Inherent addressing, Computer Engineering

Assignment Help:

Inherent addressing

  Here the address is already built in to the instruction i.e. inherent to the code
 
  ABA  ; Add A to B and store the answer in A 

Simple programs using the 68HC11 language

  This section of functions include instructions such as ALU functions, simple movement and logically operations .Let us consider the addition of two 8 bit numbers

Program One: Data is immediate
 
  LDAA #$fe  ; Load hex fe into accumulator A
  ADDA #$1  ; Add 1 hex to A i.e total = ff hex
 
Program two:  Direct addressing and extended addressing

  Assume the data is stored at the following Ram address

Address Data
501    fe     Number One
502    01    Number Two
503            Result
 
LDAA $501  ;Load fe from address 501 into A
ADDA $502  ;Add 01 from address 502 into A
STAA $503  ;Store the answer ff at address 503
 
Program three: Index addressing

  Assume the data is stored at the following Ram address

Address Data
500     fe    Number One
501    01    Number Two
502             Result
  
LDX #$500    ;Load IX with 500 base address
LDAA  $0,X    ;Load data from 500 + 0 into A i.e fe
ADDA  $1,X    ;Add data from 500+1  to A i.e ff
STAA  $2,X    ;Store A at address 500+2


Related Discussions:- Inherent addressing

Testmanagers wizard, TestManager has a wizard that you can use to copy or i...

TestManager has a wizard that you can use to copy or import test scripts and other test assets (Datapools) from one to another.

Reprographic methods for information distribution, Reprographic Methods ...

Reprographic Methods i) Thermography ii) Dyeline jii) Microfiche iv) Fax In this unit you have learnt that: Used for Methods of reprography are used for the

Sigmoid units-artificial intelligence, Sigmoid units - Artificial intellige...

Sigmoid units - Artificial intelligence Remember that the function inside units take as input the weighted sum, S, of the values coming from the units associated to it. The fun

A luminous jewel game, a luminous jewel game c programming start with t and...

a luminous jewel game c programming start with t and end with t the output will yes or no

How aliases are used in DNS, How aliases are used in DNS? Explain. CNAM...

How aliases are used in DNS? Explain. CNAME entries are analogous to a symbolic link in a file system- the entry gives an alias for other DNS entry. Corporation of expertsmind

Illustrate what is pascal''s principle, Illustrate what is pascal's princip...

Illustrate what is pascal's principle? Answer:- Pascal's Principle declares that the pressure is transmitted evenly through a liquid. That's why when you pump up a balloon

Which method is used for resolving data dependency, Which method is used fo...

Which method is used for resolving data dependency conflict by the compiler itself?  (A) Delayed load.   (B) operand forwarding.   (C) Pre fetch target instruction.  (D) loo

Memory-to-memory architecture:, Memory-to-Memory Architecture : The pipe...

Memory-to-Memory Architecture : The pipelines can access vector operands, intermediate and final results directly in the main memory. This needs the higher memory bandwidth. How

What is secondary storage systems, There are various limitations of primary...

There are various limitations of primary memory like limited capacity which is its not enough to store a very large volume of data and volatility which is when power is turned off

What are the properties of e-cash, What are the properties of E-cash? ...

What are the properties of E-cash? Properties: a. Monetary Value: It must be backed through either cash, bank –certified cashier’s cheque and authorized credit cards.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd