function can write the contents of a cell array to a spreadsheet.  A manufacturer kepts information on the weights of some parts in a cell array.  Every row stores the

Microprocesseor, In8085 are of the following statements is not true.A) Co-p...

In8085 are of the following statements is not true.A) Co-processor is interfaced in max mode. B) Co-processor is interfaced in MIN mode C )Co-processor is interfaced in max/min mod

What are the differences between one hot and binary encoding, What are the ...

What are the differences between one hot and binary encoding? Common classifications used to explain the state encoding of an FSM is Binary or highly encoded and one hot. A bin

Forward checking - artificial intelligence, Forward checking: Whether ...

Forward checking: Whether to add some sophistication to the search method there constraint solvers use a technique called as forward checking. So here the general idea is to w

A luminous jewel game, a luminous jewel game c programming start with t and...

a luminous jewel game c programming start with t and end with t the output will yes or no

Explain priority encoder with an example, Explain Priority encoder with an ...

Explain Priority encoder with an example. Ans. Priority encoder- Basically an encoder is a combinational circuit which performs the inverse operation of a decoder. The inp

Threads, First, remember that different processes keep their own data in di...

First, remember that different processes keep their own data in distinct address spaces. Threads, on the other hand, explicitly share their entire address space with one another. A

Determine the operations from functions, Operations from Functions As ...

Operations from Functions As we know, function is actually operations on object. These   functions could be simple and summarized on object model. Organise functions into oper

Define far and near procedures, Q. Define Far and Near Procedures? Proc...

Q. Define Far and Near Procedures? Procedure offers the primary means of breaking the code in a program into modules. Procedures have one maindrawbackwhich is they need extra c

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd