ARM Cortex M0 User Guide
ARM Cortex M0 User Guide
ARM Cortex M0 User Guide
Note: The following document is primarily comprised of information extracted with permission from the ARM,
Ltd. document Cortex™-M0 User Guide Reference Material, copyright © 2009 ARM Limited. The material is
shortened and adapted for instruction in the use of the ARM® Cortex™-M0 core used in the MCU implemented
by IDT in its products. All material is subject to the 2009 copyright belonging to ARM Limited.
Contents
®
1 IDT’s ARM Core ............................................................................................................................................. 6
®
2 ARM Cortex™-M0 User Guide ...................................................................................................................... 7
2.1 Introduction ............................................................................................................................................... 7
2.1.1 Scope of this Document ..................................................................................................................... 7
2.1.1.1 Typographical Conventions .......................................................................................................................... 7
2.1.2 About the Cortex™-M0 Processor and Core Peripherals .................................................................. 8
2.1.2.1 System-Level Interface ................................................................................................................................ 9
2.1.2.2 Integrated Debug Logic ................................................................................................................................ 9
2.1.2.3 Cortex™-M0 Processor Features Summary ................................................................................................ 9
2.1.2.4 Cortex™-M0 Core Peripherals ..................................................................................................................... 9
2.2 Cortex™-M0 Processor .......................................................................................................................... 10
2.2.1 Programmer’s Model ........................................................................................................................ 10
2.2.1.1 Processor Modes ....................................................................................................................................... 10
2.2.1.2 Stacks ........................................................................................................................................................ 10
2.2.1.3 Core Registers ........................................................................................................................................... 11
2.2.1.4 Exceptions and Interrupts .......................................................................................................................... 18
2.2.1.5 Data Types ................................................................................................................................................. 18
2.2.1.6 The Cortex™ Microcontroller Software Interface Standard (CMSIS) ......................................................... 18
2.2.2 Memory Model.................................................................................................................................. 19
2.2.2.1 Memory Regions, Types, and Attributes .................................................................................................... 20
2.2.2.2 Memory System Ordering of Memory Accesses ........................................................................................ 21
2.2.2.3 Behavior of Memory Accesses ................................................................................................................... 22
2.2.2.4 Software Ordering of Memory Accesses .................................................................................................... 23
2.2.2.5 Memory Endianness .................................................................................................................................. 24
2.2.3 Exception Model ............................................................................................................................... 24
2.2.3.1 Exception States ........................................................................................................................................ 24
2.2.3.2 Exception Types......................................................................................................................................... 25
2.2.3.3 Exception Handlers .................................................................................................................................... 27
2.2.3.4 Vector Table ............................................................................................................................................... 27
2.2.3.5 Exception Priorities .................................................................................................................................... 28
2.2.3.6 Exception Entry and Return ....................................................................................................................... 29
2.2.4 Fault Handling .................................................................................................................................. 32
2.2.4.1 Lockup ....................................................................................................................................................... 32
2.2.5 Power Management ......................................................................................................................... 32
2.2.5.1 Entering Sleep Mode.................................................................................................................................. 33
2.2.5.2 Wakeup from Sleep Mode .......................................................................................................................... 33
2.2.5.3 Power Management Programming Hints ................................................................................................... 33
2.3 Cortex™-M0 Instruction Set ................................................................................................................... 34
List of Figures
Figure 2.1 Cortex™-M0 Implementation ................................................................................................................. 8
Figure 2.2 Core Register Set Overview ................................................................................................................ 11
Figure 2.3 PSR Register; Combination of APSR, IPSR, and EPSR ..................................................................... 13
Figure 2.4 PRIMASK Register .............................................................................................................................. 16
Figure 2.5 CONTROL Register ............................................................................................................................. 17
®
Figure 2.6 General ARM Memory Map ............................................................................................................... 19
Figure 2.7 Memory Access Ordering if Memory Access Instruction A1 Occurs Before Instruction A2 ................ 21
Figure 2.8 Example of Little-Endian Format ......................................................................................................... 24
Figure 2.9 Vector Table ......................................................................................................................................... 27
Figure 2.10 Exception Entry Stack Contents .......................................................................................................... 30
Figure 2.11 ASR #3 ................................................................................................................................................. 40
Figure 2.12 LSR #3 ................................................................................................................................................. 40
Figure 2.13 LSL #3 .................................................................................................................................................. 41
Figure 2.14 ROR #3 ................................................................................................................................................ 41
Figure 2.15 ISER ..................................................................................................................................................... 82
Figure 2.16 CER...................................................................................................................................................... 83
Figure 2.17 ISPR ..................................................................................................................................................... 84
Figure 2.18 ICPR..................................................................................................................................................... 85
Figure 2.19 IPR0-2 .................................................................................................................................................. 86
Figure 2.20 CPUID register ..................................................................................................................................... 90
Figure 2.21 ICSR..................................................................................................................................................... 91
Figure 2.22 AIRCR .................................................................................................................................................. 94
Figure 2.23 SCR...................................................................................................................................................... 95
List of Tables
Table 2.1 Summary of Processor Mode and Stack Use Options ........................................................................ 10
Table 2.2 Core Register Set Summary ................................................................................................................ 11
Table 2.3 PSR Register Combinations ................................................................................................................ 13
Table 2.4 APSR Bit Assignments ........................................................................................................................ 14
Table 2.5 IPSR Bit Assignments .......................................................................................................................... 14
Table 2.6 EPSR Bit Assignments ........................................................................................................................ 15
Table 2.7 PRIMASK Register Bit Assignments ................................................................................................... 16
Table 2.8 CONTROL Register Bit Assignments .................................................................................................. 17
Table 2.9 Memory Access Behavior .................................................................................................................... 22
Table 2.10 Properties of the Different Exception Types ........................................................................................ 26
Table 2.11 Exception Return Behavior .................................................................................................................. 31
Table 2.12 Set of Instructions Supported by the Cortex™-M0 Processor ............................................................. 34
Table 2.13 CMSIS Intrinsic Functions to Generate some Cortex™-M0 Instructions ............................................ 37
Table 2.14 CMSIS Intrinsic Functions to Access the Special Registers................................................................ 38
Table 2.15 Condition Code Suffixes ...................................................................................................................... 44
Table 2.16 Memory access instructions................................................................................................................. 45
Table 2.17 Data Processing Instructions ............................................................................................................... 53
Table 2.18 ADC, ADD, RSB, SBC and SUB Operand Restrictions ...................................................................... 56
Table 2.19 Branch and Control Instructions .......................................................................................................... 66
Table 2.20 Branch Ranges .................................................................................................................................... 67
Table 2.21 Miscellaneous Instructions ................................................................................................................... 69
Table 2.22 Core Peripheral Register Regions ....................................................................................................... 79
Table 2.23 NVIC Register Summary...................................................................................................................... 80
Table 2.24 CMSIS Access NVIC Functions ........................................................................................................... 81
Table 2.25 ISER Bit Assignments .......................................................................................................................... 82
Table 2.26 ICER Bit Assignments.......................................................................................................................... 83
Table 2.27 ISPR Bit Assignments .......................................................................................................................... 84
Table 2.28 CPR Bit Assignments........................................................................................................................... 85
Table 2.29 IPR Bit Assignments ............................................................................................................................ 86
Table 2.30 Properties of the Different Exception Types ........................................................................................ 88
Table 2.31 Summary of the SCB Registers ........................................................................................................... 89
Table 2.32 PUID Register Bit Assignments ........................................................................................................... 90
Table 2.33 ICSR Bit Assignments.......................................................................................................................... 92
Table 2.34 AIRCR Bit Assignments ....................................................................................................................... 94
Table 2.35 SCR Bit Assignments........................................................................................................................... 95
2.1 Introduction
This material is for microcontroller software and hardware engineers, including those who have no experience with
®
ARM products.
italic Highlights important notes, introduces special terminology, denotes internal cross-references, and
citations.
bold Highlights interface elements, such as menu names. Denotes signal names. Used for terms in
descriptive lists, where appropriate.
monospace Denotes text that can be entered at the keyboard, such as commands, file and program names,
and source code.
monospace Denotes a permitted abbreviation for a command or option. The underlined text can be entered
instead of the full command or option name.
monospace italic Denotes arguments to monospace text where the argument is to be replaced by a specific value.
monospace bold Denotes language keywords when used outside the example code.
< and > Enclose replaceable terms for assembler syntax where they appear in code or code fragments.
For example:
CMP Rn, <Rm|#imm>
Cortex™-M0 Components
Cortex™-M0 Processor
Debug
Nested
Interrupts Breakpoint
Vectored Cortex™-M0
and
Interrupt Processor
Watchpoint
Controller Core
Unit
(NVIC)
Debug
Debugger
Bus Matrix Access Port
Interface
(DAP)
The Cortex™-M0 processor is built on a 32-bit processor core that is highly optimized for area and power and has a
3-stage pipeline von Neumann architecture. The processor delivers exceptional energy efficiency through a small but
powerful instruction set and extensively optimized design, providing high-end processing hardware including a single-
cycle multiplier.
®†
The Cortex™-M0 processor implements the ARMv6-M architecture, which is based on the 16-bit Thumb instruction
set and includes Thumb®-2 technology. This provides the exceptional performance expected of a modern 32-bit
architecture, with a higher code density than other 8-bit and 16-bit microcontrollers.
The Cortex™-M0 processor closely integrates a configurable Nested Vectored Interrupt Controller (NVIC), to deliver
industry-leading interrupt performance.
The NVIC
• includes a non-maskable interrupt (NMI)
• provides zero jitter interrupt option
• provides four interrupt priority levels
The tight integration of the processor core and the NVIC provides fast execution of interrupt service routines (ISRs),
dramatically reducing the interrupt latency. This is achieved through the hardware stacking of registers, and the ability
to abandon and restart load-multiple and store-multiple operations. Interrupt handlers do not require any assembler
wrapper code, removing any code overhead from the ISRs. Tail-chaining optimization also significantly reduces the
overhead when switching from one ISR to another.
To optimize low-power designs, the NVIC integrates with the sleep modes including a deep sleep function that
provides support of the power down modes controlled by the connected SBC.
These are
NVIC
The NVIC is an embedded interrupt controller that supports low latency interrupt processing.
System Control Block
The System Control Block (SCB) is the programmer’s model interface to the processor. It provides
system implementation information and system control, including configuration, control, and reporting of
system exceptions.
System timer
The system timer, SysTick, is a 24-bit count-down timer. Use this as a Real Time Operating System
(RTOS) tick timer or as a simple counter.
2.2.1.2 Stacks
The processor uses a full descending stack. This means the stack pointer indicates the last stacked item on the stack
memory. When the processor pushes a new item onto the stack, it decrements the stack pointer and then writes the
item to the new memory location. The processor implements two stacks, the main stack and the process stack, with
independent copies of the stack pointer; see section “Stack Pointer (PS).”
In Thread Mode, the CONTROL register controls whether the processor uses the main stack or the process stack;
see section “Control Register (CONTROL).” In Handler Mode, the processor always uses the main stack. The options
for processor operations are
Thread Applications Main stack or process stack (see Control Register (CONTROL))
R0
R1
R2
R3
Low registers
R4
R5
General purpose
R6
registers
R7
R8
R9
High registers R10
R11
R12
Stack Pointer SP (R13) PSP MSP
Link Register LR (R14)
Program Counter PC (R15)
PSR Program Status Register Special
PRIMASK Interrupt mask register registers
CONTROL Control Register
On reset, the processor loads the MSP with the value from address 0x00000000.
Note: Depending on the setting of memSwap bit (see corresponding data sheet), address 0x00000000 is located in
flash or RAM.
These registers are mutually exclusive bitfields in the 32-bit PSR. The PSR bit assignments are shown in Figure 2.3.
3130292827 252423 6 5 0
APSR N Z C V Reserved
Exception
IPSR Reserved
number
Access these registers individually or as a combination of any two or all three registers, using the register name as an
argument to the MSR or MRS instructions. For example,
• read all of the registers using PSR with the MRS instruction
• write to the APSR using APSR with the MSR instruction
Note: Reads of the ESPR bits return zero, and the processor ignores writes to these bits.
See the instruction descriptions “MRS” and “MSR” for more information about how to access the program status
registers.
[27:0] - Reserved
See section “Conditional Execution” for more information about the APSR negative, zero, carry or borrow, and
overflow flags.
Interrupt Program Status Register (IPSR)
The IPSR contains the exception number of the current Interrupt Service Routine (ISR). See the register summary in
Table 2.2 for its attributes. The bit assignments are given in Table 2.5.
[31:6] - Reserved
[31:25] - Reserved
[23:0] - Reserved
Attempts by application software to read the EPSR directly using the MRS instruction always return zero. Attempts to
write the EPSR using the MSR instruction are ignored. Fault handlers can examine the EPSR value in the stacked PSR
to determine the cause of the fault. See section “Exception Entry and Return.” The following can clear the T bit to 0:
• instructions BLX, BX and POP{PC}
• restoration from the stacked xPSR value on an exception return
• bit[0] of the vector value on an exception entry
Attempting to execute instructions when the T bit is 0 results in a HardFault or a lockup. See section “Lockup” for
more information.
Interruptible-Restartable Instructions
The interruptible-restartable instructions are LDM and STM. When an interrupt occurs during the execution of one of
these instructions, the processor abandons execution of the instruction.
After servicing the interrupt, the processor restarts execution of the instruction from the beginning.
To disable or re-enable exceptions, use the MSR and MRS instructions, or the CPS instruction, to change the value of
PRIMASK. See “MRS,” “MSR,” and “CPS” for more information.
The PRIMASK register prevents activation of all exceptions with configurable priority. See the register summary in
Table 2.2 for its attributes.
31 1 0
Reserved
PRIMASK
[31:1] - Reserved
31 2 1 0
Reserved
[31:2] - Reserved
[0] - Reserved.
Handler Mode always uses the MSP, so the processor ignores explicit writes to the active stack pointer bit of the
CONTROL register when in Handler Mode. The exception entry and return mechanisms update the CONTROL
register.
In an OS environment, it is recommended that threads running in Thread Mode use the process stack and the kernel
and exception handlers use the main stack.
By default, Thread Mode uses the MSP. To switch the stack pointer used in Thread Mode to the PSP, use the MSR
instruction to set the Active stack pointer bit to 1, see “MRS.”
Note: When changing the stack pointer, software must use an ISB instruction immediately after the MSR instruction.
This ensures that instructions after the ISB execute using the new stack pointer. See “ISB.”
The NVIC registers control interrupt handling. See section “Nested Vectored Interrupt Controller (NVIC)” for more
information.
The CMSIS includes address definitions and data structures for the core peripherals in the Cortex™-M0 processor. It
also includes optional interfaces for middleware components comprising a TCP/IP stack and a Flash file system.
The CMSIS simplifies software development by enabling the reuse of template code and the combination of CMSIS-
compliant software components from various middleware vendors. Software vendors can expand the CMSIS to
include their peripheral definitions and access functions for those peripherals.
This document includes the register names defined by the CMSIS and gives short descriptions of the CMSIS
functions that address the processor core and the core peripherals.
Note: This document uses the register short names defined by the CMSIS. In a few cases, these differ from the
architectural short names that might be used in other documents.
®
Figure 2.6 General ARM Memory Map
0x FFFFFFFF
Device 511MB
0x E0100000
Private peripheral bus 1MB 0x E00FFFFF
0x E0000000
0x DFFFFFFF
0x A0000000
0x 9FFFFFFF
0x 60000000
0x 5FFFFFFF
Peripheral 0.5GB
0x 40000000
0x 3FFFFFFF
SRAM 0.5GB
0x 20000000
0x 1FFFFFFF
Code 0.5GB
0x 00000000
The processor reserves regions of the Private Peripheral Bus (PPB) address range for core peripheral registers; see
section “About the Cortex™-M0 Processor and Core Peripherals.”
The memory map is split into regions. Each region has a defined memory type, and some regions have additional
memory attributes. The memory type and attributes determine the behavior of accesses to the region.
The memory types are
Normal The processor can re-order transactions for efficiency, or perform speculative reads.
Device The processor preserves transaction order relative to other transactions to Device or Strongly-
ordered memory.
Strongly-ordered The processor preserves transaction order relative to all other transactions.
The different ordering requirements for Device and Strongly-ordered memory mean that the memory system can
buffer a write to Device memory, but must not buffer a write to Strongly-ordered memory.
However, the memory system does guarantee some ordering of accesses to Device and Strongly-ordered memory.
For two memory access instructions A1 and A2, if A1 occurs before A2 in program order, the ordering of the memory
accesses caused by two instructions is as shown in Figure 2.7.
Figure 2.7 Memory Access Ordering if Memory Access Instruction A1 Occurs Before Instruction A2
Where:
- Means that the memory system does not guarantee the ordering of the accesses.
< Means that accesses are observed in program order, that is, A1 is always observed before A2.
0x00000000- Code Normal - Executable region for program code. Data can also be
0x1FFFFFFF put here.
0x20000000- SRAM Normal - Executable region for data. Code can also be put here.
0x3FFFFFFF
0xE0000000- Private Strongly- XN This region includes the NVIC, System timer, and
0xE00FFFFF Peripheral ordered System Control Block. Only word accesses can be used
Bus in this region.
The Code, SRAM, and external RAM regions can hold programs.
Section “Memory System Ordering of Memory Accesses” describes the cases where the memory system guarantees
the order of memory accesses. Otherwise, if the order of memory accesses is critical, software must include memory
barrier instructions to force that ordering. The processor provides the following memory barrier instructions:
DMB The Data Memory Barrier (DMB) instruction ensures that outstanding memory transactions
complete before subsequent memory transactions. See “DMB.”
DSB The Data Synchronization Barrier (DSB) instruction ensures that outstanding memory transactions
complete before subsequent instructions execute. See “DSB.”
ISB The Instruction Synchronization Barrier (ISB) ensures that the effect of all completed memory
transactions is recognizable by subsequent instructions. See “ISB.”
Vector table If the program changes an entry in the vector table and then enables the corresponding
exception, use a DMB instruction between the operations. This ensures that if the exception
is taken immediately after being enabled, the processor uses the new exception vector.
Self-modifying code If a program contains self-modifying code, use an ISB instruction immediately after the code
modification in the program. This ensures subsequent instruction execution uses the updated
program.
Memory map switching If the system contains a memory map switching mechanism, use a DSB instruction after
switching the memory map. This ensures subsequent instruction execution uses the updated
memory map.
Memory accesses to Strongly-ordered memory, such as the System Control Block, do not require the use of DMB
instructions.
Memory Register
7 0
31 24 23 16 15 8 7 0
Address A B0 lsbyte B3 B2 B1 B0
A+1 B1
A+2 B2
A+3 B3 msbyte
Pending The exception is waiting to be serviced by the processor. An interrupt request from a
peripheral or from software can change the state of the corresponding interrupt to pending.
Active An exception that is being serviced by the processor but has not completed.
Note: An exception handler can interrupt the execution of another exception handler. In this case, both exceptions
are in the active state.
Active and pending The exception is being serviced by the processor and there is a pending exception from the
same source.
Reset Reset is invoked on power up or a warm reset. The exception model treats reset as a special form
of exception. When reset is asserted, the operation of the processor stops, potentially at any point
in an instruction. When reset is deasserted, execution restarts from the address provided by the
reset entry in the vector table. Execution restarts in Thread Mode.
NMI A NonMaskable Interrupt (NMI) can be signaled by a peripheral or triggered by software. This is
the highest priority exception other than reset. It is permanently enabled and has a fixed priority of
-2.
NMIs cannot be
• masked or prevented from activation by any other exception
• preempted by any exception other than Reset.
HardFault A HardFault is an exception that occurs because of an error during normal or exception
processing. HardFaults have a fixed priority of -1, meaning they have higher priority than any
exception with configurable priority.
SVCall A supervisor call (SVC) is an exception that is triggered by the SVC instruction. In an OS
environment, applications can use SVC instructions to access OS kernel functions and device
drivers.
SysTick A SysTick exception is an exception the system timer generates when it reaches zero. Software
can also generate a SysTick exception. In an OS environment, the processor can use this
exception as system tick.
Interrupt (IRQ) An interrupt, or IRQ, is an exception signaled by a peripheral or generated by a software request.
All interrupts are asynchronous to instruction execution. In the system, peripherals use interrupts
to communicate with the processor.
4-10 - Reserved - - -
12-13 - Reserved - - -
For an asynchronous exception, other than reset, the processor can execute additional instructions between when the
exception is triggered and when the processor enters the exception handler.
Privileged software can disable the exceptions that Table 2.10 shows as having configurable priority; see Table 2.26.
Interrupt Service Routines (ISRs) Interrupts IRQ0 (Flash) to IRQ8 (I2C) are the exceptions handled by ISRs.
Fault handler HardFault is the only exception handled by the fault handler.
System handlers NMI, PendSV, SVCall SysTick, and HardFault are all system exceptions
handled by system handlers.
Exception IRQ
Vector Offset
number number
24 8 IRQ8 (I²C) 0x60
. . .
. . .
. . .
18 2 IRQ2 (SW-LIN) 0x48
17 1 IRQ1 (External) 0x44
16 0 IRQ0 (Flash) 0x40
15 -1 SysTick 0x3C
14 -2 PendSV 0x38
13
Reserved
12
11 -5 SVCall 0x2C
10
9
8
7 Reserved
6
5
4 0x10
3 -13 HardFault 0x0C
2 -14 NMI 0x08
1 Reset 0x04
Initial SP value 0x00
If software does not configure any priorities, then all exceptions with a configurable priority have a priority of 0. For
information about configuring exception priorities, see
• section “System Handler Priority Registers (SHPR2-3)”
• section “Interrupt Priority Registers (IPR0 – IRP2)”
Note: Configurable priority values are in the range of 0-192, in steps of 64. The Reset, HardFault, and NMI
exceptions, with fixed negative priority values, always have higher priority than any other exception.
Assigning a higher priority value to IRQ[0] and a lower priority value to IRQ[1] means that IRQ[1] has higher priority
than IRQ[0]. If both IRQ[1] and IRQ[0] are asserted, IRQ[1] is processed before IRQ[0].
If multiple pending exceptions have the same priority, the pending exception with the lowest exception number takes
precedence. For example, if both IRQ[0] and IRQ[1] are pending and have the same priority, then IRQ[0] is processed
before IRQ[1].
When the processor is executing an exception handler, the exception handler is preempted if a higher priority
exception occurs. If an exception occurs with the same priority as the exception being handled, the handler is not
preempted, irrespective of the exception number. However, the status of the new interrupt changes to pending.
Preemption When the processor is executing an exception handler, an exception can preempt the exception
handler if its priority is higher than the priority of the exception being handled.
When one exception preempts another, the exceptions are called nested exceptions. See
exception entry below for more information.
Tail-chaining This mechanism speeds up exception servicing. On completion of an exception handler, if there is
a pending exception that meets the requirements for exception entry, the stack pop is skipped and
control transfers to the new exception handler.
Late-arriving This mechanism speeds up preemption. If a higher priority exception occurs during state saving
for a previous exception, the processor switches to handle the higher priority exception and
initiates the vector fetch for that exception. State saving is not affected by late arrival because the
state saved would be the same for both exceptions. On return from the exception handler of the
late-arriving exception, the normal tail-chaining rules apply.
Exception Entry
Exception entry occurs when there is a pending exception with sufficient priority and either
• the processor is in Thread Mode
• the new exception is of higher priority than the exception being handled, in which case, the new exception
preempts the exception being handled.
Sufficient priority means the exception has greater priority than any limit set by the mask register, see “Exception
Mask Register (PRIMASK).” An exception with less priority than this is pending but is not handled by the processor.
When the processor takes an exception, unless the exception is a tail-chained or a late-arriving exception, the
processor pushes information onto the current stack. This operation is referred to as stacking and the structure of
eight data words is referred as a stack frame. The stack frame contains the information given in Figure 2.10.
Immediately after stacking, the stack pointer indicates the lowest address in the stack frame. The stack frame is
aligned to a double-word address.
The stack frame includes the return address. This is the address of the next instruction in the interrupted program.
This value is restored to the PC at exception return so that the interrupted program resumes.
The processor performs a vector fetch that reads the exception handler start address from the vector table. When
stacking is complete, the processor starts executing the exception handler. At the same time, the processor writes an
EXC_RETURN value to the LR. This indicates which stack pointer corresponds to the stack frame and what operation
mode the processor was in before the entry occurred.
If no higher priority exception occurs during exception entry, the processor starts executing the exception handler and
automatically changes the status of the corresponding pending interrupt to active.
If another higher priority exception occurs during exception entry, the processor starts executing the exception
handler for this exception and does not change the pending status of the earlier exception. This is the late arrival
case.
Exception Return
Exception return occurs when the processor is in Handler Mode and execution of one of the following instructions
attempts to set the PC to an EXC_RETURN value:
• a POP instruction that loads the PC
• a BX instruction using any register.
The processor saves an EXC_RETURN value to the LR on exception entry. The exception mechanism relies on this
value to detect when the processor has completed an exception handler. Bits[31:4] of an EXC_RETURN value are
0xFFFFFFF. When the processor loads a value matching this pattern to the PC, it detects that the operation is a not a
normal branch operation and, instead, that the exception is complete. Therefore, it starts the exception return
sequence. Bits[3:0] of the EXC_RETURN value indicate the required return stack and processor mode, as Table 2.11
shows.
EXC_RETURN Description
Note: Only Reset and NMI can preempt the fixed priority HardFault handler. A HardFault can preempt any exception
other than Reset, NMI, or another hard fault.
2.2.4.1 Lockup
The processor enters a lockup state if a fault occurs when executing the NMI or HardFault handlers, or if the system
generates a bus error when unstacking the PSR on an exception return using the MSP. When the processor is in
lockup state, it does not execute any instructions. The processor remains in lockup state until one of the following
occurs:
• it is reset
• a debugger halts it
• an NMI occurs and the current lockup is in the HardFault handler
Note: If lockup state occurs in the NMI handler, a subsequent NMI does not cause the processor to leave lockup
state.
The SLEEPDEEP bit of the SCR selects which sleep mode is used, see Table 2.35. For more information about the
behavior of the sleep modes, see corresponding data sheet.
The next section describes the mechanisms for entering sleep mode and the conditions for waking up from sleep
mode.
The system can generate spurious wakeup events; for example, a debug operation wakes up the processor.
Therefore software must be able to put the processor back into sleep mode after such an event. A program might
have an idle loop to put the processor back in to sleep mode.
Wait for interrupt The Wait For Interrupt instruction, WFI, causes immediate entry to sleep mode. When the
processor executes a WFI instruction, it stops executing instructions and enters sleep mode.
See “WFI” for more information.
Sleep-on-exit If the SLEEPONEXIT bit of the SCR is set to 1, when the processor completes the execution of
an exception handler and returns to Thread Mode, it immediately enters sleep mode. Use this
mechanism in applications that only require the processor to run when an interrupt occurs.
Some embedded systems might have to execute system restore tasks after the processor wakes up and before it
executes an interrupt handler. To achieve this, set the PRIMASK bit to 1. If an interrupt arrives that is enabled and
has a higher priority than current exception priority, the processor wakes up but does not execute the interrupt
handler until the processor sets PRIMASK to zero. For more information about PRIMASK, see “Exception Mask
Register (PRIMASK).”
Note: WFE and SEV instructions are not supported and must not be used!
Note: For more information on the instructions and operands, see the instruction descriptions.
LDRSB Rt, [Rn, <Rm|#imm>] Load Register with signed byte - 2.3.4
LDRSH Rt, [Rn, <Rm|#imm>] Load Register with signed halfword - 2.3.4
The CMSIS provides the following intrinsic functions to generate instructions that ISO/IEC C code cannot directly
access:
The CMSIS also provides a number of functions for accessing the special registers using MRS and MSR instructions:
2.3.3.1 Operands
®
An instruction operand can be an ARM register, a constant, or another instruction-specific parameter. Instructions
act on the operands and often store the result in a destination register. When there is a destination register in the
instruction, it is usually specified before the other operands.
Note: When the PC is updated with a BX, BLX, or POP instruction, bit[0] of any address must be 1 for correct execution.
This is because this bit indicates the destination instruction set, and the Cortex™-M0 processor only supports
Thumb® instructions. When a BL or BLX instruction writes the value of bit[0] into the LR, it is automatically assigned the
value 1.
The permitted shift lengths depend on the shift type and the instruction; see the individual instruction description. If
the shift length is 0, no shift occurs. Register shift operations update the carry flag except when the specified shift
length is 0. The following sub-sections describe the various shift operations and how they affect the carry flag. In
these descriptions, Rm is the register containing the value to be shifted, and n is the shift length.
ASR
Arithmetic shift right by n bits moves the left-hand 32-n bits of the register Rm to the right by n places, into the right-hand
32-n bits of the result, and it copies the original bit[31] of the register into the left-hand n bits of the result.
Carry
Flag
31 5 4 3 2 1 0
...
The ASR operation can be used to divide the signed value in the register Rm by 2 , with the result being rounded
n
towards negative-infinity.
When the instruction is ASRS, the carry flag is updated to the last bit shifted out, bit[n-1], of the register Rm.
Note: If n is 32 or more, then all the bits in the result are set to the value of bit[31] of Rm.
Note: If n is 32 or more and the carry flag is updated, it is updated to the value of bit[31] of Rm.
LSR
Logical shift right by n bits moves the left-hand 32-n bits of the register Rm to the right by n places, into the right-hand 32-
n bits of the result, and it sets the left-hand n bits of the result to 0.
0 0 0 Carry
Flag
31 5 4 3 2 1 0
...
The LSR operation can be used to divide the value in the register Rm by 2 , if the value is regarded as an unsigned
n
integer.
When the instruction is LSRS, the carry flag is updated to the last bit shifted out, bit[n-1], of the register Rm.
Note: If n is 32 or more, then all the bits in the result are cleared to 0.
LSL
Logical shift left by n bits moves the right-hand 32-n bits of the register Rm, to the left by n places, into the left-hand 32-n
bits of the result, and it sets the right-hand n bits of the result to 0.
0 0 0
31 5 4 3 2 1 0
Carry
Flag ...
The LSL operation can be used to multiply the value in the register Rm by 2 , if the value is regarded as an unsigned
n
integer or a two’s complement signed integer. Overflow can occur without warning.
When the instruction is LSLS the carry flag is updated to the last bit shifted out, bit[32-n], of the register Rm. These
instructions do not affect the carry flag when used with LSL #0.
Note: If n is 32 or more, then all the bits in the result are cleared to 0.
ROR
Rotate right by n bits moves the left-hand 32-n bits of the register Rm to the right by n places, into the right-hand 32-n
bits of the result, and it moves the right-hand n bits of the register into the left-hand n bits of the result.
Carry
Flag
31 5 4 3 2 1 0
...
When the instruction is RORS, the carry flag is updated to the last bit rotation, bit[n-1], of the register Rm.
Note: If n is 32, then the value of the result is same as the value in Rm, and if the carry flag is updated, it is updated to
bit[31] of Rm.
Note: ROR with shift length n, greater than 32 is the same as ROR with shift length n-32.
There is no support for unaligned accesses on the Cortex™-M0 processor. Any attempt to perform an unaligned
memory access operation results in a HardFault exception.
Note: For most instructions, the value of the PC is the address of the current instruction plus 4 bytes.
Note: The user’s assembler might permit other syntaxes for PC-relative expressions, such as a label plus or minus a
number, or an expression of the form [PC, #imm].
A conditional branch instruction can be executed, based on the condition flags set in another instruction, either
• immediately after the instruction that updated the flags
• after any number of intervening instructions that have not updated the flags.
N Set to 1 when the result of the operation was negative, cleared to 0 otherwise.
Z Set to 1 when the result of the operation was zero, cleared to 0 otherwise.
For more information about the APSR see section “Program Status Register (PSR).”
A carry occurs
• if the result of an addition is greater than or equal to 2
32
Overflow occurs when the sign of the result, in bit[31], does not match the sign of the result had the operation been
performed at infinite precision; for example,
• if adding two negative values results in a positive value
• if adding two positive values results in a negative value
• if subtracting a positive value from a negative value generates a positive value
• if subtracting a negative value from a positive value generates a negative value
The Compare operations are identical to subtracting, for CMP, or adding, for CMN, except that the result is discarded.
See the instruction descriptions for more information.
MI N=1 Negative
VS V=1 Overflow
VC V=0 No overflow
AL Can have any value Always. This is the default when no suffix is specified.
LDR{type} Load Register using immediate offset LDR and STR, Immediate Offset
LDR{type} Load Register using register offset LDR and STR, Register Offset
STR{type} Store Register using immediate offset LDR and STR, Immediate Offset
STR{type} Store Register using register offset LDR and STR, Register Offset
2.3.4.1 ADR
Generates a PC-relative address.
Syntax
where:
Operation
ADR generates an address by adding an immediate value to the PC and writes the result to the destination register.
ADR facilitates the generation of position-independent code because the address is PC-relative.
If ADR is used to generate a target address for a BX or BLX instruction, the user must ensure that bit[0] of the address
generated is set to 1 for correct execution.
Restrictions
In this instruction Rd must specify R0-R7. The data-value addressed must be word aligned and within 1020 bytes of
the current PC.
Condition flags
This instruction does not change the flags.
Examples
Syntax
where:
Operation
LDR, LDRB and LDRH instructions load the register specified by Rt with either a word, byte, or halfword data value from
memory. Sizes less than word are zero extended to 32-bits before being written to the register specified by Rt.
STR, STRB and STRH instructions store the word, least-significant byte or lower halfword contained in the single register
specified by Rt in to memory. The memory address to load from or store to is the sum of the value in the register
specified by either Rn or SP and the immediate value imm.
Restrictions
In these instructions:
• Rt and Rn must only specify R0-R7.
• The computed address must be divisible by the number of bytes in the transaction; see section “Address
Alignment.”
Condition flags
These instructions do not change the flags.
Examples
Syntax
where:
Operation
LDR, LDRB, LDRH, LDRSB and LDRSH load the register specified by Rt with either a word, zero extended byte, zero extended
halfword, sign extended byte or sign extended halfword value from memory.
STR, STRB and STRH store the word, least-significant byte or lower halfword contained in the single register specified by
Rt into memory.
The memory address to load from or store to is the sum of the values in the registers specified by Rn and Rm.
Restrictions
In these instructions:
• Rt, Rn and Rm must only specify R0-R7.
• the computed memory address must be divisible by the number of bytes in the load or store; see section
“Address Alignment.”
Condition flags
These instructions do not change the flags.
Examples
STR R0, [R5, R1] ; Store value of R0 into an address equal to sum of R5 and R1
LDRSH R1, [R2, R3] ; Load a halfword from the memory address specified by (R2 + R3)
; sign extend to 32-bits and write to R1.
Syntax
where:
Operation
Loads the register specified by Rt from the word in memory specified by label.
Restrictions
In these instructions, label must be within 1020 bytes of the current PC and word aligned.
Condition flags
These instructions do not change the flags.
Examples
LDR R0, LookUpTable ; Load R0 with a word of data from an address labeled as LookUpTable.
LDR R3, [PC, #100] ; Load R3 with memory word at (PC + 100).
Syntax
where
! writeback suffix.
reglist is a list of one or more registers to be loaded or stored, enclosed in braces. It can contain register ranges.
It must be comma separated if it contains more than one register or register range; see example below.
LDMIA and LDMFD are synonyms for LDM. LDMIA refers to the base register being Incremented After each access. LDMFD
refers to its use for popping data from Full Descending stacks.
STMIA and STMEA are synonyms for STM. STMIA refers to the base register being Incremented After each access. STMEA
refers to its use for pushing data onto Empty Ascending stacks.
Operation
LDM instructions load the registers in reglist with word values from memory addresses based on Rn.
STM instructions store the word values in the registers in reglist to memory addresses based on Rn.
The memory addresses used for the accesses are at 4-byte intervals ranging from the value in the register specified
by Rn to the value in the register specified by Rn + 4 * (n-1), where n is the number of registers in reglist. The
accesses happens in order of increasing register numbers, with the lowest numbered register using the lowest
memory address and the highest number register using the highest memory address. If the writeback suffix is
specified, the value in the register specified by Rn + 4 *n is written back to the register specified by Rn.
Restrictions
In these instructions,
• reglist and Rn are limited to R0-R7.
• the writeback suffix must always be used unless the instruction is an LDM where reglist also contains Rn, in
which case the writeback suffix must not be used.
• the value in the register specified by Rn must be word aligned. See section “” for more information.
• for STM, if Rn appears in reglist, then it must be the first register in the list.
Condition flags
These instructions do not change the flags.
Correct examples
STMIA R1!,{R2-R4,R6}
Incorrect examples
Syntax
PUSH reglist
POP reglist
where:
reglist is a non-empty list of registers, enclosed in braces. It can contain register ranges. It must be comma
separated if it contains more than one register or register range.
Operation
PUSH stores registers on the stack, with the lowest numbered register using the lowest memory address and the
highest numbered register using the highest memory address.
POP loads registers from the stack, with the lowest numbered register using the lowest memory address and the
highest numbered register using the highest memory address.
PUSH uses the value in the SP register minus four as the highest memory address; POP uses the value in the SP
register as the lowest memory address, implementing a full-descending stack. On completion, PUSH updates the SP
register to point to the location of the lowest store value; POP updates the SP register to point to the location above the
highest location loaded.
If a POP instruction includes PC in its reglist, a branch to this location is performed when the POP instruction has
completed. Bit[0] of the value read for the PC is used to update the APSR T-bit. This bit must be 1 to ensure correct
operation.
Restrictions
In these instructions:
• reglist must use only R0-R7.
• The exception is LR for a PUSH and PC for a POP.
Condition flags
These instructions do not change the flags.
Examples
PUSH {R0,R4-R7} ; Push R0, R4, R5, R6 and R7 onto the stack
PUSH {R2,LR} ; Push R2 and the link-register onto the stack
POP {R0,R6,PC} ; Pop R0, R6 and PC from the stack, then branch to the new PC.
ADCS Add with Carry ADC, ADD, RSB, SBC and SUB
REV16 Reverse byte order in each halfword REV, REV16 and REVSH
REVSH Reverse byte order in bottom halfword and sign extend REV, REV16 and REVSH
SBCS Subtract with Carry ADC, ADD, RSB, SBC and SUB
Syntax
where:
When the optional Rd register specifier is omitted, it is assumed to take the same value as Rn; for example, ADDS R1, R2
is identical to ADDS R1, R1, R2.
Operation
The ADCS instruction adds the value in Rn to the value in Rm, adding a further one if the carry flag is set, places the
result in the register specified by Rd, and updates the N, Z, C, and V flags.
The ADD instruction adds the value in Rn to the value in Rm or an immediate value specified by imm and places the result
in the register specified by Rd.
The ADDS instruction performs the same operation as ADD and also updates the N, Z, C and V flags.
The RSBS instruction subtracts the value in Rn from zero, producing the arithmetic negative of the value, and places the
result in the register specified by Rd and updates the N, Z, C and V flags.
The SBCS instruction subtracts the value of Rm from the value in Rn, deducts a further one if the carry flag is set. It
places the result in the register specified by Rd and updates the N, Z, C and V flags.
The SUB instruction subtracts the value in Rm or the immediate specified by imm. It places the result in the register
specified by Rd.
The SUBS instruction performs the same operation as SUB and also updates the N, Z, C and V flags.
Use ADC and SBC to synthesize multiword arithmetic, see example on next page.
Restrictions
The following table lists the legal combinations of register specifiers and immediate values that can be used with each
instruction.
Table 2.18 ADC, ADD, RSB, SBC and SUB Operand Restrictions
ADCS R0-R7 R0-R7 R0-R7 - Rd and Rn must specify the same register.
ADD R0-R15 R0-R15 R0-PC - Rd and Rn must specify the same register.
Rn and Rm must not both specify PC.
SBCS R0-R7 R0-R7 R0-R7 - Rd and Rn must specify the same register.
Examples
The following two instructions add one 64-bit integer contained in R0 and R1 to another 64-bit integer contained in R2
and R3 and place the result in R0 and R1:
The following three instructions subtract one 96-bit integer contained in R1, R2, and R3 from another contained in R4,
R5, and R6 and place the result in R4, R5, and R6.
The following instruction shows the RSBS instruction used to perform a 1's complement of a single register.
Syntax
where:
Rn is the register holding the first operand and is the same as the destination register
Rm second register
Operation
The AND, EOR, and ORR instructions perform bitwise AND, exclusive OR, and inclusive OR operations on the values in Rn
and Rm.
The BIC instruction performs an AND operation on the bits in Rn with the logical negation of the corresponding bits in
the value of Rm.
The condition code flags are updated on the result of the operation, see condition flags section “Conditional
Execution.”
Restrictions
In these instructions, Rd, Rn and Rm must only specify R0-R7.
Condition flags
These instructions
• update the N and Z flags according to the result
• do not affect the C or V flag
Examples
Syntax
where:
Rd is the destination register. If Rd is omitted, it is assumed to take the same value as Rm.
Rs is the register holding the shift length to apply to the value in Rm.
imm is the shift length. The range of shift length depends on the instruction:
• ASR shift length from 1 to 32
• LSL shift length from 0 to 31
• LSR shift length from 1 to 32.
Operation
ASR, LSL, LSR, and ROR perform an arithmetic-shift-left, logical-shift-left, logical-shift-right or a right-rotation of the bits in
the register Rm by the number of places specified by the immediate imm or the value in the least-significant byte of the
register specified by Rs.
For details on what result is generated by the different instructions, see section “Shift Operations.”
Restrictions
In these instructions, Rd, Rm, and Rs must only specify R0-R7. For non-immediate instructions, Rd and Rm must specify
the same register.
Condition flags
These instructions update the N and Z flags according to the result.
The C flag is updated to the last bit shifted out, except when the shift length is 0; see section “Shift Operations.” The V
flag is left unmodified.
Examples
Syntax
CMN Rn, Rm
CMP Rn, #imm
CMP Rn, Rm
where:
Operation
These instructions compare the value in a register with either the value in another register or an immediate value.
They update the condition flags on the result, but do not write the result to a register.
The CMP instruction subtracts either the value in the register specified by Rm, or the immediate imm from the value in Rn
and updates the flags. This is the same as a SUBS instruction, except that the result is discarded.
The CMN instruction adds the value of Rm to the value in Rn and updates the flags. This is the same as an ADDS
instruction, except that the result is discarded.
Restrictions
For the:
• CMN instruction Rn, and Rm must only specify R0-R7.
• CMP instruction:
o Rn and Rm can specify R0-R14
o immediate must be in the range 0-255.
Condition flags
These instructions update the N, Z, C and V flags according to the result.
Examples
CMP R2, R9
CMN R0, R2
Syntax
MOV{S} Rd, Rm
MOVS Rd, #imm
MVNS Rd, Rm
where:
S is an optional suffix. If S is specified, the condition code flags are updated on the result of the operation; see
section “Conditional Execution.”
Rm is a register.
Operation
The MOV instruction copies the value of Rm into Rd.
The MOVS instruction performs the same operation as the MOV instruction, but also updates the N and Z flags.
The MVNS instruction takes the value of Rm, performs a bitwise logical negate operation on the value, and places the
result into Rd.
Restrictions
In these instructions, Rd and Rm must only specify R0-R7.
Note: Though it is possible to use MOV as a branch instruction, ARM strongly recommends the use of a BX or BLX
instruction to branch for software portability.
Condition flags
If S is specified, these instructions
• update the N and Z flags according to the result
• do not affect the C or V flags.
Example
MOVS R0, #0x000B ; Write value of 0x000B to R0, flags get updated
MOVS R1, #0x0 ; Write value of zero to R1, flags are updated
MOV R10, R12 ; Write value in R12 to R10, flags are not updated
MOVS R3, #23 ; Write value of 23 to R3
MOV R8, SP ; Write value of stack pointer to R8
MVNS R2, R0 ; Write inverse of R0 to the R2 and update flags
2.3.5.6 MULS
Multiply using 32-bit operands, and producing a 32-bit result.
Syntax
where:
Operation
The MUL instruction multiplies the values in the registers specified by Rn and Rm, and places the least significant 32 bits
of the result in Rd. The condition code flags are updated on the result of the operation; see section “Conditional
Execution.”
The result of this instruction does not depend on whether the operands are signed or unsigned.
Restrictions
In this instruction,
Rd, Rn, and Rm must only specify R0-R7
Rd must be the same as Rm.
Condition flags
This instruction
• updates the N and Z flags according to the result
• does not affect the C or V flags.
Examples
MULS R0, R2, R0 ; Multiply with flag update, R0 = R0 x R2
Syntax
REV Rd, Rn
REV16 Rd, Rn
REVSH Rd, Rn
where:
Operation
Use these instructions to change endianness of data:
REV converts 32-bit big-endian data into little-endian data or 32-bit little-endian data into big-endian data.
REV16 converts two packed 16-bit big-endian data into little-endian data or two packed 16-bit little-endian data
into big-endian data.
REVSH converts 16-bit signed big-endian data into 32-bit signed little-endian data or 16-bit signed little-endian
data into 32-bit signed big-endian data.
Restrictions
In these instructions, Rd and Rn must only specify R0-R7.
Condition flags
These instructions do not change the flags.
Examples
Syntax
SXTB Rd, Rm
SXTH Rd, Rm
UXTB Rd, Rm
UXTH Rd, Rm
where:
Operation
These instructions extract bits from the resulting value:
• SXTB extracts bits[7:0] and sign extends to 32 bits
• UXTB extracts bits[7:0] and zero extends to 32 bits
• SXTH extracts bits[15:0] and sign extends to 32 bits
• UXTH extracts bits[15:0] and zero extends to 32 bits.
Restrictions
In these instructions, Rd and Rm must only specify R0-R7.
Condition flags
These instructions do not affect the flags.
Examples
2.3.5.9 TST
Test bits.
Syntax
TST Rn, Rm
where:
Operation
This instruction tests the value in a register against another register. It updates the condition flags based on the result,
but does not write the result to a register.
The TST instruction performs a bitwise AND operation on the value in Rn and the value in Rm. This is the same as the
ANDS instruction, except that it discards the result.
To test whether a bit of Rn is 0 or 1, use the TST instruction with a register that has that bit set to 1 and all other bits
cleared to 0.
Restrictions
In these instructions, Rn and Rm must only specify R0-R7.
Condition flags
This instruction
• updates the N and Z flags according to the result
• does not affect the C or V flags.
Examples
TST R0, R1 ; Perform bitwise AND of R0 value and R1 value
; condition code flags are updated but result is discarded
Syntax
B{cond} label
BL label
BX Rm
BLX Rm
where:
Operation
All these instructions cause a branch to the address indicated by label or contained in the register specified by Rm. In
addition,
• The BL and BLX instructions write the address of the next instruction to LR, the link register R14.
• The BX and BLX instructions result in a HardFault exception if bit[0] of Rm is 0.
BL and BLX instructions also set bit[0] of the LR to 1. This ensures that the value is suitable for use by a subsequent
POP {PC} or BX instruction to perform a successful return branch.
The following table shows the ranges for the various branch instructions.
B label -2 KB to +2 KB
Restrictions
In these instructions:
• Do not use SP or PC in the BX or BLX instruction.
• For BX and BLX, bit[0] of Rm must be 1 for correct execution. Bit[0] is used to update the EPSR T-bit and is
discarded from the target address.
Condition flags
These instructions do not change the flags.
Examples
2.3.7.1 BKPT
Breakpoint.
Syntax
BKPT #imm
where:
Operation
The BKPT instruction causes the processor to enter Debug state. Debug tools can use this to investigate system state
when the instruction at a particular address is reached.
imm is ignored by the processor. If required, a debugger can use it to store additional information about the breakpoint.
The processor might also produce a HardFault or go in to lockup if a debugger is not attached when a BKPT instruction
is executed. See section “Lockup” for more information.
Restrictions
There are no restrictions.
Condition flags
This instruction does not change the flags.
Examples
2.3.7.2 CPS
Change Processor State.
Syntax
CPSID i
CPSIE i
Operation
CPS changes the PRIMASK special register values. CPSID causes interrupts to be disabled by setting PRIMASK. CPSIE
cause interrupts to be enabled by clearing PRIMASK. See section “Exception Mask Register (PRIMASK)” for more
information about these registers.
Restrictions
There are no restrictions.
Condition flags
This instruction does not change the condition flags.
Examples
2.3.7.3 DMB
Data Memory Barrier.
Syntax
DMB
Operation
DMB acts as a data memory barrier. It ensures that all explicit memory accesses that appear in program order before
the DMB instruction are observed before any explicit memory accesses that appear in program order after the DMB
instruction. DMB does not affect the ordering of instructions that do not access memory.
Restrictions
There are no restrictions.
Condition flags
This instruction does not change the flags.
Examples
2.3.7.4 DSB
Data Synchronization Barrier.
Syntax
DSB
Operation
DSB acts as a special data synchronization memory barrier. Instructions that come after the DSB, in program order, do
not execute until the DSB instruction completes. The DSB instruction completes when all explicit memory accesses
before it complete.
Restrictions
There are no restrictions.
Condition flags
This instruction does not change the flags.
Examples
2.3.7.5 ISB
Instruction Synchronization Barrier.
Syntax
ISB
Operation
ISB acts as an instruction synchronization barrier. It flushes the pipeline of the processor, so that all instructions
following the ISB are fetched from cache or memory again, after the ISB instruction has been completed.
Restrictions
There are no restrictions.
Condition flags
This instruction does not change the flags.
Examples
2.3.7.6 MRS
Move the contents of a special register to a general-purpose register.
Syntax
where:
spec_reg is one of the special-purpose registers: APSR, IPSR, EPSR, IEPSR, IAPSR, EAPSR, PSR, MSP, PSP, PRIMASK or
CONTROL.
Operation
MRS stores the contents of a special-purpose register to a general-purpose register. The MRS instruction can be
combined with the MSR instruction to produce read-modify-write sequences, which are suitable for modifying a specific
flag in the PSR.
Restrictions
In this instruction, Rd must not be SP or PC.
Condition flags
This instruction does not change the flags.
Examples
2.3.7.7 MSR
Move the contents of a general-purpose register into the specified special register.
Syntax
MSR spec_reg, Rn
where:
spec_reg is the special-purpose destination register: APSR, IPSR, EPSR, IEPSR, IAPSR, EAPSR, PSR, MSP, PSP, PRIMASK or
CONTROL.
Operation
MSR updates one of the special registers with the value from the register specified by Rn.
See section “MRS.”
Restrictions
In this instruction, Rn must not be SP and must not be PC.
Condition flags
This instruction updates the flags explicitly based on the value in Rn.
Examples
2.3.7.8 NOP
No Operation.
Syntax
NOP
Operation
NOP performs no operation and is not guaranteed to be time consuming. The processor might remove it from the
pipeline before it reaches the execution stage.
Use NOP for padding, for example to place the subsequent instructions on a 64-bit boundary.
Restrictions
There are no restrictions.
Condition flags
This instruction does not change the flags.
Examples
NOP ; No operation
2.3.7.9 SVC
Supervisor Call.
Syntax
SVC #imm
where:
Operation
The SVC instruction causes the SVC exception.
imm is ignored by the processor. If required, it can be retrieved by the exception handler to determine what service is
being requested.
Restrictions
There are no restrictions.
Condition flags
This instruction does not change the flags.
Examples
SVC #0x32 ; Supervisor Call (SVC handler can extract the immediate value
; by locating it via the stacked PC)
2.3.7.10 WFI
Wait for Interrupt.
Syntax
WFI
Operation
WFI suspends execution until one of the following events occurs:
• an exception
• an interrupt becomes pending which would preempt if PRIMASK was clear
• a Debug Entry request, regardless of whether debug is enabled.
Note: WFI is intended for power saving only. When writing software assume that WFI might behave as a NOP operation.
Restrictions
There are no restrictions.
Condition flags
This instruction does not change the flags.
Examples
RO Read-only.
WO Write-only.
To access the NVIC registers when using CMSIS, use the following functions.
uint32_t NVIC_GetPendingIRQ(IRQn_Type IRQn) Reads the pending status of interrupt or exception. This
function returns non-zero value if the pending status is
set to 1.
void NVIC_SetPriority(IRQn_Type IRQn, uint32_t Sets the priority of an interrupt or exception with
priority) configurable priority level to 1.
31 0
SETENA bits
If a pending interrupt is enabled, the NVIC activates the interrupt based on its priority. If an interrupt is not enabled,
asserting its interrupt signal changes the interrupt state to pending, but the NVIC never activates the interrupt,
regardless of its priority.
31 0
CLRENA bits
31 0
SETPEND bits
31 0
CLRPEND bits
Note: Writing 1 to an ICPR bit does not affect the active state of the corresponding interrupt.
31 2423 1615 8 7 0
IPR2 ( PRI _11) ( PRI _10) ( PRI _9) PRI _8
[31:24] Priority, byte offset 3 Each priority field holds a priority value, 0-192. The lower
the value, the greater the priority of the corresponding
interrupt. The processor implements only bits[7:6] of
[23:16] Priority, byte offset 2 each field; bits [5:0] read as zero and ignore writes. This
means writing 255 to a priority register saves value 192
[15:8] Priority, byte offset 1 to the register.
See “Accessing the Cortex™-M0 NVIC registers using CMSIS” for more information about the access to the interrupt
priority array, which provides the software view of the interrupt priorities.
Find the IPR number and byte offset for interrupt M as follows:
• the corresponding IPR number, N, is given by N = N DIV 4
• the byte offset of the required Priority field in this register is M MOD 4, where
o byte offset 0 refers to register bits[7:0]
o byte offset 1 refers to register bits[15:8]
o byte offset 2 refers to register bits[23:16]
o byte offset 3 refers to register bits[31:24].
A level-sensitive interrupt is held asserted until the peripheral deasserts the interrupt signal. Typically this happens
because the ISR accesses the peripheral, causing it to clear the interrupt request. A pulse interrupt is an interrupt
signal sampled synchronously on the rising edge of the processor clock. To ensure the NVIC detects the interrupt, the
peripheral must assert the interrupt signal for at least one clock cycle, during which the NVIC detects the pulse and
latches the interrupt.
When the processor enters the ISR, it automatically removes the pending state from the interrupt. For a level-
sensitive interrupt, if the signal is not deasserted before the processor returns from the ISR, the interrupt becomes
pending again, and the processor must execute its ISR again. This means that the peripheral can hold the interrupt
signal asserted until it no longer needs servicing.
See corresponding data sheet for details of which interrupts are level-sensitive and which are pulsed.
An interrupt can enter the pending state even if it is disabled. Disabling an interrupt only prevents the processor from
taking that interrupt.
In addition, the CMSIS provides a number of functions for NVIC control, including the functions shown in Table 2.30.
void NVIC_SetPriority (IRQn_t IRQn, uint32_t priority) Set priority for IRQn
The input parameter IRQn is the IRQ number; see Table 2.10 for more information. For more information about these
functions, see the CMSIS documentation.
The CPUID register contains the processor part number, version, and implementation information. See the register
summary in Table 2.31 for its attributes.
[23:20] Variant Variant number, the r value in the rnpn product revision identifier:
0x0 = Revision 0
[19:16] Constant Constant that defines the architecture of the processor; reads as
0xC = ARMv6-M architecture
[3:0] Revision Revision number, the p value in the rnpn product revision identifier:
0x0 = Patch 0
See the register summary in Table 2.31 for the ICSR attributes.
31 30 29 28 27 26 25 24 23 22 21 18 17 12 11 6 5 0
ISRPENDING
Reserved
PENDSTCLR
PENDSTSET
PENDSVCLR
PENDSVSET
Reserved
NMIPENDSET
[30:29] - - Reserved.
[24:23] - - Reserved.
[21:18] - - Reserved.
[17:12] VECTPENDING RO Indicates the exception number of the highest priority pending
enabled exception:
0 = no pending exceptions
Nonzero = the exception number of the highest priority pending
enabled exception.
[11:6] - - Reserved.
Note: Subtract 16 from this value to obtain the CMSIS IRQ number
that identifies the corresponding bit in the Interrupt Clear-Enable, Set-
Enable, Clear-Pending, Set-pending, and Priority Register, see Table
2.5
31 161514 3 2 1 0
On read: Reserved
Reserved
On write: VECTKEY
ENDIANESS SYSRESETREQ
VECTCLRACTIVE, reserved for debug use
Reserved
Note: To write to this register, 0x05FA must be written to the VECTKEY field, otherwise the processor ignores the
write.
[14:3] - - Reserved
[1] VECTCLRACTIVE WO Reserved for debug use. This bit reads as 0. When writing to the
register, the user must write 0 to this bit; otherwise behavior is
Unpredictable.
[0] - - Reserved.
31 54 3 2 1 0
Reserved
SEVONPEND
Reserved
SLEEPDEEP
SLEEPONEXIT
Reserved
[31:5] - Reserved.
[3] - Reserved.
[2] SLEEPDEEP Controls whether the processor uses sleep or deep sleep as its low power
mode:
0 = sleep
1 = deep sleep.
[1] SLEEPONEXIT Indicates sleep-on-exit when returning from Handler Mode to Thread Mode:
0 = do not sleep when returning to Thread Mode.
1 = enter sleep, or deep sleep, on return from an ISR to Thread Mode.
Setting this bit to 1 enables an interrupt driven application to avoid returning
to an empty main application.
[0] - Reserved.
31 10 9 8 4 3 2 0
Reserved Reserved
STKALIGN
UNALIGN_TRP
Reserved
[31:10] - Reserved.
[9] STKALIGN Always reads as one, indicates 8-byte stack alignment on exception entry.
On exception entry, the processor uses bit[9] of the stacked PSR to indicate
the stack alignment. On return from the exception, it uses this stacked bit to
restore the correct stack alignment.
[8:4] - Reserved.
[3] UNALIGN_TRP Always reads as one, indicates that all unaligned accesses generate a
HardFault.
[2:0] - Reserved.
To access to the system exception priority level using CMSIS, use the following CMSIS functions:
• uint32_t NVIC_GetPriority(IRQn_Type IRQn)
• void NVIC_SetPriority(IRQn_Type IRQn, uint32_t priority)
The input parameter IRQn is the IRQ number; see Table 2.10 for more information.
The system fault handlers and the priority field and register for each handler are given in Table 2.37.
SysTick PRI_15
Each PRI_N field is 8 bits wide, but the processor implements only bits[7:6] of each field, and bits[5:0] read as zero
and ignore writes.
31 2423 0
PRI_11 Reserved
[23:0] - Reserved
31 2423 1615 0
[15:0] - Reserved
Writing to the SYST_CVR clears the register and the COUNTFLAG status bit to 0. The write does not trigger the
SysTick exception logic. Reading the register returns its value at the time it is accessed.
Note: When the processor is halted for debugging the counter does not decrement.
31 171615 3 2 1 0
Reserved Reserved 0 0 0
COUNTFLAG CLKSOURCE
TICKINT
ENABLE
[31:17] - Reserved.
[16] COUNTFLAG Returns 1 if timer counted to 0 since the last read of this register.
[15:3] - Reserved.
31 24 23 0
Reserved RELOAD
[31:24] - Reserved.
[23:0] RELOAD Value to load into the SYST_CVR when the counter is enabled and when it
reaches 0; see “Calculating the RELOAD value” below.
31 24 23 0
Reserved CURRENT
[31:24] - Reserved.
[23:0] CURRENT Reads return the current value of the SysTick counter.
A write of any value clears the field to 0, and also clears the
SYST_CSR.COUNTFLAG bit to 0.
313029 2423 0
Reserved TENMS
SKEW
NOREF
[31] NOREF Reads as one. Indicates that no separate reference clock is provided.
[29:24] - Reserved.
[23:0] TENMS The value read depends on the chosen clock divider value clkDiv (see corresponding
data sheet.
clkDiv == 0: 0x30D3F
clkDiv == 1: 0x1869F
clkDiv == 2: 0x0C34F
clkDiv == 3: 0x061A7
If the SysTick counter reload and current value are undefined at reset, the correct initialization sequence for the
SysTick counter is
1. Program reload value.
2. Clear current value.
3. Program Control and Status register.
2.5 Glossary
This glossary describes some of the terms used in technical documents from ARM, Ltd.
Aligned A data item stored at an address that is divisible by the number of bytes that defines the
data size is said to be aligned. Aligned words and halfwords have addresses that are
divisible by four and two respectively. The terms word-aligned and halfword-aligned
therefore stipulate addresses that are divisible by four and two respectively.
Base register In instruction descriptions, a register specified by a load or store instruction that is used to
hold the base value for the instruction’s address calculation. Depending on the instruction
and its addressing mode, an offset can be added to or subtracted from the base register
value to form the address that is sent to memory.
Byte-invariant In a byte-invariant system, the address of each byte of memory remains unchanged when
switching between little-endian and big-endian operation. When a data item larger than a
byte is loaded from or stored to memory, the bytes making up that data item are arranged
into the correct order depending on the endianness of the memory access.
An ARM® byte-invariant implementation also supports unaligned halfword and word
memory accesses. It expects multi-word accesses to be word-aligned.
Cache A block of on-chip or off-chip fast access memory locations, situated between the processor
and main memory, used for storing and retrieving copies of often used instructions, data, or
instructions and data. This is done to greatly increase the average speed of memory
accesses and so improve processor performance.
Condition field A four-bit field in an instruction that specifies a condition under which the instruction can
execute.
Conditional execution If the condition code flags indicate that the corresponding condition is true when the
instruction starts executing, it executes normally. Otherwise, the instruction does nothing.
Context The environment that each process operates in for a multitasking operating system. In
ARM® processors, this is limited to mean the physical address range that it can access in
memory and the associated memory access permissions.
Debugger A debugging system that includes a program used to detect, locate, and correct software
faults, together with custom hardware that supports software debugging.
Direct Memory Access (DMA)
An operation that accesses main memory directly, without the processor performing any
accesses to the data concerned.
Endianness Byte ordering. The scheme that determines the order that successive bytes of a data word
are stored in memory. An aspect of the system’s memory mapping.
Implementation-defined
The behavior is not architecturally defined but is defined and documented by individual
implementations.
Implementation-specific
The behavior is not architecturally defined and does not have to be documented by
individual implementations. Used when there are a number of implementation options
available and the option chosen does not affect software compatibility.
Index register In some load and store instruction descriptions, the value of this register is used as an
offset to be added to or subtracted from the base register value to form the address that is
sent to memory. Some addressing modes optionally enable the index register value to be
shifted prior to the addition or subtraction. See also Base register.
Interrupt handler A program that control of the processor is passed to when an interrupt occurs.
Interrupt vector One of a number of fixed addresses in low memory or in high memory if high vectors are
configured that contains the first instruction of the corresponding interrupt handler.
Little-endian (LE) Byte ordering scheme in which bytes of increasing significance in a data word are stored at
increasing addresses in memory.
• a byte at a halfword-aligned address is the least significant byte within the halfword at
that address.
See also Big-endian memory.
Read Reads are defined as memory operations that have the semantics of a load. Reads include
the Thumb® instructions LDM, LDR, LDRSH, LDRH, LDRSB, LDRB, and POP.
Region A partition of memory space.
Reserved A field in a control register or instruction format is reserved if the field is to be defined by the
implementation or produces Unpredictable results if the contents of the field are not zero.
These fields are reserved for use in future extensions of the architecture or are
implementation-specific. All reserved bits not used by the implementation must be written
as 0 and read as 0.
Thumb® instruction One or two halfwords that specify an operation for a processor to perform. Thumb®
instructions must be halfword-aligned.
Unaligned A data item stored at an address that is not divisible by the number of bytes that defines the
data size is said to be unaligned. For example, a word stored at an address that is not
divisible by four.
Undefined Indicates an instruction that generates an Undefined instruction exception.
Unpredictable Cannot rely on the behavior. Unpredictable behavior must not represent security holes.
Unpredictable behavior must not halt or hang the processor or any parts of the system.
Warm reset Also known as a core reset. Initializes the majority of the processor excluding the debug
controller and debug logic. This type of reset is useful when using the debugging features of
a processor.
WA See Write-allocate.
WB See Write-back.
Word A 32-bit data item.
Write Writes are defined as operations that have the semantics of a store. Writes include the
Thumb® instructions STM, STR, STRH, STRB, and PUSH.
Write-allocate (WA) In a write-allocate cache, a cache miss on storing data causes a cache line to be allocated
into the cache.
Write-back (WB) In a write-back cache, data is only written to main memory when it is forced out of the cache
on line replacement following a cache miss. Otherwise, writes by the processor only update
the cache. This is also known as copyback.
Write buffer A block of high-speed memory, arranged as a FIFO buffer, between the data cache and
main memory, whose purpose is to optimize stores to main memory.
Write-through (WT) In a write-through cache, data is written to main memory at the same time as the cache is
updated.
WT See Write-through.
DISCLAIMER Integrated Device Technology, Inc. (IDT) reserves the right to modify the products and/or specifications described herein at any time, without notice, at IDT's sole discretion. Performance
specifications and operating parameters of the described products are determined in an independent state and are not guaranteed to perform the same way when installed in customer products. The
information contained herein is provided without representation or warranty of any kind, whether express or implied, including, but not limited to, the suitability of IDT's products for any particular purpose, an
implied warranty of merchantability, or non-infringement of the intellectual property rights of others. This document is presented only as a guide and does not convey any license under intellectual property
rights of IDT or any third parties.
IDT's products are not intended for use in applications involving extreme environmental conditions or in life support systems or similar devices where the failure or malfunction of an IDT product can be
reasonably expected to significantly affect the health or safety of users. Anyone using an IDT product in such a manner does so at their own risk, absent an express, written agreement by IDT.
Integrated Device Technology, IDT and the IDT logo are trademarks or registered trademarks of IDT and its subsidiaries in the United States and other countries. Other trademarks used herein are the
property of IDT or their respective third party owners. For datasheet type definitions and a glossary of common terms, visit www.idt.com/go/glossary. All contents of this document are copyright of Integrated
Device Technology, Inc. All rights reserved.
These resources are intended for developers skilled in the art designing with Renesas products. You are solely responsible
for (1) selecting the appropriate products for your application, (2) designing, validating, and testing your application, and (3)
ensuring your application meets applicable standards, and any other safety, security, or other requirements. These
resources are subject to change without notice. Renesas grants you permission to use these resources only for
development of an application that uses Renesas products. Other reproduction or use of these resources is strictly
prohibited. No license is granted to any other Renesas intellectual property or to any third party intellectual property.
Renesas disclaims responsibility for, and you will fully indemnify Renesas and its representatives against, any claims,
damages, costs, losses, or liabilities arising out of your use of these resources. Renesas' products are provided only subject
to Renesas' Terms and Conditions of Sale or other applicable terms agreed to in writing. No use of any Renesas resources
expands or otherwise alters any applicable warranties or warranty disclaimers for these products.
Trademarks
Renesas and the Renesas logo are trademarks of Renesas
Electronics Corporation. All trademarks and registered
trademarks are the property of their respective owners.