Instruction set and effective addressing techniques, Computer Engineering

Assignment Help:

The term addressing mode is a technique of stating the input and output of an instruction; it is termed the effective address. There are 6 effective addresses in the 68HC11 set of instructions

Immediate data
 
Here the operand 'data 'follows the opcode 'Instruction' in memory, normally only a byte is used.
 
  addb #$1    i.e. add to b  data 1 hex 
 
Direct addressing

 Here the operand contains the lower order byte of the address, the remaining upper byte of the 16 bit address is assumed to be zero . This allows a fast read/write of memory between 0x0000 and 0x00ff.
 
  addb $ff  i.e. add to b data from address 00ff hex
 
Extended addressing

  Here the address is contained in the next two bytes after the opcode i.e. high byte first, followed by low byte. This allows a read/write of the full address space i.e. 0x0000 to 0xffff

  addb $ffff  i.e. add to b data from address ffff hex
 
Indexed Addressing

  Here the address is calculated using an index register (IX, IY) and a 8 bit unsigned immediate offset. The address is calculated by temporary adding the contents of the index register to the immediate offset and using that as the extended address. This type is addressing is often termed a pointer or page addressing 
 
  addb $ff,X   i.e. add to b data from address in X + ff hex 
 
Relative addressing

   Here the address is stored as the operand and comprises of a signed 8 bit number, the effective address comprises of the current program counter + the signed 8 bit number. This is often used in branches etc. but with the use of re-locatable assemblers, the uses of labels have made this transparent.

  bne $04    i.e. jump forward 4 spaces
  bne $84    i.e. jump back 4 spaces


Related Discussions:- Instruction set and effective addressing techniques

What is a container class, What are the types of container classes in C++? ...

What are the types of container classes in C++?  Ans) A container class is a class that is used to hold objects in memory/external storage. A container class behaves as a ge

Procedures relating to the deployment of the server, Edith & Associates is ...

Edith & Associates is a modern law firm. They have an Internet Link that is an ADSL 8MB links from JJNET. The server they are to deploy will the main service giving  server and wil

A luminous jewel game, a luminous jewel game c programming start with t and...

a luminous jewel game c programming start with t and end with t the output will yes or no

Layered architecture of edi, Layered Architecture of EDI: EDI is most c...

Layered Architecture of EDI: EDI is most commonly applied in the implementation and settlement phases of the trade cycle. In implementation of a simple trade exchange, the cust

Explain biometric systems, Explain Biometric Systems Biometrics is the ...

Explain Biometric Systems Biometrics is the science of measuring physical properties of living beings. Biometric Authentication (1) Biometric authentication is the aut

What are the two phases in the advancement of linux, What are the two phase...

What are the two phases in the advancement of Linux? State some Applications of Open Source Systems? Finance Educational Data Storage and Management ERP (Ent

Threads model - parallel programming model, In this model a one process can...

In this model a one process can have multiple, concurrent implementations paths. The major programs are scheduled to run by the native operating system. It loads and obtains all th

State the encryption and decryption process with example, State the Encrypt...

State the Encryption and decryption process with example Encryption and decryption process in the Figure where Ram wants to send a confidential message to his friend Shyam. Ram

Embedded system design using c, W To date we have discussed elementary high...

W To date we have discussed elementary high level language programming and low level assembler programming, one of the benefits of C is the integration of both , this requires a re

Illustrate memory read operation, Q. Illustrate Memory Read operation? ...

Q. Illustrate Memory Read operation? Memory unit receives the address from a register known as the memory address register designated by MAR. Data is transferred to another re

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd