8085 Note Final - 2
8085 Note Final - 2
8085 Note Final - 2
The above block diagram shows the organization of a microprocessor based system. In this system,
the microprocessor is the master and all other peripherals are slaves. The master controls all the
peripherals and initiates all operations.
The work done by the processor can be classified into the following three groups.
1. Work done internal to the processor
2. Work done external to the processor
3. Operations initiated by the slaves or peripherals.
The work done internal to the processors are addition, subtraction, logical operations, data transfer
operations, etc. The work done external to the processor are reading/writing the memory and
reading/writing the J/O devices or the peripherals. If the peripheral requires the attention of the
master then it can interrupt the master and initiate an operation.
PREPARED BY PROF KSHIROD KUMAR ROUT ASST PROF IIIT BHUBANESWAR
The microprocessor is the master, which controls all the activities of the system. To perform a
specific job or task, the microprocessor has to execute a program stored in memory. The program
consists of a set of instructions. It issues address and control signals and fetches the instruction and
data from memory. The instruction is executed one by one internal to the processor and based on
the result it takes appropriate action.
BUSES:
The buses are group of lines that carries data, address or control signals.
The CPU Bus has multiplexed lines, i.e., same line is used to carry different signals.
The CPU interface is provided to demultiplex the multiplexed lines, to generate chip select
signals and additional control signals.
PERIPHERAL DEVICES:
The EPROM memory is used to store permanent programs and data.
The RAM memory is used to store temporary programs and data.
The input device is used to enter the program, data and to operate the system.
The output device is used for examining the results.
Since the speed of I/O devices does not match with the speed of microprocessor, an interface
device is provided between system bus and I/O devices. Generally I/O devices are slow
devices.
The architecture of.8085 is shown in figure given below. The internal architecture of 8085 includes
the ALU, timing and control unit, instruction register and decoder, register array, interrupt control
and serial I/O control.
FLAG REGISTER:
There are five flags in 8085, which are sign flag (8), zero flag (Z), auxiliary carry flag (AC),
parity flag (P) and carry flag (CY). The bit positions reserved for these flags in the flag register
are shown in figure below.
PREPARED BY PROF KSHIROD KUMAR ROUT ASST PROF IIIT BHUBANESWAR
After an ALU operation, if the most significant bit of the result is 1, then sign flag is set. The zero
flag is set, if the ALU operation results in zero and it is reset if the result is non-zero. In an
arithmetic operation, when a carry is generated by the lower nibble, the auxiliary carry flag is set.
After an arithmetic or logical operation, if the result has an even number of 1 's the parity flag is set,
other wise it is reset.
If an arithmetic operation results in a carry, the carry flag is set other wise it is reset. Among the
five flags, the AC flag is used internally for BCD arithmetic and other four flags can be used by the
programmer to check the conditions of the result of an operation.
REGISTER ARRAY:
Apart from Accumulator (A-register), there are six general-purpose programmable registers
B, C, D, E, H and L.
They can be used as 8-bit registers or paired to store l6-bit data. The allowed pairs are B-C,
D-E and H-L.
The temporary registers W and Z are intended for internal use of the processor and it cannot
be used by the programmer.
STACK POINTER (SP):
The stack pointer SP, holds the address of the stack top. The stack is a sequence of RAM
memory locations defined by the programmer. The stack is used to save the content of
registers during the execution of a program.
PROGRAM COUNTER (PC):
The program counter (PC) keeps track of program execution. To execute a program the
starting address of the program is loaded in program counter. The PC sends out an address to
fetch a byte of instruction from memory and increment its content automatically. Hence,
when a byte of instruction is fetched, the PC holds the address of the next byte of the
instruction or next instruction.
PREPARED BY PROF KSHIROD KUMAR ROUT ASST PROF IIIT BHUBANESWAR
The address and the read control signal enable the memory to output the content of memory
location on the data bus. Now the content of data bus is the opcode of an instruction. The read
control signal is made high by timing and control unit after a specified time. At the rising edge of
read control signals, the opcode is latched into microprocessor internal bus and placed in instruction
register.
The instruction-decoding unit, decodes the instructions and provides information to timing and
control unit to take further actions.
The 8085 have 74 basic instructions and 246 total instructions. The instruction set of 8085 is
defined by the manufacturer Intel Corporation. Each instruction of 8085 has 1 byte opcode. With 8
bit binary code, we can generate 256 different binary codes. In this, 246 codes have been used for
opcodes.
ADDRESSING MODES
Every instruction of a program has to operate on a data. The method of specifying the data to be
operated by the instruction is called Addressing. The 8085 has the following 5 different types of
addressing.
1. Immediate Addressing
2. Direct Addressing
3. Register Addressing
4. Register Indirect Addressing
5. Implied Addressing
Immediate Addressing
In immediate addressing mode, the data is specified in the instruction itself. The data will be apart
of the program instruction. All instructions that have I in their mnemonics are of Immediate
addressing type.
Eg. MVI B, 3EH - Move the data 3EH given in the instruction to B register.
Direct Addressing
In direct addressing mode, the address of the data is specified in the instruction. The data will be in
memory. In this addressing mode, the program instructions and data can be stored in different
memory blocks. This type of addressing can be identified by 16-bit address present in the
instruction.
Eg. LDA 1050H - Load the data available in memory location 1050H in accumulator.
Register Addressing
In register addressing mode, the instruction specifies the name of the register in which the data is
available. This type of addressing can be identified by register names (such as A, B, ) in the
instruction.
Eg. MOV A, B -Move the content of B register to A register.
Implied Addressing
In implied addressing mode, the instruction itself specifies the type of operation and location of data
to be operated. This type of instruction does not have any address, register name, immediate data
specified along with it.
Eg. CMA - Complement the content of accumulator.
PREPARED BY PROF KSHIROD KUMAR ROUT ASST PROF IIIT BHUBANESWAR
INSTRUCTION SET
The 8085 instruction set can be classified into the following five functional headings.
The 74 basic instructions of8085 are listed inTable-2.1. The opcode of each instruction, size,
machine cycles, number of T -state and the total number of instructions in each type are also shown
in table in next page. The instructions affecting the status flag are listed in table followed.
PREPARED BY PROF KSHIROD KUMAR ROUT ASST PROF IIIT BHUBANESWAR
PREPARED BY PROF KSHIROD KUMAR ROUT ASST PROF IIIT BHUBANESWAR
PREPARED BY PROF KSHIROD KUMAR ROUT ASST PROF IIIT BHUBANESWAR
PREPARED BY PROF KSHIROD KUMAR ROUT ASST PROF IIIT BHUBANESWAR
PREPARED BY PROF KSHIROD KUMAR ROUT ASST PROF IIIT BHUBANESWAR
INTERRUPTS
NEED FOR INTERRUPTS
Interrupt is a signal send by an external device to the processor, to the processor to perform a
particular task or work. Mainly in the microprocessor based system the interrupts are used for data
transfer between the peripheral and the microprocessor.
When a peripheral is ready for data transfer, it interrupts the processor by sending an appropriate
signal to the interrupt pin of the processor. If the processor accepts the interrupt then the processor
suspends its current activity and executes an interrupt service subroutine to complete the data
transfer between the peripheral and processor. After executing the interrupt service routine the
processor resumes its current activity. This type of data transfer scheme is called interrupt driven
data transfer scheme.
TYPES OF INTERRUPTS
The interrupts are classified into software interrupts and hardware interrupts.
The software interrupts are program instructions. These instructions are inserted at desired
locations in a program. While running a program, lf a software interrupt instruction is
encountered, then the processor executes an interrupt service routine (ISR).
The software interrupt instructions are included at the appropriate (or required) place in the main
program. When the processor encounters the software instruction, it pushes the content of PC
(Program Counter) to stack. Then loads the Vector address in PC and starts executing the Interrupt
Service Routine (ISR) stored in this vector address. At the end of ISR, a return instruction - RET
will be placed. When the RET instruction is executed, the processor POP the content of stack to PC.
Hence the processor control returns to the main program after servicing the interrupt. Execution of
ISR is referred to as servicing of interrupt.
All software interrupts of 8085 are vectored interrupts. The software interrupts cannot be masked
and they cannot be disabled.
The processor saves the content of PC (program Counter) in stack and then loads the vector address
of the interrupt in PC. (If the interrupt is non-vectored, then the interrupting device has to supply the
address of ISR when it receives INTA signal). It starts executing ISR in this address. At the end of
ISR, a return instruction, RET will be placed. When the processor executes the RET instruction, it
POP the content of top of stack to PC. Thus the processor control returns to main program after
servicing interrupt.
The hardware interrupts of 8085 are TRAP, RST 7.5, RST 6.5, RST 5.5 and INTR.
Further the interrupts may be classified into VECTORED and NON-VECTORED INTERRUPTS.
VECTORED INTERRUPT
In vectored interrupts, the processor automatically branches to the specific address in response to an
interrupt.
NON-VECTORED INTERRUPT
But in non-vectored interrupts the interrupted device should give the address of the interrupt service
routine (ISR).
In vectored interrupts, the manufacturer fixes the address of the ISR to which the program control
is to be transferred. The vector addresses of hardware interrupts are given in table above in
previous page.
PREPARED BY PROF KSHIROD KUMAR ROUT ASST PROF IIIT BHUBANESWAR
The TRAP, RST 7.5, RST 6.5 and RST 5.5 are vectored interrupts.
The INTR is a non-vectored interrupt. Hence when a device interrupts through INTR, it has to
supply the address of ISR after receiving interrupt acknowledge signal.
The type of signal that has to be placed on the interrupt pin of hardware interrupts of 8085 are
defined by INTEL.
The TRAP interrupt is edge and level sensitive. Hence, to initiate TRAP, the interrupt signal has to
make a low to high transition and then it has to remain high until the interrupt is recognized.
The RST 7.5 interrupt is edge sensitive (positive edge). To initiate the RST 7.5, the interrupt signal
has to make a low to high transition an it need not remain high until it is recognized.
The RST 6.5, RST 5.5 and INTR are level sensitive interrupts. Hence for these interrupts the
interrupting signal should remain high, until it is recognized.
The hardware vectored interrupts are classified into maskable and non-maskable interrupts.
Masking is preventing the interrupt from disturbing the main program. When an interrupt is masked
the processor will not accept the interrupt signal. The interrupts can be masked by moving an
appropriate data (or code) to accumulator and then executing SIM instruction. (SIM - Set Interrupt
Mask). The status of maskable interrupts can be read into accumulator by executing RIM instruction
(RIM - Read Interrupt Mask).
All the hardware interrupts, except TRAP are disabled, when the processor is resetted. They can
also be disabled by executing Dl instruction. (Dl-Disable Interrupt).
When an interrupt is disabled, it will not be accepted by the processor. (i.e., INTR, RST 5.5,
RST 6.5 and RST 7.5 are disabled by DI instruction and upon hardware reset).
To enable (to allow) the disabled interrupt, the processor has to execute El instruction (El-
Enable Interrupt).
PREPARED BY PROF KSHIROD KUMAR ROUT ASST PROF IIIT BHUBANESWAR
The interrupt driven data transfer scheme is the best method of data transfer for effectively utilizing
the processor time. In this scheme, the processor first initiates the I/O device for data transfer. After
initiating the device, the processor will continue the execution of instructions in the program. Also
at the end of an instruction the processor will check for a valid interrupt signal. If there is no
interrupt then the processor will continue the execution.
When the I/O device is ready, it will interrupt the processor. On receiving an interrupt signal, the
processor will complete the current instruction execution and saves the processor status in stack.
Then the processor calls an interrupt service routine (ISR) to service the interrupted device. At the
end of ISR the processor status is retrieved from stack and the processor starts executing its main
program. The sequence of operations for an interrupt driven data transfer scheme is shown in figure
below.
PREPARED BY PROF KSHIROD KUMAR ROUT ASST PROF IIIT BHUBANESWAR
The machine cycles are the basic operations performed by the processor, while instructions
are executed. The time taken for performing each machine cycle is expressed in terms of T-
states.
One T-state is the time period of one clock cycle of the microprocessor.
DELAY ROUTINE
Delay routines are subroutines used for maintaining the timings of various operations in
microprocessor.
In control applications, certain equipment needs to be ON/OFF after a specified time delay. In some
applications, a certain operation has to be repeated after a specified time interval. In such cases,
simple time delay routines can be used to maintain the timings of the operations.
The delay time is given by the total time taken to execute the delay routine. It can be computed by
multiplying the total number of T-states required to execute subroutine and the time for one T-state
of the processor. The total number of T-states can be computed from the knowledge of T-states
required for each instruction. The time for one T-state of the processor is given by the inverse of the
internal clock frequency of the processor.
For example, if the 8085 microprocessor has 5 MHz quartz crystal then,
For small time delays (< 0.5 msec) an 8- bit register can be used.
For large time delays (< 0.5 Sec) l6-bit register should be used.
For very large time delays (> 0.5 sec), a delay routine can be repeatedly called in the main
program.
The disadvantage in delay routines is that the processor time is wasted. An alternate solution is to
use dedicated timer like 8253/8254 to produce time delays or to maintain timings of various
operations.
Two example delay routines are presented in this section with details of timing calculations.
PREPARED BY PROF KSHIROD KUMAR ROUT ASST PROF IIIT BHUBANESWAR
Solution
The delay required is 0.5 msec, hence an 8-bit register of8085 can be used to store a Count value
and then decrement to zero. The delay routine is written as a subroutine as shown below.
Delay routine
MVI D, N ; Load the count value, N in D-register.
Loop: DCR D ; Decrement the count.
JNZ Loop ; If count is zero go to
RET ; Return to main program.
The following table shows the T-state required for execution of the instructions in the subroutine.
T-State required for
Number of times the
Instruction execution of an Total T-States
instruction is executed
instruction
CALL addr16 18 1 18 x 1 = 18
MVI D, N 7 1 7x1=7
DCR D 4 N times 4 x N = 4N
JNZ LOOP 10 (or) (N-1) times 10 x (N-1) = 10N - 10
7 1 7x1=7
RET 10 1 10 x 1 = 10
TOTAL T-STATES FOR DELAY SUBROUTINE 14N + 32
PROGRAMMING EXAMPLES:
1. Write an ALP using 8085 to multiply two 8-bit numbers by repeated addition.
Loop: ADD B |
JNC next |
INR C } Multiplication by repeated addition.
Next: DCR D |
JNZ loop |
2. Write an ALP for 8085 to count from AAH to 00H, with a time delay of 2ms for each
count. Assume the external frequency given to the processor is 2MHz.
INTERFACING EXAMPLES:
Draw the circuit diagram of an 8085 system, having a 4 KB EPROM and two 8 KB RAM ICs.
The starting address of the EPROM is 0000H and that of RAM is 8000H. The address of the
decoder circuits should be clearly shown.
Answer :
EPROM - 4 KB (Address lines required is 12 A0 to A11 )
RAM-I - 8 KB (Address lines required is 13 A0 to A12 )
RAM-II - 8 KB (Address lines required is 13 A0 to A12 )
Part A:
RIM Instruction:
The RIM instruction is used to check whether an interrupt (RST7.5, RST6.5 and RST5.5) is
masked or not. It is also used to read data from SID line.
5. What will be the outcome, in execution of instructions LXI H,4600H and LHLD 4600H?
When LXI H,4600 is executed, the number 4600 will be loaded to HL register pair.
When LHLD 4600 is executed, the contents of memory location 4600H will be transferred to
HL register pair.
D0-7
P AD0-7 74LS373
8085 Latch A0-7
EN
ALE
When low byte address (A0-7 ) comes out of AD0-7 lines, the processor asserts HIGH in the
ALE pin, enabling the latch to separate the low byte address.
PREPARED BY PROF KSHIROD KUMAR ROUT ASST PROF IIIT BHUBANESWAR
Bus
System Bus CPU Bus
Internal External It will not be
It will be directly
directly connected
connected to CPU
to CPU
There will be
The data and
separate data,
CPU bus System Bus address may be
address & control
multiplexed
buses
9. What is Processor (machine) cycle? List the various machine cycles with its T-states.
The machine cycles are the basic operations performed by the processor, while instructions
are executed. The time taken for performing each machine cycle is expressed in terms of T-
states.
10. List the various addressing modes in 8085 with two examples in each.
a) Direct:
The data is stored in memory and 16 bit address of data in memory location is specified
in the instruction.
Eg.: LDA 4500, LHLD 4200
b) Immediate:
The required data for processing is given next to the Opcode, in the instruction itself.
Eg.: MVI A, 55 CPI 64, ADI 0A
c) Register:
The data is placed in a register and the register name is given in the instruction to access
the data.
Eg.: MOV A,B ADD B, SUB C
d) Register Indirect:
The data is stored in memory and the 16-bit address of the data location in memory is
placed in a register pair. This register pair holding the 16-bit address is given in the
instruction to access the data.
Eg.: LXI, H 4250
MOV A, M
e) Implied:
The data location & the operation to be performed is given in the instruction itself.
Eg.: CMA, RAR, XCHG
Stack Pointer:
It is a 16-bit memory pointing register, having the last address of the stack in RAM.
PREPARED BY PROF KSHIROD KUMAR ROUT ASST PROF IIIT BHUBANESWAR
JMP Instruction
Execution of a JMP instruction will transfer the program control from one location to
another location within the same program. Time taken for its execution is 7 / 10 T
Main _________
_________
_________
JMP addr16
_________
_________
addr16:_________
_________
Various HARDWARE interrupts are TRAP, RST7.5, RST6.5, RST5.5, INTR (5 Nos)
Execution of an OUT instruction will transfer one byte of data from Accumulator of
microprocessor to an Output device.
15. Write an ALP for time delay using a register pair available in 8085.
Main _________ Delay: LXI D, data16
_________ loop: NOP
_________ NOP
NOP
CALL Delay DCX D
_________ JNZ loop
_________ RET
16. Write
an assembly language program to store the contents of the flag register in
memory location 2000H.
PUSH PSW - Stores the contents of Accumulator & Flag register in Stack
POP D - Restores the stored contents of stack to DE register pair
MOV A, E - Move the contents of E register to Accumulator
STA 2000H - Contents of Accumulator is now stored to memory location 2000H