S12CPUV2 ReferenceManual
S12CPUV2 ReferenceManual
Reference Manual
HCS12 Microcontrollers
freescale.com
S12CPUV2
Reference Manual
To provide the most up-to-date information, the revision of our documents on the World Wide Web will be the most current. Your printed copy may be an earlier revision. To verify you have the latest information available, refer to: http://www.freescale.com The following revision history table summarizes changes contained in this document.
Revision History
Revision Number 3.0 4.0 Date April, 2002 March, 2006 Summary of Changes Incorporated information covering HCS12 Family of 16-bit MCUs throughout the book. Reformatted to Freescale publication standards. Corrected mistake in ANDCC/TAP descriptions (Instruction Glossary). Corrected mistake in MEM description (Instruction Glossary).
Freescale and the Freescale logo are trademarks of Freescale Semiconductor, Inc. Freescale Semiconductor, Inc., 2005. All rights reserved. S12CPUV2 Reference Manual, Rev. 4.0 Freescale Semiconductor 3
List of Sections
Table of Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Section 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Section 2. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Section 3. Addressing Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Section 4. Instruction Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Section 5. Instruction Set Overview . . . . . . . . . . . . . . . . . . . . . . . 55 Section 6. Instruction Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Section 7. Exception Processing. . . . . . . . . . . . . . . . . . . . . . . . . 311 Section 8. Instruction Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . 323 Section 9. Fuzzy Logic Support. . . . . . . . . . . . . . . . . . . . . . . . . . 337 Appendix A. Instruction Reference . . . . . . . . . . . . . . . . . . . . . . . 375 Appendix B. M68HC11 to CPU12 Upgrade Path. . . . . . . . . . . . . 403 Appendix C. High-Level Language Support . . . . . . . . . . . . . . . . 425 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433
Table of Contents
Section 1. Introduction
1.1 1.2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15 Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
1.3 Symbols and Notation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 1.3.1 Abbreviations for System Resources . . . . . . . . . . . . . . . . . . . . . . . . . .16 1.3.2 Memory and Addressing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17 1.3.3 Operators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18 1.3.4 Definitions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
Section 2. Overview
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21 2.2 Programming Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21 2.2.1 Accumulators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22 2.2.2 Index Registers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22 2.2.3 Stack Pointer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22 2.2.4 Program Counter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23 2.2.5 Condition Code Register . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23 2.2.5.1 S Control Bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24 2.2.5.2 X Mask Bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25 2.2.5.3 H Status Bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25 2.2.5.4 I Mask Bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25 2.2.5.5 N Status Bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26 2.2.5.6 Z Status Bit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26 2.2.5.7 V Status Bit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26 2.2.5.8 C Status Bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26 2.3 2.4 2.5 Data Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27 Memory Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27 Instruction Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28
S12CPUV2 Reference Manual, Rev. 4.0 Freescale Semiconductor 7
3.9 Indexed Addressing Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34 3.9.1 5-Bit Constant Offset Indexed Addressing . . . . . . . . . . . . . . . . . . . . . .37 3.9.2 9-Bit Constant Offset Indexed Addressing . . . . . . . . . . . . . . . . . . . . . .37 3.9.3 16-Bit Constant Offset Indexed Addressing . . . . . . . . . . . . . . . . . . . . .38 3.9.4 16-Bit Constant Indirect Indexed Addressing . . . . . . . . . . . . . . . . . . . .38 3.9.5 Auto Pre/Post Decrement/Increment Indexed Addressing . . . . . . . . . .39 3.9.6 Accumulator Offset Indexed Addressing . . . . . . . . . . . . . . . . . . . . . . .40 3.9.7 Accumulator D Indirect Indexed Addressing . . . . . . . . . . . . . . . . . . . .41 3.10 Instructions Using Multiple Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41 3.10.1 Move Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41 3.10.2 Bit Manipulation Instructions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43 3.11 Addressing More than 64 Kbytes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44
Short Branches. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52 Long Branches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52 Bit Condition Branches. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .53 Loop Primitives. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .53 Jumps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .53
5.15 Fuzzy Logic Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67 5.15.1 Fuzzy Logic Membership Instruction . . . . . . . . . . . . . . . . . . . . . . . . . .67 5.15.2 Fuzzy Logic Rule Evaluation Instructions. . . . . . . . . . . . . . . . . . . . . . .67 5.15.3 Fuzzy Logic Weighted Average Instruction . . . . . . . . . . . . . . . . . . . . .68 5.16 5.17 5.18 Maximum and Minimum Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . .70 Multiply and Accumulate Instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71 Table Interpolation Instructions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .72
5.19 Branch Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73 5.19.1 Short Branch Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74 5.19.2 Long Branch Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75 5.19.3 Bit Condition Branch Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . .76 5.20 5.21 Loop Primitive Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .77 Jump and Subroutine Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78
S12CPUV2 Reference Manual, Rev. 4.0 Freescale Semiconductor 9
Interrupt Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .79 Index Manipulation Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .81 Stacking Instructions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .82 Pointer and Index Calculation Instructions . . . . . . . . . . . . . . . . . . . . . . . .83 Condition Code Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84 Stop and Wait Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .85 Background Mode and Null Operations . . . . . . . . . . . . . . . . . . . . . . . . . .86
7.4 Resets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .313 7.4.1 Power-On Reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .314 7.4.2 External Reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .314 7.4.3 COP Reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .314 7.4.4 Clock Monitor Reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .314 7.5 Interrupts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .315 7.5.1 Non-Maskable Interrupt Request (XIRQ) . . . . . . . . . . . . . . . . . . . . . .315 7.5.2 Maskable Interrupts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .315 7.5.3 Interrupt Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .316 7.5.4 External Interrupts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .317 7.5.5 Return-from-Interrupt Instruction (RTI) . . . . . . . . . . . . . . . . . . . . . . . .317 7.6 7.7 Unimplemented Opcode Trap. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .317 Software Interrupt Instruction (SWI) . . . . . . . . . . . . . . . . . . . . . . . . . . . .318
7.8 Exception Processing Flow. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .318 7.8.1 Vector Fetch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .318 7.8.2 Reset Exception Processing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .320 7.8.3 Interrupt and Unimplemented Opcode Trap Exception Processing . .320
8.3 Instruction Queue Status Signals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .324 8.3.1 HCS12 Timing Detail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .324 8.3.2 M68HC12 Timing Detail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .325 8.3.3 Null (Code 0:0) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .327 8.3.4 LAT Latch Data from Bus (Code 0:1). . . . . . . . . . . . . . . . . . . . . . .327 8.3.5 ALD Advance and Load from Data Bus (Code 1:0) . . . . . . . . . . . .327 8.3.6 ALL Advance and Load from Latch (Code 1:1) . . . . . . . . . . . . . . .327 8.3.7 INT Interrupt Sequence Start (Code 0:1) . . . . . . . . . . . . . . . . . . . .327 8.3.8 SEV Start Instruction on Even Address (Code 1:0) . . . . . . . . . . . .328 8.3.9 SOD Start Instruction on Odd Address (Code 1:1) . . . . . . . . . . . .328 8.4 Queue Reconstruction (for HCS12) . . . . . . . . . . . . . . . . . . . . . . . . . . . .328 8.4.1 Queue Reconstruction Registers (for HCS12) . . . . . . . . . . . . . . . . . .329 8.4.1.1 fetch_add Register . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .329 8.4.1.2 st1_add, st1_dat Registers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .329 8.4.1.3 st2_add, st2_dat Registers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .329 8.4.1.4 st3_add, st3_dat Registers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .329 8.4.2 Reconstruction Algorithm (for HCS12) . . . . . . . . . . . . . . . . . . . . . . . .330 8.5 Queue Reconstruction (for M68HC12) . . . . . . . . . . . . . . . . . . . . . . . . . .331 8.5.1 Queue Reconstruction Registers (for M68HC12). . . . . . . . . . . . . . . .331 8.5.1.1 in_add, in_dat Registers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .332 8.5.1.2 fetch_add, fetch_dat Registers. . . . . . . . . . . . . . . . . . . . . . . . . . . .332 8.5.1.3 st1_add, st1_dat Registers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .332 8.5.1.4 st2_add, st2_dat Registers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .332 8.5.2 Reconstruction Algorithm (for M68HC12). . . . . . . . . . . . . . . . . . . . . .332 8.5.2.1 LAT Decoding. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .333 8.5.2.2 ALD Decoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .333 8.5.2.3 ALL Decoding. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .333 8.6 Instruction Tagging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .335
9.1
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .337
9.2 Fuzzy Logic Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .338 9.2.1 Fuzzification (MEM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .340 9.2.2 Rule Evaluation (REV and REVW). . . . . . . . . . . . . . . . . . . . . . . . . . .342 9.2.3 Defuzzification (WAV). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .344 9.3 Example Inference Kernel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .345 9.4 MEM Instruction Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .347 9.4.1 Membership Function Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . .347 9.4.2 Abnormal Membership Function Definitions. . . . . . . . . . . . . . . . . . . .349 9.4.2.1 Abnormal Membership Function Case 1 . . . . . . . . . . . . . . . . . . . .351 9.4.2.2 Abnormal Membership Function Case 2 . . . . . . . . . . . . . . . . . . . .352 9.4.2.3 Abnormal Membership Function Case 3 . . . . . . . . . . . . . . . . . . . .352 9.5 REV and REVW Instruction Details . . . . . . . . . . . . . . . . . . . . . . . . . . . .353 9.5.1 Unweighted Rule Evaluation (REV) . . . . . . . . . . . . . . . . . . . . . . . . . .353 9.5.1.1 Set Up Prior to Executing REV. . . . . . . . . . . . . . . . . . . . . . . . . . . .353 9.5.1.2 Interrupt Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .355 9.5.1.3 Cycle-by-Cycle Details for REV . . . . . . . . . . . . . . . . . . . . . . . . . . .355 9.5.2 Weighted Rule Evaluation (REVW) . . . . . . . . . . . . . . . . . . . . . . . . . .359 9.5.2.1 Set Up Prior to Executing REVW . . . . . . . . . . . . . . . . . . . . . . . . . .359 9.5.2.2 Interrupt Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .361 9.5.2.3 Cycle-by-Cycle Details for REVW . . . . . . . . . . . . . . . . . . . . . . . . .361 9.6 WAV Instruction Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .364 9.6.1 Set Up Prior to Executing WAV . . . . . . . . . . . . . . . . . . . . . . . . . . . . .364 9.6.2 WAV Interrupt Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .365 9.6.3 Cycle-by-Cycle Details for WAV and wavr . . . . . . . . . . . . . . . . . . . . .365 9.7 Custom Fuzzy Logic Programming. . . . . . . . . . . . . . . . . . . . . . . . . . . . .369 9.7.1 Fuzzification Variations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .369 9.7.2 Rule Evaluation Variations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .372 9.7.3 Defuzzification Variations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .373
A.6
B.5 True 16-Bit Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .407 B.5.1 Bus Structures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .407 B.5.2 Instruction Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .408 B.5.3 Stack Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .409 B.6 Improved Indexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .410 B.6.1 Constant Offset Indexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .412 B.6.2 Auto-Increment Indexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .413 B.6.3 Accumulator Offset Indexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .414 B.6.4 Indirect Indexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .414 B.7 Improved Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .415 B.7.1 Reduced Cycle Counts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .415 B.7.2 Fast Math . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .415 B.7.3 Code Size Reduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .416 B.8 Additional Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .417 B.8.1 Memory-to-Memory Moves. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .420 B.8.2 Universal Transfer and Exchange . . . . . . . . . . . . . . . . . . . . . . . . . . .420 B.8.3 Loop Construct . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .420 B.8.4 Long Branches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .421 B.8.5 Minimum and Maximum Instructions . . . . . . . . . . . . . . . . . . . . . . . . .421 B.8.6 Fuzzy Logic Support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .422 B.8.7 Table Lookup and Interpolation . . . . . . . . . . . . . . . . . . . . . . . . . . . . .422 B.8.8 Extended Bit Manipulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .423 B.8.9 Push and Pull D and CCR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .423 B.8.10 Compare SP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .423 B.8.11 Support for Memory Expansion . . . . . . . . . . . . . . . . . . . . . . . . . . . . .424
C.3 Parameters and Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .426 C.3.1 Register Pushes and Pulls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .426 C.3.2 Allocating and Deallocating Stack Space . . . . . . . . . . . . . . . . . . . . . .427 C.3.3 Frame Pointer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .427 C.4 C.5 C.6 C.7 C.8 C.9 Increment and Decrement Operators . . . . . . . . . . . . . . . . . . . . . . . . . . .428 Higher Math Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .428 Conditional If Constructs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .429 Case and Switch Statements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .429 Pointers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .429 Function Calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .430
Section 1. Introduction
1.1 Introduction
This manual describes the features and operation of the core (central processing unit, or CPU, and development support functions) used in all HCS12 microcontrollers. For reference, information is provided for the M68HC12.
1.2 Features
The CPU12 is a high-speed, 16-bit processing unit that has a programming model identical to that of the industry standard M68HC11 central processor unit (CPU). The CPU12 instruction set is a proper superset of the M68HC11 instruction set, and M68HC11 source code is accepted by CPU12 assemblers with no changes. Full 16-bit data paths supports efficient arithmetic operation and high-speed math execution Supports instructions with odd byte counts, including many single-byte instructions. This allows much more efficient use of ROM space. An instruction queue buffers program information so the CPU has immediate access to at least three bytes of machine code at the start of every instruction. Extensive set of indexed addressing capabilities, including: Using the stack pointer as an indexing register in all indexed operations Using the program counter as an indexing register in all but auto increment/decrement mode Accumulator offsets using A, B, or D accumulators Automatic index predecrement, preincrement, postdecrement, and postincrement (by 8 to +8)
S12CPUV2 Reference Manual, Rev. 4.0 Freescale Semiconductor 15
1.3.1 Abbreviations for System Resources A B D X Y SP PC CCR Accumulator A Accumulator B Double accumulator D (A : B) Index register X Index register Y Stack pointer Program counter Condition code register S STOP instruction control bit X Non-maskable interrupt control bit H Half-carry status bit I Maskable interrupt control bit N Negative status bit Z Zero status bit V Twos complement overflow status bit C Carry/Borrow status bit
1.3.2 Memory and Addressing M M : M+1 8-bit memory location pointed to by the effective address of the instruction 16-bit memory location. Consists of the contents of the location pointed to by the effective address concatenated with the contents of the location at the next higher memory address. The most significant byte is at location M. 32-bit memory location. Consists of the contents of the effective address of the instruction concatenated with the contents of the next three higher memory locations. The most significant byte is at location M or M(Y). Memory locations pointed to by index register X Memory locations pointed to by the stack pointer Memory locations pointed to by index register Y plus 3 Program overlay page (bank) number for extended memory (>64 Kbytes). Program overlay page High-order byte Low-order byte Content of register or memory location Hexadecimal value Binary value
M~M+3 M(Y)~M(Y+3)
1.3.3 Operators + + M Addition Subtraction Logical AND Logical OR (inclusive) Logical exclusive OR Multiplication Division Negation. Ones complement (invert each bit of M)
: Concatenate Example: A : B means the 16-bit value formed by concatenating 8-bit accumulator A with 8-bit accumulator B. A is in the high-order position. Transfer Example: (A) M means the content of accumulator A is transferred to memory location M. Exchange Example: D X means exchange the contents of D with those of X.
1.3.4 Definitions Logic level 1 is the voltage that corresponds to the true (1) state. Logic level 0 is the voltage that corresponds to the false (0) state. Set refers specifically to establishing logic level 1 on a bit or bits. Cleared refers specifically to establishing logic level 0 on a bit or bits. Asserted means that a signal is in active logic state. An active low signal changes from logic level 1 to logic level 0 when asserted, and an active high signal changes from logic level 0 to logic level 1. Negated means that an asserted signal changes logic state. An active low signal changes from logic level 0 to logic level 1 when negated, and an active high signal changes from logic level 1 to logic level 0. ADDR is the mnemonic for address bus. DATA is the mnemonic for data bus. LSB means least significant bit or bits. MSB means most significant bit or bits. LSW means least significant word or words. MSW means most significant word or words. A specific bit location within a range is referred to by mnemonic and number. For example, A7 is bit 7 of accumulator A. A range of bit locations is referred to by mnemonic and the numbers that define the range. For example, DATA[15:8] form the high byte of the data bus.
Section 2. Overview
2.1 Introduction
This section describes the CPU12 programming model, register set, the data types used, and basic memory organization.
15
IX
INDEX REGISTER X
15
IY
INDEX REGISTER Y
15
SP
STACK POINTER
15
PC
PROGRAM COUNTER
2.2.1 Accumulators General-purpose 8-bit accumulators A and B are used to hold operands and results of operations. Some instructions treat the combination of these two 8-bit accumulators (A : B) as a 16-bit double accumulator (D). Most operations can use accumulator A or B interchangeably. However, there are a few exceptions. Add, subtract, and compare instructions involving both A and B (ABA, SBA, and CBA) only operate in one direction, so it is important to make certain the correct operand is in the correct accumulator. The decimal adjust accumulator A (DAA) instruction is used after binary-coded decimal (BCD) arithmetic operations. There is no equivalent instruction to adjust accumulator B.
2.2.2 Index Registers 16-bit index registers X and Y are used for indexed addressing. In the indexed addressing modes, the contents of an index register are added to 5-bit, 9-bit, or 16-bit constants or to the content of an accumulator to form the effective address of the instruction operand. The second index register is especially useful for moves and in cases where operands from two separate tables are used in a calculation.
2.2.3 Stack Pointer The CPU12 supports an automatic program stack. The stack is used to save system context during subroutine calls and interrupts and can also be used for temporary data storage. The stack can be located anywhere in the standard 64-Kbyte address space and can grow to any size up to the total amount of memory available in the system. The stack pointer (SP) holds the 16-bit address of the last stack location used. Normally, the SP is initialized by one of the first instructions in an application program. The stack grows downward from the address pointed to by the SP. Each time a byte is pushed onto the stack, the stack pointer is automatically decremented, and each time a byte is pulled from the stack, the stack pointer is automatically incremented. When a subroutine is called, the address of the instruction following the calling instruction is automatically calculated and pushed onto the stack. Normally, a return-from-subroutine (RTS) or a return-from-call (RTC) instruction is executed at the end of a subroutine. The return instruction
S12CPUV2 Reference Manual, Rev. 4.0 22 Freescale Semiconductor
loads the program counter with the previously stacked return address and execution continues at that address. When an interrupt occurs, the current instruction finishes execution. The address of the next instruction is calculated and pushed onto the stack, all the CPU registers are pushed onto the stack, the program counter is loaded with the address pointed to by the interrupt vector, and execution continues at that address. The stacked registers are referred to as an interrupt stack frame. The CPU12 stack frame is the same as that of the M68HC11.
NOTE:
These instructions can be interrupted, and they resume execution once the interrupt has been serviced: REV (fuzzy logic rule evaluation) REVW (fuzzy logic rule evaluation (weighted)) WAV (weighted average)
2.2.4 Program Counter The program counter (PC) is a 16-bit register that holds the address of the next instruction to be executed. It is automatically incremented each time an instruction is fetched.
2.2.5 Condition Code Register The condition code register (CCR), named for its five status indicators, contains: Five status indicators Two interrupt masking bits STOP instruction control bit
The status bits reflect the results of CPU operation as it executes instructions. The five flags are: Half carry (H) Negative (N) Zero (Z) Overflow (V) Carry/borrow (C)
The half-carry flag is used only for BCD arithmetic operations. The N, Z, V, and C status bits allow for branching based on the results of a previous operation. In some architectures, only a few instructions affect condition codes, so that multiple instructions must be executed in order to load and test a variable. Since most CPU12 instructions automatically update condition codes, it is rarely necessary to execute an extra instruction for this purpose. The challenge in using the CPU12 lies in finding instructions that do not alter the condition codes. The most important of these instructions are pushes, pulls, transfers, and exchanges. It is always a good idea to refer to an instruction set summary (see Appendix A. Instruction Reference) to check which condition codes are affected by a particular instruction. The following paragraphs describe normal uses of the condition codes. There are other, more specialized uses. For instance, the C status bit is used to enable weighted fuzzy logic rule evaluation. Specialized usages are described in the relevant portions of this manual and in Section 6. Instruction Glossary. 2.2.5.1 S Control Bit Clearing the S bit enables the STOP instruction. Execution of a STOP instruction normally causes the on-chip oscillator to stop. This may be undesirable in some applications. If the CPU encounters a STOP instruction while the S bit is set, it is treated like a no-operation (NOP) instruction and continues to the next instruction. Reset sets the S bit.
2.2.5.2 X Mask Bit The XIRQ input is an updated version of the NMI input found on earlier generations of MCUs. Non-maskable interrupts are typically used to deal with major system failures, such as loss of power. However, enabling non-maskable interrupts before a system is fully powered and initialized can lead to spurious interrupts. The X bit provides a mechanism for enabling non-maskable interrupts after a system is stable. By default, the X bit is set to 1 during reset. As long as the X bit remains set, interrupt service requests made via the XIRQ pin are not recognized. An instruction must clear the X bit to enable non-maskable interrupt service requests made via the XIRQ pin. Once the X bit has been cleared to 0, software cannot reset it to 1 by writing to the CCR. The X bit is not affected by maskable interrupts. When an XIRQ interrupt occurs after non-maskable interrupts are enabled, both the X bit and the I bit are set automatically to prevent other interrupts from being recognized during the interrupt service routine. The mask bits are set after the registers are stacked, but before the interrupt vector is fetched. Normally, a return-from-interrupt (RTI) instruction at the end of the interrupt service routine restores register values that were present before the interrupt occurred. Since the CCR is stacked before the X bit is set, the RTI normally clears the X bit, and thus re-enables non-maskable interrupts. While it is possible to manipulate the stacked value of X so that X is set after an RTI, there is no software method to reset X (and disable XIRQ) once X has been cleared. 2.2.5.3 H Status Bit The H bit indicates a carry from accumulator A bit 3 during an addition operation. The DAA instruction uses the value of the H bit to adjust a result in accumulator A to correct BCD format. H is updated only by the add accumulator A to accumulator B (ABA), add without carry (ADD), and add with carry (ADC) instructions. 2.2.5.4 I Mask Bit The I bit enables and disables maskable interrupt sources. By default, the I bit is set to 1 during reset. An instruction must clear the I bit to enable maskable interrupts. While the I bit is set, maskable interrupts can become
pending and are remembered, but operation continues uninterrupted until the I bit is cleared. When an interrupt occurs after interrupts are enabled, the I bit is automatically set to prevent other maskable interrupts during the interrupt service routine. The I bit is set after the registers are stacked, but before the first instruction in the interrupt service routine is executed. Normally, an RTI instruction at the end of the interrupt service routine restores register values that were present before the interrupt occurred. Since the CCR is stacked before the I bit is set, the RTI normally clears the I bit, and thus re-enables interrupts. Interrupts can be re-enabled by clearing the I bit within the service routine. 2.2.5.5 N Status Bit The N bit shows the state of the MSB of the result. N is most commonly used in twos complement arithmetic, where the MSB of a negative number is 1 and the MSB of a positive number is 0, but it has other uses. For instance, if the MSB of a register or memory location is used as a status flag, the user can test status by loading an accumulator. 2.2.5.6 Z Status Bit The Z bit is set when all the bits of the result are 0s. Compare instructions perform an internal implied subtraction, and the condition codes, including Z, reflect the results of that subtraction. The increment index register X (INX), decrement index register X (DEX), increment index register Y (INY), and decrement index register Y (DEY) instructions affect the Z bit and no other condition flags. These operations can only determine = (equal) and (not equal). 2.2.5.7 V Status Bit The V bit is set when twos complement overflow occurs as a result of an operation. 2.2.5.8 C Status Bit The C bit is set when a carry occurs during addition or a borrow occurs during subtraction. The C bit also acts as an error flag for multiply and divide
operations. Shift and rotate instructions operate through the C bit to facilitate multiple-word shifts.
Negative integers are represented in twos complement form. Five-bit and 9-bit signed integers are used only as offsets for indexed addressing modes. Sixteen-bit effective addresses are formed during addressing mode computations. Thirty-two-bit integer dividends are used by extended division instructions. Extended multiply and extended multiply-and-accumulate instructions produce 32-bit products.
Sixteen-bit values are stored in memory as two consecutive bytes; the high byte occupies the lowest address, but need not be aligned to an even boundary. Thirty-two-bit values are stored in memory as four consecutive bytes; the high byte occupies the lowest address, but need not be aligned to an even boundary. All input/output (I/O) and all on-chip peripherals are memory-mapped. No special instruction syntax is required to access these addresses. On-chip registers and memory typically are grouped in blocks which can be relocated within the standard 64-Kbyte address space. Refer to device documentation for specific information.
Immediate
IMM
Operand is included in instruction stream 8- or 16-bit size implied by context Operand is the lower 8 bits of an address in the range $0000$00FF Operand is a 16-bit address An 8-bit or 16-bit relative offset from the current pc is supplied in the instruction 5-bit signed constant offset from X, Y, SP, or PC Auto pre-decrement x, y, or sp by 1 ~ 8 Auto pre-increment x, y, or sp by 1 ~ 8 Auto post-decrement x, y, or sp by 1 ~ 8 Auto post-increment x, y, or sp by 1 ~ 8 Indexed with 8-bit (A or B) or 16-bit (D) accumulator offset from X, Y, SP, or PC 9-bit signed constant offset from X, Y, SP, or PC (lower 8 bits of offset in one extension byte) 16-bit constant offset from X, Y, SP, or PC (16-bit offset in two extension bytes) Pointer to operand is found at... 16-bit constant offset from X, Y, SP, or PC (16-bit offset in two extension bytes) Pointer to operand is found at... X, Y, SP, or PC plus the value in D
Direct Extended Relative Indexed (5-bit offset) Indexed (pre-decrement) Indexed (pre-increment) Indexed (post-decrement) Indexed (post-increment) Indexed (accumulator offset) Indexed (9-bit offset) Indexed (16-bit offset) Indexed-Indirect (16-bit offset) Indexed-Indirect (D accumulator offset)
INST [oprx16,xysp]
[IDX2]
INST [D,xysp]
[D,IDX]
These are common examples of 8-bit and 16-bit immediate addressing modes. The size of the immediate operand is implied by the instruction context. In the third example, the instruction implies a 16-bit immediate value but only an 8-bit value is supplied. In this case the assembler will generate the 16-bit value $0067 because the CPU expects a 16-bit value in the instruction stream. Example: BRSET FOO,#$03,THERE
In this example, extended addressing mode is used to access the operand FOO, immediate addressing mode is used to access the mask value $03, and relative addressing mode is used to identify the destination address of a branch in case the branch-taken conditions are met. BRSET is listed as an extended mode instruction even though immediate and relative modes are also used.
This is a basic example of direct addressing. The value $55 is taken to be the low-order half of an address in the range $0000 through $00FF. The high order half of the address is assumed to be 0. During execution of this instruction, the CPU combines the value $55 from the instruction with the assumed value of $00 to form the address $0055, which is then used to access the data to be loaded into accumulator A. Example: LDX $20
In this example, the value $20 is combined with the assumed value of $00 to form the address $0020. Since the LDX instruction requires a 16-bit value, a 16-bit word of data is read from addresses $0020 and $0021. After execution of this instruction, the X index register will have the value from address $0020 in its high-order half and the value from address $0021 in its low-order half.
This is a basic example of extended addressing. The value from address $F03B is loaded into the A accumulator.
8-bit, 9-bit, and 16-bit offsets are signed twos complement numbers to support branching upward and downward in memory. The numeric range of short branch offset values is $80 (128) to $7F (127). Loop primitive instructions support a 9-bit offset which allows a range of $100 (256) to $0FF (255). The numeric range of long branch offset values is $8000 (32,768) to $7FFF (32,767). If the offset is 0, the CPU executes the instruction immediately following the branch instruction, regardless of the test involved. Since the offset is at the end of a branch instruction, using a negative offset value can cause the program counter (PC) to point to the opcode and initiate a loop. For instance, a branch always (BRA) instruction consists of two bytes, so using an offset of $FE sets up an infinite loop; the same is true of a long branch always (LBRA) instruction with an offset of $FFFC. An offset that points to the opcode can cause a bit-condition branch to repeat execution until the specified bit condition is satisfied. Since bit-condition branches can consist of four, five, or six bytes depending on the addressing mode used to access the byte in memory, the offset value that sets up a loop can vary. For instance, using an offset of $FC with a BRCLR that accesses memory using an 8-bit indexed postbyte sets up a loop that executes until all the bits in the specified memory byte that correspond to 1s in the mask byte are cleared.
This approach eliminates the differences between X and Y register use while dramatically enhancing the indexed addressing capabilities. Major advantages of the CPU12 indexed addressing scheme are: The stack pointer can be used as an index register in all indexed operations. The program counter can be used as an index register in all but autoincrement and autodecrement modes. A, B, or D accumulators can be used for accumulator offsets. Automatic pre- or post-increment or pre- or post-decrement by 8 to +8 A choice of 5-, 9-, or 16-bit signed constant offsets Use of two new indexed-indirect modes: Indexed-indirect mode with 16-bit offset Indexed-indirect mode with accumulator D offset Table 3-2 is a summary of indexed addressing mode capabilities and a description of postbyte encoding. The postbyte is noted as xb in instruction descriptions. Detailed descriptions of the indexed addressing mode variations follow the table. All indexed addressing modes use a 16-bit CPU register and additional information to create an effective address. In most cases the effective address specifies the memory location affected by the operation. In some variations of indexed addressing, the effective address specifies the location of a value that points to the memory location affected by the operation.
rr0nnnnn
111rr0zs
n,r n,r
111rr011
[n,r]
32,768 n 65,535
rr1pnnnn
Auto predecrement, preincrement, postdecrement, or postincrement; p = pre-(0) or post-(1), n = 8 to 1, +1 to +8 r can specify X, Y, or SP (PC not a valid choice) +8 = 0111 +1 = 0000 1 = 1111 8 = 1000 Accumulator offset (unsigned 8-bit or 16-bit) aa-00 = A 01 = B 10 = D (16-bit) 11 = see accumulator D offset indexed-indirect r can specify X, Y, SP, or PC Accumulator D offset indexed-indirect r can specify X, Y, SP, or PC
111rr1aa
111rr111
[D,r]
Indexed addressing mode instructions use a postbyte to specify index registers (X and Y), stack pointer (SP), or program counter (PC) as the base index register and to further classify the way the effective address is formed. A special group of instructions cause this calculated effective address to be loaded into an index register for further calculations: Load stack pointer with effective address (LEAS) Load X with effective address (LEAX) Load Y with effective address (LEAY)
3.9.1 5-Bit Constant Offset Indexed Addressing This indexed addressing mode uses a 5-bit signed offset which is included in the instruction postbyte. This short offset is added to the base index register (X, Y, SP, or PC) to form the effective address of the memory location that will be affected by the instruction. This gives a range of 16 through +15 from the value in the base index register. Although other indexed addressing modes allow 9- or 16-bit offsets, those modes also require additional extension bytes in the instruction for this extra information. The majority of indexed instructions in real programs use offsets that fit in the shortest 5-bit form of indexed addressing. Examples: LDAA STAB 0,X 8,Y
For these examples, assume X has a value of $1000 and Y has a value of $2000 before execution. The 5-bit constant offset mode does not change the value in the index register, so X will still be $1000 and Y will still be $2000 after execution of these instructions. In the first example, A will be loaded with the value from address $1000. In the second example, the value from the B accumulator will be stored at address $1FF8 ($2000 $8). 3.9.2 9-Bit Constant Offset Indexed Addressing This indexed addressing mode uses a 9-bit signed offset which is added to the base index register (X, Y, SP, or PC) to form the effective address of the memory location affected by the instruction. This gives a range of 256 through +255 from the value in the base index register. The most significant bit (sign bit) of the offset is included in the instruction postbyte and the remaining eight bits are provided as an extension byte after the instruction postbyte in the instruction flow. Examples: LDAA LDAB $FF,X 20,Y
For these examples, assume X is $1000 and Y is $2000 before execution of these instructions.
NOTE:
These instructions do not alter the index registers so they will still be $1000 and $2000, respectively, after the instructions. The first instruction will load A with the value from address $10FF and the second instruction will load B with the value from address $1FEC.
This variation of the indexed addressing mode in the CPU12 is similar to the M68HC11 indexed addressing mode, but is functionally enhanced. The M68HC11 CPU provides for unsigned 8-bit constant offset indexing from X or Y, and use of Y requires an extra instruction byte and thus, an extra execution cycle. The 9-bit signed offset used in the CPU12 covers the same range of positive offsets as the M68HC11, and adds negative offset capability. The CPU12 can use X, Y, SP, or PC as the base index register. 3.9.3 16-Bit Constant Offset Indexed Addressing This indexed addressing mode uses a 16-bit offset which is added to the base index register (X, Y, SP, or PC) to form the effective address of the memory location affected by the instruction. This allows access to any address in the 64-Kbyte address space. Since the address bus and the offset are both 16 bits, it does not matter whether the offset value is considered to be a signed or an unsigned value ($FFFF may be thought of as +65,535 or as 1). The 16-bit offset is provided as two extension bytes after the instruction postbyte in the instruction flow. 3.9.4 16-Bit Constant Indirect Indexed Addressing This indexed addressing mode adds a 16-bit instruction-supplied offset to the base index register to form the address of a memory location that contains a pointer to the memory location affected by the instruction. The instruction itself does not point to the address of the memory location to be acted upon, but rather to the location of a pointer to the address to be acted on. The square brackets distinguish this addressing mode from 16-bit constant offset indexing. Example: LDAA [10,X] In this example, X holds the base address of a table of pointers. Assume that X has an initial value of $1000, and that the value $2000 is stored at addresses $100A and $100B. The instruction first adds the value 10 to the value in X to form the address $100A. Next, an address pointer ($2000) is fetched from memory at $100A. Then, the value stored in location $2000 is read and loaded into the A accumulator.
3.9.5 Auto Pre/Post Decrement/Increment Indexed Addressing This indexed addressing mode provides four ways to automatically change the value in a base index register as a part of instruction execution. The index register can be incremented or decremented by an integer value either before or after indexing takes place. The base index register may be X, Y, or SP. (Auto-modify modes would not make sense on PC.) Pre-decrement and pre-increment versions of the addressing mode adjust the value of the index register before accessing the memory location affected by the instruction the index register retains the changed value after the instruction executes. Post-decrement and post-increment versions of the addressing mode use the initial value in the index register to access the memory location affected by the instruction, then change the value of the index register. The CPU12 allows the index register to be incremented or decremented by any integer value in the ranges 8 through 1 or 1 through 8. The value need not be related to the size of the operand for the current instruction. These instructions can be used to incorporate an index adjustment into an existing instruction rather than using an additional instruction and increasing execution time. This addressing mode is also used to perform operations on a series of data structures in memory. When an LEAS, LEAX, or LEAY instruction is executed using this addressing mode, and the operation modifies the index register that is being loaded, the final value in the register is the value that would have been used to access a memory operand. (Premodification is seen in the result but postmodification is not.) Examples: STAA STX LDX LDAA 1,SP 2,SP 2,SP+ 1,SP+ ;equivalent ;equivalent ;equivalent ;equivalent to to to to PSHA PSHX PULX PULA
For a last-used type of stack like the CPU12 stack, these four examples are equivalent to common push and pull instructions. For a next-available stack like the M68HC11 stack, push A onto stack (PSHA) is equivalent to store accumulator A (STAA) 1,SP and pull A from stack (PULA) is equivalent to load accumulator A (LDAA) 1,+SP. However, in the M68HC11, 16-bit operations like push register X onto stack (PSHX) and pull register X from stack (PULX) require multiple instructions to decrement the SP by one, then store X, then decrement SP by one again.
In the STAA 1,SP example, the stack pointer is pre-decremented by one and then A is stored to the address contained in the stack pointer. Similarly the LDX 2,SP+ first loads X from the address in the stack pointer, then post-increments SP by two. Example: MOVW 2,X+,4,+Y
This example demonstrates how to work with data structures larger than bytes and words. With this instruction in a program loop, it is possible to move words of data from a list having one word per entry into a second table that has four bytes per table element. In this example the source pointer is updated after the data is read from memory (post-increment) while the destination pointer is updated before it is used to access memory (pre-increment).
3.9.6 Accumulator Offset Indexed Addressing In this indexed addressing mode, the effective address is the sum of the values in the base index register and an unsigned offset in one of the accumulators. The value in the index register itself is not changed. The index register can be X, Y, SP, or PC and the accumulator can be either of the 8-bit accumulators (A or B) or the 16-bit D accumulator. Example: LDAA B,X This instruction internally adds B to X to form the address from which A will be loaded. B and X are not changed by this instruction. This example is similar to the following 2-instruction combination in an M68HC11. Examples: ABX LDAA 0,X
However, this 2-instruction sequence alters the index register. If this sequence was part of a loop where B changed on each pass, the index register would have to be reloaded with the reference value on each loop pass. The use of LDAA B,X is more efficient in the CPU12.
3.9.7 Accumulator D Indirect Indexed Addressing This indexed addressing mode adds the value in the D accumulator to the value in the base index register to form the address of a memory location that contains a pointer to the memory location affected by the instruction. The instruction operand does not point to the address of the memory location to be acted upon, but rather to the location of a pointer to the address to be acted upon. The square brackets distinguish this addressing mode from D accumulator offset indexing. Examples: JMP GO1 GO2 GO3 [D,PC] DC.W DC.W DC.W
This example is a computed GOTO. The values beginning at GO1 are addresses of potential destinations of the jump (JMP) instruction. At the time the JMP [D,PC] instruction is executed, PC points to the address GO1, and D holds one of the values $0000, $0002, or $0004 (determined by the program some time before the JMP). Assume that the value in D is $0002. The JMP instruction adds the values in D and PC to form the address of GO2. Next the CPU reads the address PLACE2 from memory at GO2 and jumps to PLACE2. The locations of PLACE1 through PLACE3 were known at the time of program assembly but the destination of the JMP depends upon the value in D computed during program execution.
Move instructions do not support indirect modes, 9-bit, or 16-bit offset modes requiring extra extension bytes. There are special considerations when using PC-relative addressing with move instructions. The original M68HC12 implemented the instruction queue slightly differently than the newer HCS12. In the older M68HC12 implementation, the CPU did not maintain a pointer to the start of the instruction after the current instruction (what the user thinks of as the PC value during execution). This caused an offset for PC-relative move instructions. PC-relative addressing uses the address of the location immediately following the last byte of object code for the current instruction as a reference point. The CPU12 normally corrects for queue offset and for instruction alignment so that queue operation is transparent to the user. However, in the original M68HC12, move instructions pose three special problems: Some moves use an indexed source and an indexed destination. Some moves have object code that is too long to fit in the queue all at one time, so the PC value changes during execution. All moves do not have the indexed postbyte as the last byte of object code.
These cases are not handled by automatic queue pointer maintenance, but it is still possible to use PC-relative indexing with move instructions by providing for PC offsets in source code. Table 3-3 shows PC offsets from the location immediately following the current instruction by addressing mode. Table 3-3. PC Offsets for MOVE Instructions (M68HC12 Only)
MOVE Instruction Addressing Modes IMM IDX EXT IDX MOVB IDX EXT IDX IDX IMM IDX EXT IDX MOVW IDX EXT IDX IDX Offset Value +1 +2 2 1 for first operand +1 for second operand +2 +2 2 1 for first operand +1 for second operand
Example: 1000
18 09 C2 20 00
MOVB
$2000 2,PC
Moves a byte of data from $2000 to $1009 The expected location of the PC = $1005. The offset = +2. [1005 + 2 (for 2,PC) + 2 (for correction) = 1009] $18 is the page pre-byte, 09 is the MOVB opcode for ext-idx, C2 is the indexed postbyte for 2,PC (without correction). The Freescale MCUasm assembler produces corrected object code for PC-relative moves (18 09 C0 20 00 for the example shown).
NOTE:
Instead of assembling the 2,PC as C2, the correction has been applied to make it C0. Check whether an assembler makes the correction before using PC-relative moves. On the newer HCS12, the instruction queue was implemented such that an internal pointer, to the start of the next instruction, is always available. On the HCS12, PC-relative move instructions work as expected without any offset adjustment. Although this is different from the original M68HC12, it is unlikely to be a problem because PC-relative indexing is rarely, if ever, used with move instructions.
3.10.2 Bit Manipulation Instructions Bit manipulation instructions use either a combination of two or a combination of three addressing modes. The clear bits in memory (BCLR) and set bits in memory (BSET) instructions use an 8-bit mask to determine which bits in a memory byte are to be changed. The mask must be supplied with the instruction as an immediate mode value. The memory location to be modified can be specified by means of direct, extended, or indexed addressing modes. The branch if bits cleared (BRCLR) and branch if bits set (BRSET) instructions use an 8-bit mask to test the states of bits in a memory byte. The mask is supplied with the instruction as an immediate mode value. The memory location to be tested is specified by means of direct, extended, or indexed addressing modes. Relative addressing mode is used to determine the branch address. A signed 8-bit offset must be supplied with the instruction.
provided by an immediate operand in the instruction. For indexed indirect variations of CALL, a pointer specifies memory locations where the new page value and the address of the called subroutine are stored. Use of indirect addressing for both the page value and the address within the page frees the program from keeping track of explicit values for either address. The RTC instruction restores the saved program page value and the return address from the stack. This causes execution to resume at the next instruction after the original CALL instruction.
cycle. If the first byte was odd-aligned, the optional fetch is executed as a program fetch. Two external pins, IPIPE[1:0], provide time-multiplexed information about data movement in the queue and instruction execution. Decoding and use of these signals is discussed in Section 8. Instruction Queue.
4.2.1 Original M68HC12 Queue Implementation There are two 16-bit queue stages and one 16-bit buffer. Program information is fetched in aligned 16-bit words. Unless buffering is required, program information is first queued into stage 1, then advanced to stage 2 for execution. At least two words of program information are available to the CPU when execution begins. The first byte of object code is in either the even or odd half of the word in stage 2, and at least two more bytes of object code are in the queue. The buffer is used when a program word arrives before the queue can advance. This occurs during execution of single-byte and odd-aligned instructions. For instance, the queue cannot advance after an aligned, single-byte instruction is executed, because the first byte of the next instruction is also in stage 2. In these cases, information is latched into the buffer until the queue can advance.
4.2.2 HCS12 Queue Implementation There are three 16-bit stages in the instruction queue. Instructions enter the queue at stage 1 and shift out of stage 3 as the CPU executes instructions and fetches new ones into stage 1. Each byte in the queue is selectable. An opcode prediction algorithm determines the location of the next opcode in the instruction queue.
4.3.1 No Movement There is no data movement in the instruction queue during the cycle. This occurs during execution of instructions that must perform a number of internal operations, such as division instructions.
4.3.2 Latch Data from Bus (Applies Only to the M68HC12 Queue Implementation) All instructions initiate fetches to refill the queue as execution proceeds. However, a number of conditions, including instruction alignment and the length of previous instructions, affect when the queue advances. If the queue is not ready to advance when fetched information arrives, the information is latched into the buffer. Later, when the queue does advance, stage 1 is refilled from the buffer. If more than one latch cycle occurs before the queue advances, the buffer is filled on the first latch event and subsequent latch events are ignored until the queue advances.
4.3.3 Advance and Load from Data Bus The content of queue is advanced by one stage, and stage 1 is loaded with a word of program information from the data bus. The information was requested two bus cycles earlier but has only become available this cycle, due to access delay.
4.3.4 Advance and Load from Buffer (Applies Only to M68HC12 Queue Implementation) The content of queue stage 1 advances to stage 2, and stage 1 is loaded with a word of program information from the buffer. The information in the buffer was latched from the data bus during a previous cycle because the queue was not ready to advance when it arrived.
subroutine calls, branches, and jumps are considered to be elements of program structure. During design, great care is taken to assure that the mechanism that increases instruction throughput during normal program execution does not cause bottlenecks during changes of program flow, but internal queue operation is largely transparent to the user. The following information is provided to enhance subsequent descriptions of instruction execution.
4.4.1 Exceptions Exceptions are events that require processing outside the normal flow of instruction execution. CPU12 exceptions include five types of exceptions: Reset (including COP, clock monitor, and pin) Unimplemented opcode trap Software interrupt instruction X-bit interrupts I-bit interrupts
All exceptions use the same microcode, but the CPU follows different execution paths for each type of exception. CPU12 exception handling is designed to minimize the effect of queue operation on context switching. Thus, an exception vector fetch is the first part of exception processing, and fetches to refill the queue from the address pointed to by the vector are interleaved with the stacking operations that preserve context, so that program access time does not delay the switch. Refer to Section 7. Exception Processing for detailed information.
4.4.2 Subroutines The CPU12 can branch to (BSR), jump to (JSR), or call (CALL) subroutines. BSR and JSR are used to access subroutines in the normal 64-Kbyte address space. The CALL instruction is intended for use in MCUs with expanded memory capability. BSR uses relative addressing mode to generate the effective address of the subroutine, while JSR can use various other addressing modes. Both instructions calculate a return address, stack the address, then perform three program word fetches to refill the queue.
Subroutines in the normal 64-Kbyte address space are terminated with a return-from-subroutine (RTS) instruction. RTS unstacks the return address, then performs three program word fetches from that address to refill the queue. CALL is similar to JSR. MCUs with expanded memory treat 16 Kbytes of addresses from $8000 to $BFFF as a memory window. An 8-bit PPAGE register switches memory pages into and out of the window. When CALL is executed, a return address is calculated, then it and the current PPAGE value are stacked, and a new instruction-supplied value is written to PPAGE. The subroutine address is calculated, then three program word fetches are made from that address to refill the instruction queue. The return-from-call (RTC) instruction is used to terminate subroutines in expanded memory. RTC unstacks the PPAGE value and the return address, then performs three program word fetches from that address to refill the queue. CALL and RTC execute correctly in the normal 64-Kbyte address space, thus providing for portable code. However, since extra execution cycles are required, routinely substituting CALL/RTC for JSR/RTS is not recommended.
4.4.3 Branches Branch instructions cause execution flow to change when specific pre-conditions exist. The CPU12 instruction set includes: Short conditional branches Long conditional branches Bit-condition branches
Types and conditions of branch instructions are described in 5.19 Branch Instructions. All branch instructions affect the queue similarly, but there are differences in overall cycle counts between the various types. Loop primitive instructions are a special type of branch instruction used to implement counter-based loops. Branch instructions have two execution cases: The branch condition is satisfied, and a change of flow takes place. The branch condition is not satisfied, and no change of flow occurs.
4.4.3.1 Short Branches The not-taken case for short branches is simple. Since the instruction consists of a single word containing both an opcode and an 8-bit offset, the queue advances, another program word is fetched, and execution continues with the next instruction. The taken case for short branches requires that the queue be refilled so that execution can continue at a new address. First, the effective address of the destination is calculated using the relative offset in the instruction. Then, the address is loaded into the program counter, and the CPU performs three program word fetches at the new address to refill the instruction queue. 4.4.3.2 Long Branches The not-taken case for all long branches requires three cycles, while the taken case requires four cycles. This is due to differences in the amount of program information needed to fill the queue. Long branch instructions begin with a $18 prebyte which indicates that the opcode is on page 2 of the opcode map. The CPU12 treats the prebyte as a special one-byte instruction. If the prebyte is not aligned, the first cycle is used to perform a program word access; if the prebyte is aligned, the first cycle is used to perform a free cycle. The first cycle for the prebyte is executed whether or not the branch is taken. The first cycle of the branch instruction is an optional cycle. Optional cycles make the effects of byte-sized and misaligned instructions consistent with those of aligned word-length instructions. Program information is always fetched as aligned 16-bit words. When an instruction has an odd number of bytes, and the first byte is not aligned with an even byte boundary, the optional cycle makes an additional program word access that maintains queue order. In all other cases, the optional cycle is a free cycle. In the not-taken case, the queue must advance so that execution can continue with the next instruction. Two cycles are used to refill the queue. Alignment determines how the second of these cycles is used. In the taken case, the effective address of the branch is calculated using the 16-bit relative offset contained in the second word of the instruction. This address is loaded into the program counter, then the CPU performs three program word fetches at the new address.
4.4.3.3 Bit Condition Branches Bit condition branch instructions read a location in memory, and branch if the bits in that location are in a certain state. These instructions can use direct, extended, or indexed addressing modes. Indexed operations require varying amounts of information to determine the effective address, so instruction length varies according to the mode used, which in turn affects the amount of program information fetched. To shorten execution time, these branches perform one program word fetch in anticipation of the taken case. The data from this fetch is ignored in the not-taken case. If the branch is taken, the CPU fetches three program word fetches at the new address to fill the instruction queue. 4.4.3.4 Loop Primitives The loop primitive instructions test a counter value in a register or accumulator and branch to an address specified by a 9-bit relative offset contained in the instruction if a specified condition is met. There are auto-increment and auto-decrement versions of these instructions. The test and increment/decrement operations are performed on internal CPU registers, and require no additional program information. To shorten execution time, these branches perform one program word fetch in anticipation of the taken case. The data from this fetch is ignored if the branch is not taken, and the CPU does one program fetch and one optional fetch to refill the queue1. If the branch is taken, the CPU finishes refilling the queue with two additional program word fetches at the new address.
4.4.4 Jumps Jump (JMP) is the simplest change of flow instruction. JMP can use extended or indexed addressing. Indexed operations require varying amounts of information to determine the effective address, so instruction length varies according to the mode used, which in turn affects the amount of program information fetched. All forms of JMP perform three program word fetches at the new address to refill the instruction queue.
1. In the original M68HC12, the implementation of these two cycles are both program word fetches.
S12CPUV2 Reference Manual, Rev. 4.0 Freescale Semiconductor 53
accumulate operations, table interpolation, and specialized fuzzy logic operations that involve mathematical calculations. Refer to Section 6. Instruction Glossary for detailed information about individual instructions. Appendix A. Instruction Reference contains quick-reference material, including an opcode map and postbyte encoding for indexed addressing, transfer/exchange instructions, and loop primitive instructions.
Table 5-2 is a summary of transfer and exchange instructions. Table 5-2. Transfer and Exchange Instructions
Mnemonic TAB TAP TBA TFR TPA TSX TSY TXS TYS Function Transfer Instructions Transfer A to B Transfer A to CCR Transfer B to A Transfer register to register Transfer CCR to A Transfer SP to X Transfer SP to Y Transfer X to SP Transfer Y to SP Exchange Instructions EXG XGDX XGDY Exchange register to register Exchange D with X Exchange D with Y Sign Extension Instruction SEX Sign extend 8-Bit operand Sign-extended (A, B, or CCR) D, X, Y, or SP (A, B, CCR, D, X, Y, or SP) (A, B, CCR, D, X, Y, or SP) (D) (X) (D) (Y) (A) B (A) CCR (B) A (A, B, CCR, D, X, Y, or SP) A, B, CCR, D, X, Y, or SP (CCR) A (SP) X (SP) Y (X) SP (Y) SP Operation
1. These instructions are not normally used for BCD operations because, although they affect H correctly, they do not leave the result in the correct accumulator (A) to be used with the DAA instruction. Thus additional steps would be needed to adjust the result to correct BCD form.
Operation
0 C b7 A b0 b7 B b0
0 b7 b0 C
0 C b7 A b0 b7 B b0
b7
b0
b7
b0
b7
b0
5.15.3 Fuzzy Logic Weighted Average Instruction The weighted average (WAV) instruction computes a sum-of-products and a sum-of-weights used for defuzzification. To be usable, the fuzzy outputs produced by rule evaluation must be defuzzified to produce a single output value which represents the combined effect of all of the fuzzy outputs. Fuzzy outputs correspond to the labels of a system output and each is defined by a membership function in the knowledge base. The CPU12 typically uses singletons for output membership functions rather than the trapezoidal shapes used for inputs. As with inputs, the x-axis represents the range of possible values for a system output. Singleton membership functions consist of the x-axis position for a label of the system output. Fuzzy outputs correspond to the y-axis height of the corresponding output membership function. The WAV instruction calculates the numerator and denominator sums for a weighted average of the fuzzy outputs. Because WAV requires a number of cycles to execute, it can be interrupted. The WAVR pseudo-instruction causes execution to resume at the point where it was interrupted. Table 5-13. Fuzzy Logic Instructions
Mnemonic Function Operation (grade) M(Y) (X) + 4 X; (Y) + 1 Y; A unchanged if (A) < P1 or (A) > P2, then = 0, else = MIN [((A) P1) S1, (P2 (A)) S2, $FF] where: A = current crisp input value X points to a 4-byte data structure that describes a trapezoidal membership function as base intercept points and slopes (P1, P2, S1, S2) Y points at fuzzy input (RAM location) Continued on next page
MEM
Membership function
REVW
i=1 B
Si Fi Y:D
WAV
i=1
Fi X
WAVR
ETBL
TBL
5.19.1 Short Branch Instructions Short branch instructions operate this way: When a specified condition is met, a signed 8-bit offset is added to the value in the program counter. Program execution continues at the new address. The numeric range of short branch offset values is $80 (128) to $7F (127) from the address of the next memory location after the offset value. Table 5-17 is a summary of the short branch instructions. Table 5-17. Short Branch Instructions
Mnemonic Function Unary Branches BRA BRN Branch always Branch never Simple Branches BCC BCS BEQ BMI BNE BPL BVC BVS Branch if carry clear Branch if carry set Branch if equal Branch if minus Branch if not equal Branch if plus Branch if overflow clear Branch if overflow set Unsigned Branches Relation BHI BHS BLO BLS Branch if higher Branch if higher or same Branch if lower Branch if lower or same R>M RM R<M RM RM R>M RM R<M C+Z=0 C=0 C=1 C+Z=1 NV=0 Z + (N V) = 0 Z + (N V) = 1 NV=1 C=0 C=1 Z=1 N=1 Z=0 N=0 V=0 V=1 1=1 1=0 Equation or Operation
Signed Branches BGE BGT BLE BLT Branch if greater than or equal Branch if greater than Branch if less than or equal Branch if less than
5.19.2 Long Branch Instructions Long branch instructions operate this way: When a specified condition is met, a signed 16-bit offset is added to the value in the program counter. Program execution continues at the new address. Long branches are used when large displacements between decision-making steps are necessary. The numeric range of long branch offset values is $8000 (32,768) to $7FFF (32,767) from the address of the next memory location after the offset value. This permits branching from any location in the standard 64-Kbyte address map to any other location in the 64-Kbyte map. Table 5-18 is a summary of the long branch instructions. Table 5-18. Long Branch Instructions
Mnemonic LBRA LBRN LBCC LBCS LBEQ LBMI LBNE LBPL LBVC LBVS LBHI LBHS LBLO LBLS LBGE LBGT LBLE LBLT Function Unary Branches Long branch always Long branch never Simple Branches Long branch if carry clear Long branch if carry set Long branch if equal Long branch if minus Long branch if not equal Long branch if plus Long branch if overflow clear Long branch if overflow set Unsigned Branches Long branch if higher Long branch if higher or same Long branch if lower Long branch if lower or same Signed Branches Long branch if greater than or equal Long branch if greater than Long branch if less than or equal Long branch if less than NV=0 Z + (N V) = 0 Z + (N V) = 1 NV=1 C+Z=0 C=0 Z=1 C+Z=1 C=0 C=1 Z=1 N=1 Z=0 N=0 V=0 V=1 1=1 1=0 Equation or Operation
5.19.3 Bit Condition Branch Instructions The bit condition branches are taken when bits in a memory byte are in a specific state. A mask operand is used to test the location. If all bits in that location that correspond to ones in the mask are set (BRSET) or cleared (BRCLR), the branch is taken. The numeric range of 8-bit offset values is $80 (128) to $7F (127) from the address of the next memory location after the offset value. Table 5-19 is a summary of bit condition branches. Table 5-19. Bit Condition Branch Instructions
Mnemonic BRCLR BRSET Function Branch if selected bits clear Branch if selected bits set Equation or Operation (M) (mm) = 0 (M) (mm) = 0
DBNE
IBEQ
IBNE
TBEQ TBNE
CALL
JMP JSR
RTC
RTS
are used. If the CPU attempts to execute one of the unimplemented opcodes on page 2, an opcode trap interrupt occurs. Traps are essentially interrupts that share the $FFF8:$FFF9 interrupt vector. The RTI instruction is used to terminate all exception handlers, including interrupt service routines. RTI first restores the CCR, B:A, X, Y, and the return address from the stack. If no other interrupt is pending, normal execution resumes with the instruction following the last instruction that executed prior to interrupt. Table 5-22 is a summary of interrupt instructions. Table 5-22. Interrupt Instructions
Mnemonic Function Operation (M(SP)) CCR; (SP) + $0001 SP (M(SP) : M(SP+1)) B : A; (SP) + $0002 SP (M(SP) : M(SP+1)) XH : XL; (SP) + $0004 SP (M(SP) : M(SP+1)) PCH : PCL; (SP) + $0002 SP (M(SP) : M(SP+1)) YH : YL; (SP) + $0004 SP SP 2 SP; RTNH : RTNL M(SP) : M(SP+1) SP 2 SP; YH : YL M(SP) : M(SP+1) SP 2 SP; XH : XL M(SP) : M(SP+1) SP 2 SP; B : A M(SP) : M(SP+1) SP 1 SP; CCR M(SP) SP 2 SP; RTNH : RTNL M(SP) : M(SP+1) SP 2 SP; YH : YL M(SP) : M(SP+1) SP 2 SP; XH : XL M(SP) : M(SP+1) SP 2 SP; B : A M(SP) : M(SP+1) SP 1 SP; CCR M(SP)
RTI
SWI
Software interrupt
TRAP
LEAX
LEAY
STOP
Stop
WAI
MNEMONIC
LDX
Operation: Description:
S
Load Index Regi (M : M+1) X Loads the most significa memory at the addres content of the next b
X H
CCR Details:
Source Form
Address Mode
LDX #opr16i LDX opr8a LDX opr16a LDX oprx0_xysp LDX oprx9,xysp LDX oprx16,xysp LDX [D,xysp] LDX [oprx16,xysp]
CE DE FE EE EE EE EE EE
jj dd hh xb xb xb xb xb
Figure 6-1. Example Glossary Page Each entry contains symbolic and textual descriptions of operation, information concerning the effect of operation on status bits in the condition code register, and a table that describes assembler syntax, address mode variations, and cycle-by-cycle execution of the instruction.
Status bit may be set or remain cleared, but is not cleared by operation. ? Status bit may be changed by operation, but the final state is not defined. ! Status bit used for a special purpose
abc Any one legal register designator for accumulators A or B or the CCR abcdxys Any one legal register designator for accumulators A or B, the CCR, the double accumulator D, index registers X or Y, or the SP. Some assemblers may accept t2, T2, t3, or T3 codes in certain cases of transfer and exchange instructions, but these forms are intended for Freescale use only. abd Any one legal register designator for accumulators A or B or the double accumulator D abdxys Any one legal register designator for accumulators A or B, the double accumulator D, index register X or Y, or the SP dxys Any one legal register designation for the double accumulator D, index registers X or Y, or the SP msk8 Any label or expression that evaluates to an 8-bit value. Some assemblers require a # symbol before this value. opr8i Any label or expression that evaluates to an 8-bit immediate value opr16i Any label or expression that evaluates to a 16-bit immediate value opr8a Any label or expression that evaluates to an 8-bit value. The instruction treats this 8-bit value as the low-order 8 bits of an address in the direct page of the 64-Kbyte address space ($00xx). opr16a Any label or expression that evaluates to a 16-bit value. The instruction treats this value as an address in the 64-Kbyte address space.
oprx0_xysp This word breaks down into one of the following alternative forms that assemble to an 8-bit indexed addressing postbyte code. These forms generate the same object code except for the value of the postbyte code, which is designated as xb in the object code columns of the glossary pages. As with the source forms, treat all commas, plus signs, and minus signs as literal syntax elements. The italicized words used in these forms are included in this key. oprx5,xysp oprx3,xys oprx3,+xys oprx3,xys oprx3,xys+ abd,xysp oprx3 Any label or expression that evaluates to a value in the range +1 to +8 oprx5 Any label or expression that evaluates to a 5-bit value in the range 16 to +15 oprx9 Any label or expression that evaluates to a 9-bit value in the range 256 to +255 oprx16 Any label or expression that evaluates to a 16-bit value. Since the CPU12 has a 16-bit address bus, this can be either a signed or an unsigned value. page Any label or expression that evaluates to an 8-bit value. The CPU12 recognizes up to an 8-bit page value for memory expansion but not all MCUs that include the CPU12 implement all of these bits. It is the programmers responsibility to limit the page value to legal values for the intended MCU system. Some assemblers require a # symbol before this value. rel8 Any label or expression that refers to an address that is within 128 to +127 locations from the next address after the last byte of object code for the current instruction. The assembler will calculate the 8-bit signed offset and include it in the object code for this instruction.
rel9 Any label or expression that refers to an address that is within 256 to +255 locations from the next address after the last byte of object code for the current instruction. The assembler will calculate the 9-bit signed offset and include it in the object code for this instruction. The sign bit for this 9-bit value is encoded by the assembler as a bit in the looping postbyte (lb) of one of the loop control instructions DBEQ, DBNE, IBEQ, IBNE, TBEQ, or TBNE. The remaining eight bits of the offset are included as an extra byte of object code. rel16 Any label or expression that refers to an address anywhere in the 64-Kbyte address space. The assembler will calculate the 16-bit signed offset between this address and the next address after the last byte of object code for this instruction and include it in the object code for this instruction. trapnum Any label or expression that evaluates to an 8-bit number in the range $30$39 or $40$FF. Used for TRAP instruction. xys Any one legal register designation for index registers X or Y or the SP xysp Any one legal register designation for index registers X or Y, the SP, or the PC. The reference point for PC-relative instructions is the next address after the last byte of object code for the current instruction.
example of a best-case system is a single-chip 16-bit system with no 16-bit off-boundary data accesses to any locations other than on-chip RAM. Many conditions can cause one or more instruction cycles to be stretched, but the CPU is not aware of the stretch delays because the clock to the CPU is temporarily stopped during these delays. The following paragraphs explain the cycle code letters used and note conditions that can cause each type of cycle to be stretched. f Free cycle. This indicates a cycle where the CPU does not require use of the system buses. An f cycle is always one cycle of the system bus clock. These cycles can be used by a queue controller or the background debug system to perform single cycle accesses without disturbing the CPU. g Read 8-bit PPAGE register. These cycles are used only with the CALL instruction to read the current value of the PPAGE register and are not visible on the external bus. Since the PPAGE register is an internal 8-bit register, these cycles are never stretched. I Read indirect pointer. Indexed indirect instructions use this 16-bit pointer from memory to address the operand for the instruction. These are always 16-bit reads but they can be either aligned or misaligned. These cycles are extended to two bus cycles if the MCU is operating with an 8-bit external data bus and the corresponding data is stored in external memory. There can be additional stretching when the address space is assigned to a chip-select circuit programmed for slow memory. These cycles are also stretched if they correspond to misaligned access to a memory that is not designed for single-cycle misaligned access. i Read indirect PPAGE value. These cycles are only used with indexed indirect versions of the CALL instruction, where the 8-bit value for the memory expansion page register of the CALL destination is fetched from an indirect memory location. These cycles are stretched only when controlled by a chip-select circuit that is programmed for slow memory.
n Write 8-bit PPAGE register. These cycles are used only with the CALL and RTC instructions to write the destination value of the PPAGE register and are not visible on the external bus. Since the PPAGE register is an internal 8-bit register, these cycles are never stretched. O Optional cycle. Program information is always fetched as aligned 16-bit words. When an instruction consists of an odd number of bytes, and the first byte is misaligned, an O cycle is used to make an additional program word access (P) cycle that maintains queue order. In all other cases, the O cycle appears as a free (f) cycle. The $18 prebyte for page two opcodes is treated as a special 1-byte instruction. If the prebyte is misaligned, the O cycle is used as a program word access for the prebyte; if the prebyte is aligned, the O cycle appears as a free cycle. If the remainder of the instruction consists of an odd number of bytes, another O cycle is required some time before the instruction is completed. If the O cycle for the prebyte is treated as a P cycle, any subsequent O cycle in the same instruction is treated as an f cycle; if the O cycle for the prebyte is treated as an f cycle, any subsequent O cycle in the same instruction is treated as a P cycle. Optional cycles used for program word accesses can be extended to two bus cycles if the MCU is operating with an 8-bit external data bus and the program is stored in external memory. There can be additional stretching when the address space is assigned to a chip-select circuit programmed for slow memory. Optional cycles used as free cycles are never stretched. P Program word access. Program information is fetched as aligned 16-bit words. These cycles are extended to two bus cycles if the MCU is operating with an 8-bit external data bus and the program is stored externally. There can be additional stretching when the address space is assigned to a chip-select circuit programmed for slow memory.
r 8-bit data read. These cycles are stretched only when controlled by a chip-select circuit programmed for slow memory. R 16-bit data read. These cycles are extended to two bus cycles if the MCU is operating with an 8-bit external data bus and the corresponding data is stored in external memory. There can be additional stretching when the address space is assigned to a chip-select circuit programmed for slow memory. These cycles are also stretched if they correspond to misaligned accesses to memory that is not designed for single-cycle misaligned access. s Stack 8-bit data. These cycles are stretched only when controlled by a chip-select circuit programmed for slow memory. S Stack 16-bit data. These cycles are extended to two bus cycles if the MCU is operating with an 8-bit external data bus and the SP is pointing to external memory. There can be additional stretching if the address space is assigned to a chip-select circuit programmed for slow memory. These cycles are also stretched if they correspond to misaligned accesses to a memory that is not designed for single cycle misaligned access. The internal RAM is designed to allow single cycle misaligned word access. w 8-bit data write. These cycles are stretched only when controlled by a chip-select circuit programmed for slow memory. W 16-bit data write. These cycles are extended to two bus cycles if the MCU is operating with an 8-bit external data bus and the corresponding data is stored in external memory. There can be additional stretching when the address space is assigned to a chip-select circuit programmed for slow memory. These cycles are also stretched if they correspond to misaligned access to a memory that is not designed for single-cycle misaligned access. u Unstack 8-bit data. These cycles are stretched only when controlled by a chip-select circuit programmed for slow memory.
U Unstack 16-bit data. These cycles are extended to two bus cycles if the MCU is operating with an 8-bit external data bus and the SP is pointing to external memory. There can be additional stretching when the address space is assigned to a chip-select circuit programmed for slow memory. These cycles are also stretched if they correspond to misaligned accesses to a memory that is not designed for single-cycle misaligned access. The internal RAM is designed to allow single-cycle misaligned word access. V Vector fetch. Vectors are always aligned 16-bit words. These cycles are extended to two bus cycles if the MCU is operating with an 8-bit external data bus and the program is stored in external memory. There can be additional stretching when the address space is assigned to a chip-select circuit programmed for slow memory. t 8-bit conditional read. These cycles are either data read cycles or unused cycles, depending on the data and flow of the REVW instruction. These cycles are stretched only when controlled by a chip-select circuit programmed for slow memory. T 16-bit conditional read. These cycles are either data read cycles or free cycles, depending on the data and flow of the REV or REVW instruction. These cycles are extended to two bus cycles if the MCU is operating with an 8-bit external data bus and the corresponding data is stored in external memory. There can be additional stretching when the address space is assigned to a chip-select circuit programmed for slow memory. These cycles are also stretched if they correspond to misaligned accesses to a memory that is not designed for single-cycle misaligned access. x 8-bit conditional write. These cycles are either data write cycles or free cycles, depending on the data and flow of the REV or REVW instruction. These cycles are only stretched when controlled by a chip-select circuit programmed for slow memory.
Special Notation for Branch Taken/Not Taken Cases PPP/P Short branches require three cycles if taken, one cycle if not taken. Since the instruction consists of a single word containing both an opcode and an 8-bit offset, the not-taken case is simple the queue advances, another program word fetch is made, and execution continues with the next instruction. The taken case requires that the queue be refilled so that execution can continue at a new address. First, the effective address of the destination is determined, then the CPU performs three program word fetches from that address. OPPP/OPO Long branches require four cycles if taken, three cycles if not taken. Optional cycles are required because all long branches are page two opcodes, and thus include the $18 prebyte. The CPU12 treats the prebyte as a special 1-byte instruction. If the prebyte is misaligned, the optional cycle is used to perform a program word access; if the prebyte is aligned, the optional cycle is used to perform a free cycle. As a result, both the taken and not-taken cases use one optional cycle for the prebyte. In the not-taken case, the queue must advance so that execution can continue with the next instruction, and another optional cycle is required to maintain the queue. The taken case requires that the queue be refilled so that execution can continue at a new address. First, the effective address of the destination is determined, then the CPU performs three program word fetches from that address.
6.7 Glossary
This subsection contains an entry for each assembler mnemonic, in alphabetic order.
ABA
Operation: Description:
ABA
Adds the content of accumulator B to the content of accumulator A and places the result in A. The content of B is not changed. This instruction affects the H status bit so it is suitable for use in BCD arithmetic operations. See DAA instruction for additional information.
S X H I N Z V C
CCR Details:
H: A3 B3 + B3 R3 + R3 A3 Set if there was a carry from bit 3; cleared otherwise N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: A7 B7 R7 + A7 B7 R7 Set if a twos complement overow resulted from the operation; cleared otherwise C: A7 B7 + B7 R7 + R7 A7 Set if there was a carry from the MSB of the result; cleared otherwise
Address Mode INH Access Detail Object Code HCS12 18 06 OO M68HC12 OO
ABX
Operation: Description:
ABX
Adds the 8-bit unsigned content of accumulator B to the content of index register X considering the possible carry out of the low-order byte of X; places the result in X. The content of B is not changed. This mnemonic is implemented by the LEAX B,X instruction. The LEAX instruction allows A, B, D, or a constant to be added to X. For compatibility with the M68HC11, the mnemonic ABX is translated into the LEAX B,X instruction by the assembler.
S X H I N Z V C Access Detail Object Code HCS12 1A E5 Pf M68HC12 PP(1)
CCR Details:
1. Due to internal M68HC12 CPU requirements, the program word fetch is performed twice to the same address during this instruction.
ABY
Operation: Description:
ABY
Adds the 8-bit unsigned content of accumulator B to the content of index register Y considering the possible carry out of the low-order byte of Y; places the result in Y. The content of B is not changed. This mnemonic is implemented by the LEAY B,Y instruction. The LEAY instruction allows A, B, D, or a constant to be added to Y. For compatibility with the M68HC11, the mnemonic ABY is translated into the LEAY B,Y instruction by the assembler.
S X H I N Z V C Access Detail Object Code HCS12 19 ED Pf M68HC12 PP(1)
CCR Details:
1. Due to internal M68HC12CPU requirements, the program word fetch is performed twice to the same address during this instruction.
ADCA
Operation: Description:
ADCA
Adds the content of accumulator A to the content of memory location M, then adds the value of the C bit and places the result in A. This instruction affects the H status bit, so it is suitable for use in BCD arithmetic operations. See DAA instruction for additional information.
S X H I N Z V C
CCR Details:
H: A3 M3 + M3 R3 + R3 A3 Set if there was a carry from bit 3; cleared otherwise N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: A7 M7 R7 + A7 M7 R7 Set if twos complement overflow resulted from the operation; cleared otherwise C: A7 M7 + M7 R7 + R7 A7 Set if there was a carry from the MSB of the result; cleared otherwise
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 89 99 B9 A9 A9 A9 A9 A9 ii dd hh xb xb xb xb xb P rPf rPO rPf rPO frPP fIfrPf fIPrPf M68HC12 P rfP rOP rfP rPO frPP fIfrfP fIPrfP
Source Form ADCA #opr8i ADCA opr8a ADCA opr16a ADCA oprx0_xysp ADCA oprx9,xysp ADCA oprx16,xysp ADCA [D,xysp] ADCA [oprx16,xysp]
ll ff ee ff ee ff
ADCB
Operation: Description:
ADCB
Adds the content of accumulator B to the content of memory location M, then adds the value of the C bit and places the result in B. This instruction affects the H status bit, so it is suitable for use in BCD arithmetic operations. See DAA instruction for additional information.
S X H I N Z V C
CCR Details:
H: X3 M3 + M3 R3 + R3 X3 Set if there was a carry from bit 3; cleared otherwise N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: X7 M7 R7 + X7 M7 R7 Set if twos complement overflow resulted from the operation; cleared otherwise C: X7 M7 + M7 R7 + R7 X7 Set if there was a carry from the MSB of the result; cleared otherwise
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 C9 D9 F9 E9 E9 E9 E9 E9 ii dd hh xb xb xb xb xb P rPf rPO rPf rPO frPP fIfrPf fIPrPf M68HC12 P rfP rOP rfP rPO frPP fIfrfP fIPrfP
Source Form ADCB #opr8i ADCB opr8a ADCB opr16a ADCB oprx0_xysp ADCB oprx9,xysp ADCB oprx16,xysp ADCB [D,xysp] ADCB [oprx16,xysp]
ll ff ee ff ee ff
ADDA
Operation: Description: (A) + (M) A
ADDA
Adds the content of memory location M to accumulator A and places the result in A. This instruction affects the H status bit, so it is suitable for use in BCD arithmetic operations. See DAA instruction for additional information.
S X H I N Z V C
CCR Details:
H: A3 M3 + M3 R3 + R3 A3 Set if there was a carry from bit 3; cleared otherwise N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: A7 M7 R7 + A7 M7 R7 Set if twos complement overflow resulted from the operation; cleared otherwise C: A7 M7 + M7 R7 + R7 A7 Set if there was a carry from the MSB of the result; cleared otherwise
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 8B 9B BB AB AB AB AB AB ii dd hh xb xb xb xb xb P rPf rPO rPf rPO frPP fIfrPf fIPrPf M68HC12 P rfP rOP rfP rPO frPP fIfrfP fIPrfP
Source Form ADDA #opr8i ADDA opr8a ADDA opr16a ADDA oprx0_xysp ADDA oprx9,xysp ADDA oprx16,xysp ADDA [D,xysp] ADDA [oprx16,xysp]
ll ff ee ff ee ff
ADDB
Operation: Description: (B) + (M) B
ADDB
Adds the content of memory location M to accumulator B and places the result in B. This instruction affects the H status bit, so it is suitable for use in BCD arithmetic operations. See DAA instruction for additional information.
S X H I N Z V C
CCR Details:
H: B3 M3 + M3 R3 + R3 B3 Set if there was a carry from bit 3; cleared otherwise N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: B7 M7 R7 + B7 M7 R7 Set if twos complement overflow resulted from the operation; cleared otherwise C: B7 M7 + M7 R7 + R7 B7 Set if there was a carry from the MSB of the result; cleared otherwise
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 CB DB FB EB EB EB EB EB ii dd hh xb xb xb xb xb P rPf rPO rPf rPO frPP fIfrPf fIPrPf M68HC12 P rfP rOP rfP rPO frPP fIfrfP fIPrfP
Source Form ADDB #opr8i ADDB opr8a ADDB opr16a ADDB oprx0_xysp ADDB oprx9,xysp ADDB oprx16,xysp ADDB [D,xysp] ADDB [oprx16,xysp]
ll ff ee ff ee ff
ADDD
Operation: Description:
ADDD
Adds the content of memory location M concatenated with the content of memory location M +1 to the content of double accumulator D and places the result in D. Accumulator A forms the high-order half of 16-bit double accumulator D; accumulator B forms the low-order half.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $0000; cleared otherwise V: D15 M15 R15 + D15 M15 R15 Set if twos complement overflow resulted from the operation; cleared otherwise C: D15 M15 + M15 R15 + R15 D15 Set if there was a carry from the MSB of the result; cleared otherwise
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 C3 D3 F3 E3 E3 E3 E3 E3 jj dd hh xb xb xb xb xb kk ll ff ee ff ee ff PO RPf RPO RPf RPO fRPP fIfRPF fIPRPf M68HC12 OP RfP ROP RfP RPO fRPP fIfRfP fIPRfP
Source Form ADDD #opr16i ADDD opr8a ADDD opr16a ADDD oprx0_xysp ADDD oprx9,xysp ADDD oprx16,xysp ADDD [D,xysp] ADDD [oprx16,xysp]
ANDA
Operation: Description: (A) (M) A
Logical AND A
ANDA
Performs logical AND between the content of memory location M and the content of accumulator A. The result is placed in A. After the operation is performed, each bit of A is the logical AND of the corresponding bits of M and of A before the operation began.
S X H I N Z V 0 C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: 0; cleared.
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 84 94 B4 A4 A4 A4 A4 A4 ii dd hh xb xb xb xb xb P rPf rPO rPf rPO frPP fIfrPf fIPrPf M68HC12 P rfP rOP rfP rPO frPP fIfrfP fIPrfP
Source Form ANDA #opr8i ANDA opr8a ANDA opr16a ANDA oprx0_xysp ANDA oprx9,xysp ANDA oprx16,xysp ANDA [D,xysp] ANDA [oprx16,xysp]
ll ff ee ff ee ff
ANDB
Operation: Description: (B) (M) B
Logical AND B
ANDB
Performs logical AND between the content of memory location M and the content of accumulator B. The result is placed in B. After the operation is performed, each bit of B is the logical AND of the corresponding bits of M and of B before the operation began.
S X H I N Z V
0
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: 0; cleared
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 C4 D4 F4 E4 E4 E4 E4 E4 ii dd hh xb xb xb xb xb P rPf rPO rPf rPO frPP fIfrPf fIPrPf M68HC12 P rfP rOP rfP rPO frPP fIfrfP fIPrfP
Source Form ANDB #opr8i ANDB opr8a ANDB opr16a ANDB oprx0_xysp ANDB oprx9,xysp ANDB oprx16,xysp ANDB [D,xysp] ANDB [oprx16,xysp]
ll ff ee ff ee ff
ANDCC
Operation: Description:
ANDCC
(CCR) (Mask) CCR Performs bitwise logical AND between the content of a mask operand and the content of the CCR. The result is placed in the CCR. After the operation is performed, each bit of the CCR is the result of a logical AND with the corresponding bits of the mask. To clear CCR bits, clear the corresponding mask bits. CCR bits that correspond to ones in the mask are not changed by the ANDCC operation. If the I mask bit is cleared, there is a 1-cycle delay before the system allows interrupt requests. This prevents interrupts from occurring between instructions in the sequences CLI, WAI and CLI, STOP (CLI is equivalent to ANDCC #$EF).
S X H I N Z V C
CCR Details:
Condition code bits are cleared if the corresponding bit was 0 before the operation or if the corresponding bit in the mask is 0.
Address Mode IMM Access Detail Object Code HCS12 10 ii P M68HC12 P
ASL
Operation: C Description:
ASL
0
b7 b0
Shifts all bits of memory location M one bit position to the left. Bit 0 is loaded with a 0. The C status bit is loaded from the most significant bit of M.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: N C = [N C] + [N C] (for N and C after the shift) Set if (N is set and C is cleared) or (N is cleared and C is set); cleared otherwise (for values of N and C after the shift) C: M7 Set if the MSB of M was set before the shift; cleared otherwise
Address Mode EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 78 68 68 68 68 68 hh xb xb xb xb xb ll ff ee ff ee ff rPwO rPw rPwO frPwP fIfrPw fIPrPw M68HC12 rOPw rPw rPOw frPPw fIfrPw fIPrPw
Source Form ASL opr16a ASL oprx0_xysp ASL oprx9,xysp ASL oprx16,xysp ASL [D,xysp] ASL [oprx16,xysp]
ASLA
Operation: C Description:
ASLA
0
b7 b0
Shifts all bits of accumulator A one bit position to the left. Bit 0 is loaded with a 0. TheC status bit is loaded from the most significant bit of A.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: N C = [N C] + [N C] (for N and C after the shift) Set if (N is set and C is cleared) or (N is cleared and C is set); cleared otherwise (for values of N and C after the shift) C: A7 Set if the MSB of A was set before the shift; cleared otherwise
Address Mode INH Access Detail Object Code HCS12 48 O M68HC12 O
ASLB
Operation: C Description:
ASLB
0
b7 b0
Shifts all bits of accumulator B one bit position to the left. Bit 0 is loaded with a 0. The C status bit is loaded from the most significant bit of B.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: N C = [N C] + [N C] (for N and C after the shift) Set if (N is set and C is cleared) or (N is cleared and C is set); cleared otherwise (for values of N and C after the shift) C: B7 Set if the MSB of B was set before the shift; cleared otherwise
Address Mode INH Access Detail Object Code HCS12 58 1 M68HC12 O
ASLD
Operation:
ASLD
0
b7 b0 Accumulator A
b7 b0 Accumulator B
Description:
Shifts all bits of double accumulator D one bit position to the left. Bit 0 is loaded with a 0. The C status bit is loaded from the most significant bit of D.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $0000; cleared otherwise V: N C = [N C] + [N C] (for N and C after the shift) Set if (N is set and C is cleared) or (N is cleared and C is set); cleared otherwise (for values of N and C after the shift) C: D15 Set if the MSB of D was set before the shift; cleared otherwise
Address Mode INH Access Detail Object Code HCS12 59 O M68HC12 O
ASR
Operation: Description:
ASR
b7 b0
Shifts all bits of memory location M one place to the right. Bit 7 is held constant. Bit 0 is loaded into the C status bit. This operation effectively divides a twos complement value by two without changing its sign. The carry bit can be used to round the result.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: N C = [N C] + [N C] (for N and C after the shift) Set if (N is set and C is cleared) or (N is cleared and C is set); cleared otherwise (for values of N and C after the shift) C: M0 Set if the LSB of M was set before the shift; cleared otherwise
Address Mode EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 77 67 67 67 67 67 hh xb xb xb xb xb ll ff ee ff ee ff rPwO rPw rPwO frPwP fIfrPw fIPrPw M68HC12 rOPw rPw rPOw frPPw fIfrPw fIPrPw
Source Form ASR opr16a ASR oprx0_xysp ASR oprx9,xysp ASR oprx16,xysp ASR [D,xysp] ASR [oprx16,xysp]
ASRA
Operation: Description:
ASRA
C
b7 b0
Shifts all bits of accumulator A one place to the right. Bit 7 is held constant. Bit 0 is loaded into the C status bit. This operation effectively divides a twos complement value by two without changing its sign. The carry bit can be used to round the result.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: N C = [N C] + [N C] (for N and C after the shift) Set if (N is set and C is cleared) or (N is cleared and C is set); cleared otherwise (for values of N and C after the shift) C: A0 Set if the LSB of A was set before the shift; cleared otherwise
Address Mode INH Access Detail Object Code HCS12 47 O M68HC12 O
ASRB
Operation: Description:
ASRB
C
b7 b0
Shifts all bits of accumulator B one place to the right. Bit 7 is held constant. Bit 0 is loaded into the C status bit. This operation effectively divides a twos complement value by two without changing its sign. The carry bit can be used to round the result.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: N C = [N C] + [N C] (for N and C after the shift) Set if (N is set and C is cleared) or (N is cleared and C is set); cleared otherwise (for values of N and C after the shift) C: B0 Set if the LSB of B was set before the shift; cleared otherwise
Address Mode INH Access Detail Object Code HCS12 57 O M68HC12 O
BCC
Operation: Simple branch Description:
BCC
Tests the C status bit and branches if C = 0. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C Access Detail Object Code HCS12 24 rr PPP/P(1) M68HC12 PPP/P(1)
CCR Details:
1. PPP/P indicates this instruction takes three cycles to refill the instruction queue if the branch is taken and one program fetch cycle if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode BGT 2E BGE 2C BEQ 27 BLE 2F BLT 2D BHI 22 BHS/BCC 24 BEQ 27 BLS 23 BLO/BCS 25 BCS 25 BMI 2B BVS 29 BEQ 27 BRA 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment BLE 2F Signed BLT 2D Signed BNE 26 Signed BGT 2E Signed BGE 2C Signed BLS 23 Unsigned BLO/BCS 25 Unsigned BNE 26 Unsigned BHI 22 Unsigned BHS/BCC 24 Unsigned BCC 24 Simple BPL 2A Simple BVC 28 Simple BNE 26 Simple BRN 21 Unconditional
BCLR
Operation: Description:
BCLR
Clears bits in location M. To clear a bit, set the corresponding bit in the mask byte. Bits in M that correspond to 0s in the mask byte are not changed. Mask bytes can be located at PC + 2, PC + 3, or PC + 4, depending on addressing mode used.
S X H I N Z V 0 C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: 0; cleared
Address Mode(1) DIR EXT IDX IDX1 IDX2 4D 1D 0D 0D 0D Access Detail Object Code HCS12 dd hh xb xb xb mm ll mm mm ff mm ee ff mm rPwO rPwP rPwO rPwP frPwPO M68HC12 rPOw rPPw rPOw rPwP frPwOP
Source Form BCLR opr8a, msk8 BCLR opr16a, msk8 BCLR oprx0_xysp, msk8 BCLR oprx9,xysp, msk8 BCLR oprx16,xysp, msk8
BCS
Operation: Simple branch Description:
BCS
Tests the C status bit and branches if C = 1. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
1. PPP/P indicates this instruction takes three cycles to refill the instruction queue if the branch is taken and one program fetch cycle if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode BGT 2E BGE 2C BEQ 27 BLE 2F BLT 2D BHI 22 BHS/BCC 24 BEQ 27 BLS 23 BLO/BCS 25 BCS 25 BMI 2B BVS 29 BEQ 27 BRA 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment BLE 2F Signed BLT 2D Signed BNE 26 Signed BGT 2E Signed BGE 2C Signed BLS 23 Unsigned BLO/BCS 25 Unsigned BNE 26 Unsigned BHI 22 Unsigned BHS/BCC 24 Unsigned BCC 24 Simple BPL 2A Simple BVC 28 Simple BNE 26 Simple BRN 21 Unconditional
BEQ
Operation: Simple branch Description:
BEQ
Tests the Z status bit and branches if Z = 1. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
1. PPP/P indicates this instruction takes three cycles to refill the instruction queue if the branch is taken and one program fetch cycle if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode BGT 2E BGE 2C BEQ 27 BLE 2F BLT 2D BHI 22 BHS/BCC 24 BEQ 27 BLS 23 BLO/BCS 25 BCS 25 BMI 2B BVS 29 BEQ 27 BRA 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment BLE 2F Signed BLT 2D Signed BNE 26 Signed BGT 2E Signed BGE 2C Signed BLS 23 Unsigned BLO/BCS 25 Unsigned BNE 26 Unsigned BHI 22 Unsigned BHS/BCC 24 Unsigned BCC 24 Simple BPL 2A Simple BVC 28 Simple BNE 26 Simple BRN 21 Unconditional
BGE
Operation: Description:
Branch if Greater than or Equal to Zero If N V = 0, then (PC) + $0002 + Rel PC For signed twos complement values if (Accumulator) (Memory), then branch
BGE
BGE can be used to branch after comparing or subtracting signed twos complement values. After CMPA, CMPB, CPD, CPS, CPX, CPY, SBCA, SBCB, SUBA, SUBB, or SUBD, the branch occurs if the CPU register value is greater than or equal to the value in M. After CBA or SBA, the branch occurs if the value in B is greater than or equal to the value in A. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
1. PPP/P indicates this instruction takes three cycles to refill the instruction queue if the branch is taken and one program fetch cycle if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode BGT 2E BGE 2C BEQ 27 BLE 2F BLT 2D BHI 22 BHS/BCC 24 BEQ 27 BLS 23 BLO/BCS 25 BCS 25 BMI 2B BVS 29 BEQ 27 BRA 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment BLE 2F Signed BLT 2D Signed BNE 26 Signed BGT 2E Signed BGE 2C Signed BLS 23 Unsigned BLO/BCS 25 Unsigned BNE 26 Unsigned BHI 22 Unsigned BHS/BCC 24 Unsigned BCC 24 Simple BPL 2A Simple BVC 28 Simple BNE 26 Simple BRN 21 Unconditional
BGND
Description:
BGND
BGND operates like a software interrupt, except that no registers are stacked. First, the current PC value is stored in internal CPU register TMP2. Next, the BDM ROM and background register block become active. The BDM ROM contains a substitute vector, mapped to the address of the software interrupt vector, which points to routines in the BDM ROM that control background operation. The substitute vector is fetched, and execution continues from the address that it points to. Finally, the CPU checks the location that TMP2 points to. If the value stored in that location is $00 (the BGND opcode), TMP2 is incremented, so that the instruction that follows the BGND instruction is the first instruction executed when normal program execution resumes. For all other types of BDM entry, the CPU performs the same sequence of operations as for a BGND instruction, but the value stored in TMP2 already points to the instruction that would have executed next had BDM not become active. If active BDM is triggered just as a BGND instruction is about to execute, the BDM firmware does increment TMP2, but the change does not affect resumption of normal execution. While BDM is active, the CPU executes debugging commands received via a special single-wire serial interface. BDM is terminated by the execution of specific debugging commands. Upon exit from BDM, the background/boot ROM and registers are disabled, the instruction queue is refilled starting with the return address pointed to by TMP2, and normal processing resumes. BDM is normally disabled to avoid accidental entry. While BDM is disabled, BGND executes as described, but the firmware causes execution to return to the user program. Refer to Section 8. Instruction Queue for more information concerning BDM.
S X H I N Z V C
CCR Details:
BGT
Operation: Description:
Branch if Greater than Zero If Z + (N V) = 0, then (PC) + $0002 + Rel PC For signed twos complement values if (Accumulator) > (Memory), then branch
BGT
BGT can be used to branch after comparing or subtracting signed twos complement values. After CMPA, CMPB, CPD, CPS, CPX, CPY, SBCA, SBCB, SUBA, SUBB, or SUBD, the branch occurs if the CPU register value is greater than the value in M. After CBA or SBA, the branch occurs if the value in B is greater than the value in A. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
1. PPP/P indicates this instruction takes three cycles to refill the instruction queue if the branch is taken and one program fetch cycle if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode BGT 2E BGE 2C BEQ 27 BLE 2F BLT 2D BHI 22 BHS/BCC 24 BEQ 27 BLS 23 BLO/BCS 25 BCS 25 BMI 2B BVS 29 BEQ 27 BRA 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment BLE 2F Signed BLT 2D Signed BNE 26 Signed BGT 2E Signed BGE 2C Signed BLS 23 Unsigned BLO/BCS 25 Unsigned BNE 26 Unsigned BHI 22 Unsigned BHS/BCC 24 Unsigned BCC 24 Simple BPL 2A Simple BVC 28 Simple BNE 26 Simple BRN 21 Unconditional
BHI
Operation: Description:
BHI
For unsigned values, if (Accumulator) > (Memory), then branch BHI can be used to branch after comparing or subtracting unsigned values. After CMPA, CMPB, CPD, CPS, CPX, CPY, SBCA, SBCB, SUBA, SUBB, or SUBD, the branch occurs if the CPU register value is greater than the value in M. After CBA or SBA, the branch occurs if the value in B is greater than the value in A. BHI should not be used for branching after instructions that do not affect the C bit, such as increment, decrement, load, store, test, clear, or complement. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
1. PPP/P indicates this instruction takes three cycles to refill the instruction queue if the branch is taken and one program fetch cycle if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode BGT 2E BGE 2C BEQ 27 BLE 2F BLT 2D BHI 22 BHS/BCC 24 BEQ 27 BLS 23 BLO/BCS 25 BCS 25 BMI 2B BVS 29 BEQ 27 BRA 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment BLE 2F Signed BLT 2D Signed BNE 26 Signed BGT 2E Signed BGE 2C Signed BLS 23 Unsigned BLO/BCS 25 Unsigned BNE 26 Unsigned BHI 22 Unsigned BHS/BCC 24 Unsigned BCC 24 Simple BPL 2A Simple BVC 28 Simple BNE 26 Simple BRN 21 Unconditional
BHS
Operation: Description:
BHS
For unsigned values, if (Accumulator) (Memory), then branch BHS can be used to branch after subtracting or comparing unsigned values. After CMPA, CMPB, CPD, CPS, CPX, CPY, SBCA, SBCB, SUBA, SUBB, or SUBD, the branch occurs if the CPU register value is greater than or equal to the value in M. After CBA or SBA, the branch occurs if the value in B is greater than or equal to the value in A. BHS should not be used for branching after instructions that do not affect the C bit, such as increment, decrement, load, store, test, clear, or complement. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
1. PPP/P indicates this instruction takes three cycles to refill the instruction queue if the branch is taken and one program fetch cycle if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode BGT 2E BGE 2C BEQ 27 BLE 2F BLT 2D BHI 22 BHS/BCC 24 BEQ 27 BLS 23 BLO/BCS 25 BCS 25 BMI 2B BVS 29 BEQ 27 BRA 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment BLE 2F Signed BLT 2D Signed BNE 26 Signed BGT 2E Signed BGE 2C Signed BLS 23 Unsigned BLO/BCS 25 Unsigned BNE 26 Unsigned BHI 22 Unsigned BHS/BCC 24 Unsigned BCC 24 Simple BPL 2A Simple BVC 28 Simple BNE 26 Simple BRN 21 Unconditional
BITA
Operation: Description: (A) (M)
Bit Test A
BITA
Performs bitwise logical AND on the content of accumulator A and the content of memory location M and modifies the condition codes accordingly. Each bit of the result is the logical AND of the corresponding bits of the accumulator and the memory location. Neither the content of the accumulator nor the content of the memory location is affected.
S X H I N Z V 0 C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: 0; cleared
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 85 95 B5 A5 A5 A5 A5 A5 ii dd hh xb xb xb xb xb P rPf rPO rPf rPO frPP fIfrPf fIPrPf M68HC12 P rfP rOP rfP rPO frPP fIfrfP fIPrfP
Source Form BITA #opr8i BITA opr8a BITA opr16a BITA oprx0_xysp BITA oprx9,xysp BITA oprx16,xysp BITA [D,xysp] BITA [oprx16,xysp]
ll ff ee ff ee ff
BITB
Operation: Description: (B) (M)
Bit Test B
BITB
Performs bitwise logical AND on the content of accumulator B and the content of memory location M and modifies the condition codes accordingly. Each bit of the result is the logical AND of the corresponding bits of the accumulator and the memory location. Neither the content of the accumulator nor the content of the memory location is affected.
S X H I N Z V 0 C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: 0; cleared
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 C5 D5 F5 E5 E5 E5 E5 E5 ii dd hh xb xb xb xb xb P rPf rPO rPf rPO frPP fIfrPf fIPrPf M68HC12 P rfP rOP rfP rPO frPP fIfrfP fIPrfP
Source Form BITB #opr8i BITB opr8a BITB opr16a BITB oprx0_xysp BITB oprx9,xysp BITB oprx16,xysp BITB [D,xysp] BITB [oprx16,xysp]
ll ff ee ff ee ff
BLE
Operation: Description:
Branch if Less Than or Equal to Zero If Z + (N V) = 1, then (PC) + $0002 + Rel PC For signed twos complement numbers if (Accumulator) (Memory), then branch
BLE
BLE can be used to branch after subtracting or comparing signed twos complement values. After CMPA, CMPB, CPD, CPS, CPX, CPY, SBCA, SBCB, SUBA, SUBB, or SUBD, the branch occurs if the CPU register value is less than or equal to the value in M. After CBA or SBA, the branch occurs if the value in B is less than or equal to the value in A. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
1. PPP/P indicates this instruction takes three cycles to refill the instruction queue if the branch is taken and one program fetch cycle if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode BGT 2E BGE 2C BEQ 27 BLE 2F BLT 2D BHI 22 BHS/BCC 24 BEQ 27 BLS 23 BLO/BCS 25 BCS 25 BMI 2B BVS 29 BEQ 27 BRA 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment BLE 2F Signed BLT 2D Signed BNE 26 Signed BGT 2E Signed BGE 2C Signed BLS 23 Unsigned BLO/BCS 25 Unsigned BNE 26 Unsigned BHI 22 Unsigned BHS/BCC 24 Unsigned BCC 24 Simple BPL 2A Simple BVC 28 Simple BNE 26 Simple BRN 21 Unconditional
BLO
Operation: Description:
BLO
For unsigned values, if (Accumulator) < (Memory), then branch BLO can be used to branch after subtracting or comparing unsigned values. After CMPA, CMPB, CPD, CPS, CPX, CPY, SBCA, SBCB, SUBA, SUBB, or SUBD, the branch occurs if the CPU register value is less than the value in M. After CBA or SBA, the branch occurs if the value in B is less than the value in A. BLO should not be used for branching after instructions that do not affect the C bit, such as increment, decrement, load, store, test, clear, or complement. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
1. PPP/P indicates this instruction takes three cycles to refill the instruction queue if the branch is taken and one program fetch cycle if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode BGT 2E BGE 2C BEQ 27 BLE 2F BLT 2D BHI 22 BHS/BCC 24 BEQ 27 BLS 23 BLO/BCS 25 BCS 25 BMI 2B BVS 29 BEQ 27 BRA 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment BLE 2F Signed BLT 2D Signed BNE 26 Signed BGT 2E Signed BGE 2C Signed BLS 23 Unsigned BLO/BCS 25 Unsigned BNE 26 Unsigned BHI 22 Unsigned BHS/BCC 24 Unsigned BCC 24 Simple BPL 2A Simple BVC 28 Simple BNE 26 Simple BRN 21 Unconditional
BLS
Operation: Description:
BLS
For unsigned values, if (Accumulator) (Memory), then branch If BLS is executed immediately after execution of CBA, CMPA, CMPB, CMPD, CPX, CPY, SBA, SUBA, SUBB, or SUBD, a branch occurs if and only if the unsigned binary number in the accumulator is less than or equal to the unsigned binary number in memory. Generally not useful after INC/DEC, LD/ST, and TST/CLR/COM because these instructions do not affect the C status bit. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C Access Detail Object Code HCS12 23 rr PPP/P(1) M68HC12 PPP/P(1)
CCR Details:
1. PPP/P indicates this instruction takes three cycles to refill the instruction queue if the branch is taken and one program fetch cycle if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode BGT 2E BGE 2C BEQ 27 BLE 2F BLT 2D BHI 22 BHS/BCC 24 BEQ 27 BLS 23 BLO/BCS 25 BCS 25 BMI 2B BVS 29 BEQ 27 BRA 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment BLE 2F Signed BLT 2D Signed BNE 26 Signed BGT 2E Signed BGE 2C Signed BLS 23 Unsigned BLO/BCS 25 Unsigned BNE 26 Unsigned BHI 22 Unsigned BHS/BCC 24 Unsigned BCC 24 Simple BPL 2A Simple BVC 28 Simple BNE 26 Simple BRN 21 Unconditional
BLT
Operation: Description:
Branch if Less than Zero If N V = 1, then (PC) + $0002 + Rel PC For signed twos complement numbers if (Accumulator) < (Memory), then branch
BLT
BLT can be used to branch after subtracting or comparing signed twos complement values. After CMPA, CMPB, CMPD, CPS, CPX, CPY, SBCA, SBCB, SUBA, SUBB, or SUBD, the branch occurs if the CPU register value is less than the value in M. After CBA or SBA, the branch occurs if the value in B is less than the value in A. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C Access Detail Object Code HCS12 2D rr PPP/P(1) M68HC12 PPP/P(1)
CCR Details:
1. PPP/P indicates this instruction takes three cycles to refill the instruction queue if the branch is taken and one program fetch cycle if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode BGT 2E BGE 2C BEQ 27 BLE 2F BLT 2D BHI 22 BHS/BCC 24 BEQ 27 BLS 23 BLO/BCS 25 BCS 25 BMI 2B BVS 29 BEQ 27 BRA 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment BLE 2F Signed BLT 2D Signed BNE 26 Signed BGT 2E Signed BGE 2C Signed BLS 23 Unsigned BLO/BCS 25 Unsigned BNE 26 Unsigned BHI 22 Unsigned BHS/BCC 24 Unsigned BCC 24 Simple BPL 2A Simple BVC 28 Simple BNE 26 Simple BRN 21 Unconditional
BMI
Operation: Simple branch Description:
BMI
Tests the N status bit and branches if N = 1. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
1. PPP/P indicates this instruction takes three cycles to refill the instruction queue if the branch is taken and one program fetch cycle if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode BGT 2E BGE 2C BEQ 27 BLE 2F BLT 2D BHI 22 BHS/BCC 24 BEQ 27 BLS 23 BLO/BCS 25 BCS 25 BMI 2B BVS 29 BEQ 27 BRA 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment BLE 2F Signed BLT 2D Signed BNE 26 Signed BGT 2E Signed BGE 2C Signed BLS 23 Unsigned BLO/BCS 25 Unsigned BNE 26 Unsigned BHI 22 Unsigned BHS/BCC 24 Unsigned BCC 24 Simple BPL 2A Simple BVC 28 Simple BNE 26 Simple BRN 21 Unconditional
BNE
Operation: Description:
Branch if Not Equal to Zero If Z = 0, then (PC) + $0002 + Rel PC Simple branch Tests the Z status bit and branches if Z = 0.
BNE
CCR Details:
1. PPP/P indicates this instruction takes three cycles to refill the instruction queue if the branch is taken and one program fetch cycle if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode BGT 2E BGE 2C BEQ 27 BLE 2F BLT 2D BHI 22 BHS/BCC 24 BEQ 27 BLS 23 BLO/BCS 25 BCS 25 BMI 2B BVS 29 BEQ 27 BRA 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment BLE 2F Signed BLT 2D Signed BNE 26 Signed BGT 2E Signed BGE 2C Signed BLS 23 Unsigned BLO/BCS 25 Unsigned BNE 26 Unsigned BHI 22 Unsigned BHS/BCC 24 Unsigned BCC 24 Simple BPL 2A Simple BVC 28 Simple BNE 26 Simple BRN 21 Unconditional
BPL
Operation: Simple branch Description:
BPL
Tests the N status bit and branches if N = 0. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
1. PPP/P indicates this instruction takes three cycles to refill the instruction queue if the branch is taken and one program fetch cycle if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode BGT 2E BGE 2C BEQ 27 BLE 2F BLT 2D BHI 22 BHS/BCC 24 BEQ 27 BLS 23 BLO/BCS 25 BCS 25 BMI 2B BVS 29 BEQ 27 BRA 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment BLE 2F Signed BLT 2D Signed BNE 26 Signed BGT 2E Signed BGE 2C Signed BLS 23 Unsigned BLO/BCS 25 Unsigned BNE 26 Unsigned BHI 22 Unsigned BHS/BCC 24 Unsigned BCC 24 Simple BPL 2A Simple BVC 28 Simple BNE 26 Simple BRN 21 Unconditional
BRA
Operation: Description:
BRA
Unconditional branch to an address calculated as shown in the expression. Rel is a relative offset stored as a twos complement number in the second byte of the branch instruction. Execution time is longer when a conditional branch is taken than when it is not, because the instruction queue must be refilled before execution resumes at the new address. Since the BRA branch condition is always satisfied, the branch is always taken, and the instruction queue must always be refilled. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
BRCLR
Operation: Description:
BRCLR
If (M) (Mask) = 0, then branch Performs a bitwise logical AND of memory location M and the mask supplied with the instruction, then branches if and only if all bits with a value of 1 in the mask byte correspond to bits with a value of 0 in the tested byte. Mask operands can be located at PC + 1, PC + 2, or PC + 4, depending on addressing mode. The branch offset is referenced to the next address after the relative offset (rr) which is the last byte of the instruction object code. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
Source Form BRCLR opr8a, msk8, rel8 BRCLR opr16a, msk8, rel8 BRCLR oprx0_xysp, msk8, rel8 BRCLR oprx9,xysp, msk8, rel8 BRCLR oprx16,xysp, msk8, rel8
Access Detail Object Code HCS12 dd hh xb xb xb mm ll mm ff ee rr mm rr rr mm rr ff mm rr rPPP rfPPP rPPP rfPPP PrfPPP M68HC12 rPPP rfPPP rPPP rffPPP frPffPPP
BRN
Operation: Description:
BRN
Never branches. BRN is effectively a 2-byte NOP that requires one cycle to execute. BRN is included in the instruction set to provide a complement to the BRA instruction. The instruction is useful during program debug, to negate the effect of another branch instruction without disturbing the offset byte. A complement for BRA is also useful in compiler implementations. Execution time is longer when a conditional branch is taken than when it is not, because the instruction queue must be refilled before execution resumes at the new address. Since the BRN branch condition is never satisfied, the branch is never taken, and only a single program fetch is needed to update the instruction queue. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
BRSET
Operation: Description:
BRSET
If (M) (Mask) = 0, then branch Performs a bitwise logical AND of the inverse of memory location M and the mask supplied with the instruction, then branches if and only if all bits with a value of 1 in the mask byte correspond to bits with a value of one in the tested byte. Mask operands can be located at PC + 1, PC + 2, or PC + 4, depending on addressing mode. The branch offset is referenced to the next address after the relative offset (rr) which is the last byte of the instruction object code. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
Source Form BRSET opr8a, msk8, rel8 BRSET opr16a, msk8, rel8 BRSET oprx0_xysp, msk8, rel8 BRSET oprx9,xysp, msk8, rel8 BRSET oprx16,xysp, msk8, rel8
Access Detail Object Code HCS12 dd hh xb xb xb mm ll mm ff ee rr mm rr rr mm rr ff mm rr rPPP rfPPP rPPP rfPPP PrfPPP M68HC12 rPPP rfPPP rPPP rffPPP frPffPPP
BSET
Operation: Description:
BSET
Sets bits in memory location M. To set a bit, set the corresponding bit in the mask byte. All other bits in M are unchanged. The mask byte can be located at PC + 2, PC + 3, or PC + 4, depending upon addressing mode.
S X H I N Z V 0 C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: 0; cleared
Source Form BSET opr8a, msk8 BSET opr16a, msk8 BSET oprx0_xysp, msk8 BSET oprx9,xysp, msk8 BSET oprx16,xysp, msk8
Access Detail Object Code HCS12 dd hh xb xb xb mm ll mm mm ff mm ee ff mm rPwO rPwP rPwO rPwP frPwPO M68HC12 rPOw rPPw rPOw rPwP frPwOP
BSR
Operation: Description:
Branch to Subroutine (SP) $0002 SP RTNH : RTNL M(SP) : M(SP+1) (PC) + Rel PC
BSR
Sets up conditions to return to normal program flow, then transfers control to a subroutine. Uses the address of the instruction after the BSR as a return address. Decrements the SP by two, to allow the two bytes of the return address to be stacked. Stacks the return address (the SP points to the high-order byte of the return address). Branches to a location determined by the branch offset. Subroutines are normally terminated with an RTS instruction, which restores the return address from the stack.
S X H I N Z V C
CCR Details:
BVC
Operation: Description:
Branch if Overflow Cleared If V = 0, then (PC) + $0002 + Rel PC Simple branch Tests the V status bit and branches if V = 0.
BVC
BVC causes a branch when a previous operation on twos complement binary values does not cause an overflow. That is, when BVC follows a twos complement operation, a branch occurs when the result of the operation is valid. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
1. PPP/P indicates this instruction takes three cycles to refill the instruction queue if the branch is taken and one program fetch cycle if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode BGT 2E BGE 2C BEQ 27 BLE 2F BLT 2D BHI 22 BHS/BCC 24 BEQ 27 BLS 23 BLO/BCS 25 BCS 25 BMI 2B BVS 29 BEQ 27 BRA 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment BLE 2F Signed BLT 2D Signed BNE 26 Signed BGT 2E Signed BGE 2C Signed BLS 23 Unsigned BLO/BCS 25 Unsigned BNE 26 Unsigned BHI 22 Unsigned BHS/BCC 24 Unsigned BCC 24 Simple BPL 2A Simple BVC 28 Simple BNE 26 Simple BRN 21 Unconditional
BVS
Operation: Simple branch Description:
BVS
Tests the V status bit and branches if V = 1. BVS causes a branch when a previous operation on twos complement binary values causes an overflow. That is, when BVS follows a twos complement operation, a branch occurs when the result of the operation is invalid. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
1. PPP/P indicates this instruction takes three cycles to refill the instruction queue if the branch is taken and one program fetch cycle if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode BGT 2E BGE 2C BEQ 27 BLE 2F BLT 2D BHI 22 BHS/BCC 24 BEQ 27 BLS 23 BLO/BCS 25 BCS 25 BMI 2B BVS 29 BEQ 27 BRA 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment BLE 2F Signed BLT 2D Signed BNE 26 Signed BGT 2E Signed BGE 2C Signed BLS 23 Unsigned BLO/BCS 25 Unsigned BNE 26 Unsigned BHI 22 Unsigned BHS/BCC 24 Unsigned BCC 24 Simple BPL 2A Simple BVC 28 Simple BNE 26 Simple BRN 21 Unconditional
CALL
Operation: Description:
Call Subroutine in Expanded Memory (SP) $0002 SP; RTNH : RTNL M(SP) : M(SP+1) (SP) $0001 SP; (PPAGE) M(SP) page PPAGE; Subroutine Address PC
CALL
Sets up conditions to return to normal program flow, then transfers control to a subroutine in expanded memory. Uses the address of the instruction following the CALL as a return address. For code compatibility, CALL also executes correctly in devices that do not have expanded memory capability. Decrements the SP by two, then stores the return address on the stack. The SP points to the high-order byte of the return address. Decrements the SP by one, then stacks the current memory page value from the PPAGE register on the stack. Writes a new page value supplied by the instruction to PPAGE and transfers control to the subroutine. In indexed-indirect modes, the subroutine address and the PPAGE value are fetched from memory in the order M high byte, M low byte, and new PPAGE value. Expanded-memory subroutines must be terminated by an RTC instruction, which restores the return address and PPAGE value from the stack.
S X H I N Z V C
CCR Details:
Source Form CALL opr16a, page CALL oprx0_xysp, page CALL oprx9,xysp, page CALL oprx16,xysp, page CALL [D,xysp] CALL [oprx16,xysp]
Access Detail Object Code HCS12 hh xb xb xb xb xb ll pg pg ff pg ee ff pg ee ff gnSsPPP gnSsPPP gnSsPPP fgnSsPPP fIignSsPPP fIignSsPPP M68HC12 gnfSsPPP gnfSsPPP gnfSsPPP fgnfSsPPP fIignSsPPP fIignSsPPP
CBA
Operation: Description: (A) (B)
Compare Accumulators
CBA
Compares the content of accumulator A to the content of accumulator B and sets the condition codes, which may then be used for arithmetic and logical conditional branches. The contents of the accumulators are not changed.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: A7 B7 R7 + A7 B7 R7 Set if a twos complement overflow resulted from the operation; cleared otherwise C: A7 B7 + B7 R7 + R7 A7 Set if there was a borrow from the MSB of the result; cleared otherwise
CLC
Operation: Description:
Clear Carry
CLC
0 C bit
Clears the C status bit. This instruction is assembled as ANDCC #$FE. The ANDCC instruction can be used to clear any combination of bits in the CCR in one operation. CLC can be used to set up the C bit prior to a shift or rotate instruction involving the C bit.
S X H I N Z V C 0
CCR Details:
C: 0; cleared
CLI
Operation: Description:
CLI
0 I bit
Clears the I mask bit. This instruction is assembled as ANDCC #$EF. The ANDCC instruction can be used to clear any combination of bits in the CCR in one operation. When the I bit is cleared, interrupts are enabled. There is a 1-cycle (bus clock) delay in the clearing mechanism for the I bit so that, if interrupts were previously disabled, the next instruction after a CLI will always be executed, even if there was an interrupt pending prior to execution of the CLI instruction.
S X H I 0 N Z V C
CCR Details:
I:
0; cleared
CLR
Operation: Description: 0M
S X H I N 0
Clear Memory
CLR
CCR Details:
N: Z: V: C:
Source Form CLR opr16a CLR oprx0_xysp CLR oprx9,xysp CLR oprx16,xysp CLR [D,xysp] CLR [oprx16,xysp]
Access Detail Object Code HCS12 79 69 69 69 69 69 hh xb xb xb xb xb ll ff ee ff ee ff PwO Pw PwO PwP PIfw PIPw M68HC12 wOP Pw PwO PwP PIfPw PIPPw
CLRA
Operation: Description: 0A
S X H I N 0 Z 1
Clear A
CLRA
CCR Details:
N: Z: V: C:
CLRB
Operation: Description: 0B
S X H I N 0 Z 1
Clear B
CLRB
CCR Details:
N: Z: V: C:
CLV
Operation: Description:
CLV
0 V bit
Clears the V status bit. This instruction is assembled as ANDCC #$FD. The ANDCC instruction can be used to clear any combination of bits in the CCR in one operation.
S X H I N Z V 0 C
CCR Details:
V: 0; cleared
CMPA
Operation: Description: (A) (M)
Compare A
CMPA
Compares the content of accumulator A to the content of memory location M and sets the condition codes, which may then be used for arithmetic and logical conditional branching. The contents of A and location M are not changed.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: A7 M7 R7 + A7 M7 R7 Set if a twos complement overflow resulted from the operation; cleared otherwise C: A7 M7 + M7 R7 + R7 A7 Set if there was a borrow from the MSB of the result; cleared otherwise
Source Form CMPA #opr8i CMPA opr8a CMPA opr16a CMPA oprx0_xysp CMPA oprx9,xysp CMPA oprx16,xysp CMPA [D,xysp] CMPA [oprx16,xysp]
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2]
Access Detail Object Code HCS12 81 91 B1 A1 A1 A1 A1 A1 ii dd hh xb xb xb xb xb P rPf rPO rPf rPO frPP fIfrPf fIPrPf M68HC12 P rfP rOP rfP rPO frPP fIfrfP fIPrfP
ll ff ee ff ee ff
CMPB
Operation: Description: (B) (M)
Compare B
CMPB
Compares the content of accumulator B to the content of memory location M and sets the condition codes, which may then be used for arithmetic and logical conditional branching. The contents of B and location M are not changed.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: B7 M7 R7 + B7 M7 R7 Set if a twos complement overflow resulted from the operation; cleared otherwise C: B7 M7 + M7 R7 + R7 B7 Set if there was a borrow from the MSB of the result; cleared otherwise
Source Form CMPB #opr8i CMPB opr8a CMPB opr16a CMPB oprx0_xysp CMPB oprx9,xysp CMPB oprx16,xysp CMPB [D,xysp] CMPB [oprx16,xysp]
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2]
Access Detail Object Code HCS12 C1 D1 F1 E1 E1 E1 E1 E1 ii dd hh xb xb xb xb xb P rPf rPO rPf rPO frPP fIfrPf fIPrPf M68HC12 P rfP rOP rfP rPO frPP fIfrfP fIPrfP
ll ff ee ff ee ff
COM
Operation: Description:
COM
Replaces the content of memory location M with its ones complement. Each bit of M is complemented. Immediately after a COM operation on unsigned values, only the BEQ, BNE, LBEQ, and LBNE branches can be expected to perform consistently. After operation on twos complement values, all signed branches are available.
S X H I N Z V 0 C 1
CCR Details:
N: Z: V: C:
Set if MSB of result is set; cleared otherwise Set if result is $00; cleared otherwise 0; cleared 1; set (for M6800 compatibility)
Source Form COM opr16a COM oprx0_xysp COM oprx9,xysp COM oprx16,xysp COM [D,xysp] COM [oprx16,xysp]
Access Detail Object Code HCS12 71 61 61 61 61 61 hh xb xb xb xb xb ll ff ee ff ee ff rPwO rPw rPwO frPwP fIfrPw fIPrPw M68HC12 rOPw rPw rPOw frPPw fIfrPw fIPrPw
COMA
Operation: Description:
Complement A
COMA
(A) = $FF (A) A Replaces the content of accumulator A with its ones complement. Each bit of A is complemented. Immediately after a COM operation on unsigned values, only the BEQ, BNE, LBEQ, and LBNE branches can be expected to perform consistently. After operation on twos complement values, all signed branches are available.
S X H I N Z V 0 C 1
CCR Details:
N: Z: V: C:
Set if MSB of result is set; cleared otherwise Set if result is $00; cleared otherwise 0; cleared 1; set (for M6800 compatibility)
COMB
Operation: Description:
Complement B
COMB
(B) = $FF (B) B Replaces the content of accumulator B with its ones complement. Each bit of B is complemented. Immediately after a COM operation on unsigned values, only the BEQ, BNE, LBEQ, and LBNE branches can be expected to perform consistently. After operation on twos complement values, all signed branches are available.
S X H I N Z V 0 C 1
CCR Details:
N: Z: V: C:
Set if MSB of result is set; cleared otherwise Set if result is $00; cleared otherwise 0; cleared 1; set (for M6800 compatibility)
CPD
Operation: Description:
CPD
Compares the content of double accumulator D with a 16-bit value at the address specified and sets the condition codes accordingly. The compare is accomplished internally by a 16-bit subtract of (M : M + 1) from D without modifying either D or (M : M + 1).
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $0000; cleared otherwise V: D15 M15 R15 + D15 M15 R15 Set if twos complement overflow resulted from the operation; cleared otherwise C: D15 M15 + M15 R15 + R15 D15 Set if the absolute value of the content of memory is larger than the absolute value of the accumulator; cleared otherwise
Source Form CPD #opr16i CPD opr8a CPD opr16a CPD oprx0_xysp CPD oprx9,xysp CPD oprx16,xysp CPD [D,xysp] CPD [oprx16,xysp]
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2]
Access Detail Object Code HCS12 8C 9C BC AC AC AC AC AC jj dd hh xb xb xb xb xb kk ll ff ee ff ee ff PO RPf RPO RPf RPO fRPP fIfRPf fIPRPf M68HC12 OP RfP ROP RfP RPO fRPP fIfRfP fIPRfP
CPS
Operation: Description:
CPS
Compares the content of the SP with a 16-bit value at the address specified, and sets the condition codes accordingly. The compare is accomplished internally by doing a 16-bit subtract of (M : M + 1) from the SP without modifying either the SP or (M : M + 1).
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $0000; cleared otherwise V: S15 M15 R15 + S15 M15 R15 Set if twos complement overflow resulted from the operation; cleared otherwise C: S15 M15 + M15 R15 + R15 S15 Set if the absolute value of the content of memory is larger than the absolute value of the SP; cleared otherwise
Source Form CPS #opr16i CPS opr8a CPS opr16a CPS oprx0_xysp CPS oprx9,xysp CPS oprx16,xysp CPS [D,xysp] CPS [oprx16,xysp]
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2]
Access Detail Object Code HCS12 8F 9F BF AF AF AF AF AF jj dd hh xb xb xb xb xb kk ll ff ee ff ee ff PO RPf RPO RPf RPO fRPP fIfRPf fIPRPf M68HC12 OP RfP ROP RfP RPO fRPP fIfRfP fIPRfP
CPX
Operation: Description:
CPX
Compares the content of index register X with a 16-bit value at the address specified and sets the condition codes accordingly. The compare is accomplished internally by a 16-bit subtract of (M : M + 1) from index register X without modifying either index register X or (M : M + 1).
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $0000; cleared otherwise V: X15 M15 R15 + X15 M15 R15 Set if twos complement overflow resulted from the operation; cleared otherwise C: X15 M15 + M15 R15 + R15 X15 Set if the absolute value of the content of memory is larger than the absolute value of the index register; cleared otherwise
Source Form CPX #opr16i CPX opr8a CPX opr16a CPX oprx0_xysp CPX oprx9,xysp CPX oprx16,xysp CPX [D,xysp] CPX [oprx16,xysp]
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2]
Access Detail Object Code HCS12 8E 9E BE AE AE AE AE AE jj dd hh xb xb xb xb xb kk ll ff ee ff ee ff PO RPf RPO RPf RPO fRPP fIfRPf fIPRPf M68HC12 OP RfP ROP RfP RPO fRPP fIfRfP fIPRfP
CPY
Operation: Description:
CPY
Compares the content of index register Y to a 16-bit value at the address specified and sets the condition codes accordingly. The compare is accomplished internally by a 16-bit subtract of (M : M + 1) from Y without modifying either Y or (M : M + 1).
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $0000; cleared otherwise V: Y15 M15 R15 + Y15 M15 R15 Set if twos complement overflow resulted from the operation; cleared otherwise C: Y15 M15 + M15 R15 + R15 Y15 Set if the absolute value of the content of memory is larger than the absolute value of the index register; cleared otherwise
Source Form CPY #opr16i CPY opr8a CPY opr16a CPY oprx0_xysp CPY oprx9,xysp CPY oprx16,xysp CPY [D,xysp] CPY [oprx16,xysp]
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2]
Access Detail Object Code HCS12 8D 9D BD AD AD AD AD AD jj dd hh xb xb xb xb xb kk ll ff ee ff ee ff PO RPf RPO RPf RPO fRPP fIfRPf fIPRPf M68HC12 OP RfP ROP RfP RPO fRPP fIfRfP fIPRfP
DAA
Description:
Decimal Adjust A
DAA
DAA adjusts the content of accumulator A and the state of the C status bit to represent the correct binary-coded-decimal sum and the associated carry when a BCD calculation has been performed. To execute DAA, the content of accumulator A, the state of the C status bit, and the state of the H status bit must all be the result of performing an ABA, ADD, or ADC on BCD operands, with or without an initial carry. The table shows DAA operation for all legal combinations of input operands. Columns 1 through 4 represent the results of ABA, ADC, or ADD operations on BCD operands. The correction factor in column 5 is added to the accumulator to restore the result of an operation on two BCD operands to a valid BCD value and to set or clear the C bit. All values are in hexadecimal.
1 Initial C Bit Value 0 0 0 0 0 0 1 1 1 S X H I 2 Value of A[7:4] 09 08 09 AF 9F AF 02 02 03 N Z 3 Initial H Bit Value 0 0 1 0 0 1 0 0 1 V ? C 4 Value of A[3:0] 09 AF 03 09 AF 03 09 AF 03 5 Correction Factor 00 06 06 60 66 66 60 66 66 6 Corrected C Bit Value 0 0 0 1 1 1 1 1 1
CCR Details:
N: Z: V: C:
Set if MSB of result is set; cleared otherwise Set if result is $00; cleared otherwise Undefined Represents BCD carry. See bit table
Access Detail Object Code HCS12 18 07 OfO M68HC12 OfO
DBEQ
Operation: Description:
Decrement and Branch if Equal to Zero (Counter) 1 Counter If (Counter) = 0, then (PC) + $0003 + Rel PC
DBEQ
Subtract one from the specified counter register A, B, D, X, Y, or SP. If the counter register has reached zero, execute a branch to the specified relative destination. The DBEQ instruction is encoded into three bytes of machine code including the 9-bit relative offset (256 to +255 locations from the start of the next instruction). IBEQ and TBEQ instructions are similar to DBEQ except that the counter is incremented or tested rather than being decremented. Bits 7 and 6 of the instruction postbyte are used to determine which operation is to be performed.
S X H I N Z V C
CCR Details:
1. Encoding for lb is summarized in the following table. Bit 3 is not used (dont care), bit 5 selects branch on zero (DBEQ 0) or not zero (DBNE 1) versions, and bit 4 is the sign bit of the 9-bit relative offset. Bits 7 and 6 would be 0:0 for DBEQ.
Count Register A B D X Y SP
Source Form DBEQ A, rel9 DBEQ B, rel9 DBEQ D, rel9 DBEQ X, rel9 DBEQ Y, rel9 DBEQ SP, rel9
Object Code Object Code (If Offset is Positive) (If Offset is Negative) 04 00 rr 04 01 rr 04 04 04 04 04 05 06 07 rr rr rr rr 04 10 rr 04 11 rr 04 04 04 04 14 15 16 17 rr rr rr rr
Glossary
DBNE
Operation: Description:
Decrement and Branch if Not Equal to Zero (Counter) 1 Counter If (Counter) not = 0, then (PC) + $0003 + Rel PC
DBNE
Subtract one from the specified counter register A, B, D, X, Y, or SP. If the counter register has not been decremented to zero, execute a branch to the specified relative destination. The DBNE instruction is encoded into three bytes of machine code including a 9-bit relative offset (256 to +255 locations from the start of the next instruction). IBNE and TBNE instructions are similar to DBNE except that the counter is incremented or tested rather than being decremented. Bits 7 and 6 of the instruction postbyte are used to determine which operation is to be performed.
S X H I N Z V C
CCR Details:
1. Encoding for lb is summarized in the following table. Bit 3 is not used (dont care), bit 5 selects branch on zero (DBEQ 0) or not zero (DBNE 1) versions, and bit 4 is the sign bit of the 9-bit relative offset. Bits 7 and 6 would be 0:0 for DBNE.
Count Register A B D X Y SP
Source Form DBNE A, rel9 DBNE B, rel9 DBNE D, rel9 DBNE X, rel9 DBNE Y, rel9 DBNE SP, rel9
Object Code Object Code (If Offset is Positive) (If Offset is Negative) 04 20 rr 04 21 rr 04 04 04 04 24 25 26 27 rr rr rr rr 04 30 rr 04 31 rr 04 04 04 04 34 35 36 37 rr rr rr rr
Instruction Glossary
DEC
Operation: Description: (M) $01 M
Decrement Memory
DEC
Subtract one from the content of memory location M. The N, Z, and V status bits are set or cleared according to the results of the operation. The C status bit is not affected by the operation, thus allowing the DEC instruction to be used as a loop counter in multiple-precision computations.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: Set if there was a twos complement overflow as a result of the operation; cleared otherwise. Twos complement overflow occurs if and only if (M) was $80 before the operation.
Address Mode EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail HCS12 73 63 63 63 63 63 hh xb xb xb xb xb ll ff ee ff ee ff rPwO rPw rPwO frPwP fIfrPw fIPrPw M68HC12 rOPw rPw rPOw frPPw fIfrPw fIPrPw
Source Form DEC opr16a DEC oprx0_xysp DEC oprx9,xysp DEC oprx16,xysp DEC [D,xysp] DEC [oprx16,xysp]
Object Code(1)
1. Encoding for lb is summarized in the following table. Bit 3 is not used (dont care), bit 5 selects branch on zero (DBEQ 0) or not zero (DBNE 1) versions, and bit 4 is the sign bit of the 9-bit relative offset. Bits 7 and 6 would be 0:0 for DBNE.
Glossary
DECA
Operation: Description: (A) $01 A
Decrement A
DECA
Subtract one from the content of accumulator A. The N, Z, and V status bits are set or cleared according to the results of the operation. The C status bit is not affected by the operation, thus allowing the DEC instruction to be used as a loop counter in multiple-precision computations.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: Set if there was a twos complement overflow as a result of the operation; cleared otherwise. Twos complement overflow occurs if and only if (A) was $80 before the operation.
Address Mode INH Access Detail Object Code HCS12 43 O M68HC12 O
Instruction Glossary
DECB
Operation: Description: (B) $01 B
Decrement B
DECB
Subtract one from the content of accumulator B. The N, Z, and V status bits are set or cleared according to the results of the operation. The C status bit is not affected by the operation, thus allowing the DEC instruction to be used as a loop counter in multiple-precision computations.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: Set if there was a twos complement overflow as a result of the operation; cleared otherwise. Twos complement overflow occurs if and only if (B) was $80 before the operation.
Address Mode INH Access Detail Object Code HCS12 53 O M68HC12 O
Glossary
DES
Operation: Description:
DES
Subtract one from the SP. This instruction assembles to LEAS 1,SP. The LEAS instruction does not affect condition codes as DEX or DEY instructions do.
S X H I N Z V C
CCR Details:
1. Due to internal M68HC12 CPU requirements, the program word fetch is performed twice to the same address during this instruction.
Instruction Glossary
DEX
Operation: Description:
DEX
Subtract one from index register X. LEAX 1,X can produce the same result, but LEAX does not affect the Z bit. Although the LEAX instruction is more flexible, DEX requires only one byte of object code. Only the Z bit is set or cleared according to the result of this operation.
S X H I N Z V C
CCR Details:
Glossary
DEY
Operation: Description:
DEY
Subtract one from index register Y. LEAY 1,Y can produce the same result, but LEAY does not affect the Z bit. Although the LEAY instruction is more flexible, DEY requires only one byte of object code. Only the Z bit is set or cleared according to the result of this operation.
S X H I N Z V C
CCR Details:
Instruction Glossary
EDIV
Operation: Description:
EDIV
Divides a 32-bit unsigned dividend by a 16-bit divisor, producing a 16-bit unsigned quotient and an unsigned 16-bit remainder. All operands and results are located in CPU registers. If an attempt to divide by zero is made, C is set and the states of the N, Z, and V bits in the CCR are undefined. In case of an overflow or a divide by zero, the contents of the registers D and Y do not change.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Undefined after overflow or division by zero Z: Set if result is $0000; cleared otherwise Undefined after overflow or division by zero V: Set if the result was > $FFFF; cleared otherwise Undefined after division by zero C: Set if divisor was $0000; cleared otherwise
Address Mode INH Access Detail Object Code HCS12 11 ffffffffffO M68HC12 ffffffffffO
Glossary
EDIVS
Operation: Description:
EDIVS
(Y : D) (X) Y; Remainder D Divides a signed 32-bit dividend by a 16-bit signed divisor, producing a signed 16-bit quotient and a signed 16-bit remainder. All operands and results are located in CPU registers. If an attempt to divide by zero is made, C is set and the states of the N, Z, and V bits in the CCR are undefined. In case of an overflow or a divide by zero, the contents of the registers D and Y do not change.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Undefined after overflow or division by zero Z: Set if result is $0000; cleared otherwise Undefined after overflow or division by zero V: Set if the result was > $7FFF or < $8000; cleared otherwise Undefined after division by zero C: Set if divisor was $0000; cleared otherwise Indicates division by zero
Address Mode INH Access Detail Object Code HCS12 18 14 OffffffffffO M68HC12 OffffffffffO
Instruction Glossary
EMACS
Operation: Description:
EMACS
(M(X) : M(X+1)) (M(Y) : M(Y+1)) + (M ~ M+3) M ~ M+3 A 16-bit value is multiplied by a 16-bit value to produce a 32-bit intermediate result. This 32-bit intermediate result is then added to the content of a 32-bit accumulator in memory. EMACS is a signed integer operation. All operands and results are located in memory. When the EMACS instruction is executed, the first source operand is fetched from an address pointed to by X, and the second source operand is fetched from an address pointed to by index register Y. Before the instruction is executed, the X and Y index registers must contain values that point to the most significant bytes of the source operands. The most significant byte of the 32-bit result is specified by an extended address supplied with the instruction.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00000000; cleared otherwise V: M31 I31 R31 + M31 I31 R31 Set if result > $7FFFFFFF (+ overflow) or < $80000000 ( underflow) Indicates twos complement overflow C: M15 I15 + I15 R15 + R15 M15 Set if there was a carry from bit 15 of the result; cleared otherwise Indicates a carry from low word to high word of the result occurred
Address Mode Special Access Detail Object Code HCS12 18 12 hh ll ORROfffRRfWWP M68HC12 ORROfffRRfWWP
Glossary
EMAXD
Operation: Description:
EMAXD
MAX ((D), (M : M + 1)) D Subtracts an unsigned 16-bit value in memory from an unsigned 16-bit value in double accumulator D to determine which is larger, and leaves the larger of the two values in D. The Z status bit is set when the result of the subtraction is zero (the values are equal), and the C status bit is set when the subtraction requires a borrow (the value in memory is larger than the value in the accumulator). When C = 1, the value in D has been replaced by the value in memory. The unsigned value in memory is accessed by means of indexed addressing modes, which allow a great deal of flexibility in specifying the address of the operand. Auto increment/decrement variations of indexed addressing facilitate finding the largest value in a list of values.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $0000; cleared otherwise V: D15 M15 R15 + D15 M15 R15 Set if a twos complement overflow resulted from the operation; cleared otherwise C: D15 M15 + M15 R15 + R15 D15 Set if the value of the content of memory is larger than the value of the accumulator; cleared otherwise Condition codes reflect internal subtraction (R = D M : M + 1)
Address Mode IDX IDX1 IDX2 [D,IDX] [IDX2] 18 18 18 18 18 Access Detail Object Code HCS12 1A 1A 1A 1A 1A xb xb ff xb ee ff xb xb ee ff ORPf ORPO OfRPP OfIfRPf OfIPRPf M68HC12 ORfP ORPO OfRPP OfIfRfP OfIPRfP
Source Form EMAXD oprx0_xysp EMAXD oprx9,xysp EMAXD oprx16,xysp EMAXD [D,xysp] EMAXD [oprx16,xysp]
Instruction Glossary
EMAXM
Operation: Description:
EMAXM
MAX ((D), (M : M + 1)) M : M + 1 Subtracts an unsigned 16-bit value in memory from an unsigned 16-bit value in double accumulator D to determine which is larger, and leaves the larger of the two values in the memory location. The Z status bit is set when the result of the subtraction is zero (the values are equal), and the C status bit is set when the subtraction requires a borrow (the value in memory is larger than the value in the accumulator). When C = 0, the value in D has replaced the value in memory. The unsigned value in memory is accessed by means of indexed addressing modes, which allow a great deal of flexibility in specifying the address of the operand.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $0000; cleared otherwise V: D15 M15 R15 + D15 M15 R15 Set if a twos complement overflow resulted from the operation; cleared otherwise C: D15 M15 + M15 R15 + R15 D15 Set if the value of the content of memory is larger than the value of the accumulator; cleared otherwise Condition codes reflect internal subtraction (R = D M : M + 1)
Address Mode IDX IDX1 IDX2 [D,IDX] [IDX2] 18 18 18 18 18 Access Detail Object Code HCS12 1E 1E 1E 1E 1E xb xb ff xb ee ff xb xb ee ff ORPW ORPWO OfRPWP OfIfRPW OfIPRPW M68HC12 ORPW ORPWO OfRPWP OfIfRPW OfIPRPW
Source Form EMAXM oprx0_xysp EMAXM oprx9,xysp EMAXM oprx16,xysp EMAXM [D,xysp] EMAXM [oprx16,xysp]
Glossary
EMIND
Operation: Description:
EMIND
MIN ((D), (M : M + 1)) D Subtracts an unsigned 16-bit value in memory from an unsigned 16-bit value in double accumulator D to determine which is larger, and leaves the smaller of the two values in D. The Z status bit is set when the result of the subtraction is zero (the values are equal), and the C status bit is set when the subtraction requires a borrow (the value in memory is larger than the value in the accumulator). When C = 0, the value in D has been replaced by the value in memory. The unsigned value in memory is accessed by means of indexed addressing modes, which allow a great deal of flexibility in specifying the address of the operand. Auto increment/decrement variations of indexed addressing facilitate finding the smallest value in a list of values.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $0000; cleared otherwise V: D15 M15 R15 + D15 M15 R15 Set if a twos complement overflow resulted from the operation; cleared otherwise C: D15 M15 + M15 R15 + R15 D15 Set if the value of the content of memory is larger than the value of the accumulator; cleared otherwise Condition codes reflect internal subtraction (R = D M : M + 1)
Source Form EMIND oprx0_xysp EMIND oprx9,xysp EMIND oprx16,xysp EMIND [D,xysp] EMIND [oprx16,xysp]
Access Detail Object Code HCS12 1B 1B 1B 1B 1B xb xb ff xb ee ff xb xb ee ff ORPf ORPO OfRPP OfIfRPf OfIPRPf M68HC12 ORfP ORPO OfRPP OfIfRfP OfIPRfP
Instruction Glossary
EMINM
Operation: Description:
EMINM
MIN ((D), (M : M + 1)) M : M + 1 Subtracts an unsigned 16-bit value in memory from an unsigned 16-bit value in double accumulator D to determine which is larger and leaves the smaller of the two values in the memory location. The Z status bit is set when the result of the subtraction is zero (the values are equal), and the C status bit is set when the subtraction requires a borrow (the value in memory is larger than the value in the accumulator). When C = 1, the value in D has replaced the value in memory. The unsigned value in memory is accessed by means of indexed addressing modes, which allow a great deal of flexibility in specifying the address of the operand.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $0000; cleared otherwise V: D15 M15 R15 + D15 M15 R15 Set if a twos complement overflow resulted from the operation; cleared otherwise C: D15 M15 + M15 R15 + R15 D15 Set if the value of the content of memory is larger than the value of the accumulator; cleared otherwise Condition codes reflect internal subtraction (R = D M : M + 1)
Address Mode IDX IDX1 IDX2 [D,IDX] [IDX2] 18 18 18 18 18 Access Detail Object Code HCS12 1F 1F 1F 1F 1F xb xb ff xb ee ff xb xb ee ff ORPW ORPWO OfRPWP OfIfRPW OfIPRPW M68HC12 ORPW ORPWO OfRPWP OfIfRPW OfIPRPW
Source Form EMINM oprx0_xysp EMINM oprx9,xysp EMINM oprx16,xysp EMINM [D,xysp] EMINM [oprx16,xysp]
Glossary
EMUL
Operation: Description:
EMUL
An unsigned 16-bit value is multiplied by an unsigned 16-bit value to produce an unsigned 32-bit result. The first source operand must be loaded into 16-bit double accumulator D and the second source operand must be loaded into index register Y before executing the instruction. When the instruction is executed, the value in D is multiplied by the value in Y. The upper 16-bits of the 32-bit result are stored in Y and the low-order 16-bits of the result are stored in D. The C status bit can be used to round the high-order 16 bits of the result.
S X H I N Z V C
CCR Details:
N: Set if the MSB of the result is set; cleared otherwise Z: Set if result is $00000000; cleared otherwise C: Set if bit 15 of the result is set; cleared otherwise
Address Mode INH Access Detail Object Code HCS12 13 ffO M68HC12 ffO
Instruction Glossary
A
EMULS
Operation: Description:
EMULS
(D) (Y) Y : D A signed 16-bit value is multiplied by a signed 16-bit value to produce a signed 32-bit result. The first source operand must be loaded into 16-bit double accumulator D, and the second source operand must be loaded into index register Y before executing the instruction. When the instruction is executed, D is multiplied by the value Y. The 16 high-order bits of the 32-bit result are stored in Y and the 16 low-order bits of the result are stored in D. The C status bit can be used to round the high-order 16 bits of the result.
S X H I N Z V C
CCR Details:
N: Set if the MSB of the result is set; cleared otherwise Z: Set if result is $00000000; cleared otherwise C: Set if bit 15 of the result is set; cleared otherwise
Address Mode INH Access Detail Object Code HCS12 18 13 OfO OffO(1) M68HC12 OfO
Source Form
EMULS
1. EMULS has an extra free cycle if it is followed by another PAGE TWO instruction.
Glossary
EORA
Operation: Description: (A) (M) A
Exclusive OR A
EORA
Performs the logical exclusive OR between the content of accumulator A and the content of memory location M. The result is placed in A. Each bit of A after the operation is the logical exclusive OR of the corresponding bits of M and A before the operation.
S X H I N Z V 0 C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: 0; cleared
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 88 98 B8 A8 A8 A8 A8 A8 ii dd hh xb xb xb xb xb P rPf rPO rPf rPO frPP fIfrPf fIPrPf M68HC12 P rfP rOP rfP rPO frPP fIfrfP fIPrfP
Source Form EORA #opr8i EORA opr8a EORA opr16a EORA oprx0_xysp EORA oprx9,xysp EORA oprx16,xysp EORA [D,xysp] EORA [oprx16,xysp]
ll ff ee ff ee ff
Instruction Glossary
EORB
Operation: Description: (B) (M) B
Exclusive OR B
EORB
Performs the logical exclusive OR between the content of accumulator B and the content of memory location M. The result is placed in A. Each bit of A after the operation is the logical exclusive OR of the corresponding bits of M and B before the operation.
S X H I N Z V 0 C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: 0; cleared
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 C8 D8 F8 E8 E8 E8 E8 E8 ii dd hh xb xb xb xb xb P rPf rPO rPf rPO frPP fIfrPf fIPrPf M68HC12 P rfP rOP rfP rPO frPP fIfrfP fIPrfP
Source Form EORB #opr8i EORB opr8a EORB opr16a EORB oprx0_xysp EORB oprx9,xysp EORB oprx16,xysp EORB [D,xysp] EORB [oprx16,xysp]
ll ff ee ff ee ff
Glossary
ETBL
Operation: Description:
ETBL
ETBL linearly interpolates one of 256 result values that fall between each pair of data entries in a lookup table stored in memory. Data entries in the table represent the y values of endpoints of equally-spaced line segments. Table entries and the interpolated result are 16-bit values. The result is stored in the D accumulator. Before executing ETBL, an index register points to the table entry corresponding to the x value (X1 that is closest to, but less than or equal to, the desired lookup point (XL, YL). This defines the left end of a line segment and the right end is defined by the next data entry in the table. Prior to execution, accumulator B holds a binary fraction (radix left of MSB) representing the ratio of (XLX1) (X2X1). The 16-bit unrounded result is calculated using the following expression: D = Y1 + [(B) (Y2 Y1)] Where: (B) = (XL X1) (X2 X1) Y1 = 16-bit data entry pointed to by <effective address> Y2 = 16-bit data entry pointed to by <effective address> + 2 The intermediate value [(B) (Y2 Y1)] produces a 24-bit result with the radix point between bits 7 and 8. Any indexed addressing mode, except indirect modes or 9-bit and 16-bit offset modes, can be used to identify the first data point (X1,Y1). The second data point is the next table entry.
S X H I N Z V C (1)
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $0000; cleared otherwise C: Set if result can be rounded up; cleared otherwise
1. C-bit was undefined in original M68HC12
Instruction Glossary
EXG
Operation: Description: See table
EXG
Exchanges the contents of registers specified in the instruction as shown below. Note that the order in which exchanges between 8-bit and 16-bit registers are specified affects the high byte of the 16-bit registers differently. Exchanges of D with A or B are ambiguous. Cases involving TMP2 and TMP3 are reserved for Freescale use, so some assemblers may not permit their use, but it is possible to generate these cases by using DC.B or DC.W assembler directives.
S X H I N Z V C Or: S X H I N Z V C
CCR Details:
None affected, unless the CCR is the destination register. Condition codes take on the value of the corresponding source bits, except that the X mask bit cannot change from 0 to 1. Software can leave the X bit set, leave it cleared, or change it from 1 to 0, but it can be set only in response to any reset or by recognition of an XIRQ interrupt.
Address Mode INH Object Code(1) HCS12 B7 eb P Access Detail M68HC12 P
1. Legal coding for eb is summarized in the following table. Columns represent the high-order source digit. Rows represent the low-order destination digit (bit 3 is a dont care). Values are in hexadecimal.
8 0 1 2 3 4 5 6 7
AA AB A CCR
9
BA BB B CCR
A
CCR A CCR B CCR CCR
TMP3L A BA XL A YL A SPL A $00:A TMP3 AB $00:A X $00:A Y $00:A SP TMP3L B BB XL B YL B SPL B $FF:B TMP3 $FF A $FF:B X $FF:B Y $FF:B SP TMP3L CCR B CCR XL CCR YL CCR SPL CCR $FF:CCR TMP3 $FF:CCR D $FF:CCR X $FF:CCR Y $FF:CCR SP TMP3 TMP2 TMP3 D TMP3 X TMP3 Y TMP3 SP D TMP2 DD DX DY D SP X TMP2 XD XX XY X SP Y TMP2 YD YX YY Y SP SP TMP2 SP D SP X SP Y SP SP
$00:A TMP2 $00:B TMP2 $00:CCR TMP2 TMP2L A TMP2L B TMP2L CCR $00:CCR D $00:A D $00:B D B CCR $00:A X $00:B X $00:CCR X XL A XL B XL CCR $00:A Y $00:B Y $00:CCR Y YL A YL B YL CCR $00:A SP $00:B SP $00:CCR SP SPL A SPL B SPL CCR
Glossary
FDIV
Operation: Description:
FDIV
Divides an unsigned 16-bit numerator in double accumulator D by an unsigned 16-bit denominator in index register X, producing an unsigned 16-bit quotient in X and an unsigned 16-bit remainder in D. If both the numerator and the denominator are assumed to have radix points in the same positions, the radix point of the quotient is to the left of bit 15. The numerator must be less than the denominator. In the case of overflow (denominator is less than or equal to the numerator) or division by zero, the quotient is set to $FFFF, and the remainder is indeterminate. FDIV is equivalent to multiplying the numerator by 216 and then performing 32 by 16-bit integer division. The result is interpreted as a binary-weighted fraction, which resulted from the division of a 16-bit integer by a larger 16-bit integer. A result of $0001 corresponds to 0.000015, and $FFFF corresponds to 0.9998. The remainder of an IDIV instruction can be resolved into a binary-weighted fraction by an FDIV instruction. The remainder of an FDIV instruction can be resolved into the next 16 bits of binary-weighted fraction by another FDIV instruction.
S X H I N Z V C
CCR Details:
Z: Set if quotient is $0000; cleared otherwise V: 1 if X D Set if the denominator was less than or equal to the numerator; cleared otherwise C: X15 X14 X13 X12 ... X3 X2 X1 X0 Set if denominator was $0000; cleared otherwise
Instruction Glossary
IBEQ
Operation: Description:
Increment and Branch if Equal to Zero (Counter) + 1 Counter If (Counter) = 0, then (PC) + $0003 + Rel PC
IBEQ
Add one to the specified counter register A, B, D, X, Y, or SP. If the counter register has reached zero, branch to the specified relative destination. The IBEQ instruction is encoded into three bytes of machine code including a 9-bit relative offset (256 to +255 locations from the start of the next instruction). DBEQ and TBEQ instructions are similar to IBEQ except that the counter is decremented or tested rather than being incremented. Bits 7 and 6 of the instruction postbyte are used to determine which operation is to be performed.
S X H I N Z V C
CCR Details:
1. Encoding for lb is summarized in the following table. Bit 3 is not used (dont care), bit 5 selects branch on zero (IBEQ 0) or not zero (IBNE 1) versions, and bit 0 is the sign bit of the 9-bit relative offset. Bits 7 and 6 should be 1:0 for IBEQ.
Count Bits 2:0 Register A B D X Y SP 000 001 100 101 110 111
Source Form IBEQ A, rel9 IBEQ B, rel9 IBEQ D, rel9 IBEQ X, rel9 IBEQ Y, rel9 IBEQ SP, rel9
Glossary
IBNE
Operation: Description:
Increment and Branch if Not Equal to Zero (Counter) + 1 Counter If (Counter) not = 0, then (PC) + $0003 + Rel PC
IBNE
Add one to the specified counter register A, B, D, X, Y, or SP. If the counter register has not been incremented to zero, branch to the specified relative destination. The IBNE instruction is encoded into three bytes of machine code including a 9-bit relative offset (256 to +255 locations from the start of the next instruction). DBNE and TBNE instructions are similar to IBNE except that the counter is decremented or tested rather than being incremented. Bits 7 and 6 of the instruction postbyte are used to determine which operation is to be performed.
S X H I N Z V C
CCR Details:
1. Encoding for lb is summarized in the following table. Bit 3 is not used (dont care), bit 5 selects branch on zero (IBEQ 0) or not zero (IBNE 1) versions, and bit 0 is the sign bit of the 9-bit relative offset. Bits 7 and 6 should be 1:0 for IBNE.
Count Bits 2:0 Register A B D X Y SP 000 001 100 101 110 111
Source Form IBNE A, rel9 IBNE B, rel9 IBNE D, rel9 IBNE X, rel9 IBNE Y, rel9 IBNE SP, rel9
Instruction Glossary
IDIV
Operation: Description:
IDIV
Divides an unsigned 16-bit dividend in double accumulator D by an unsigned 16-bit divisor in index register X, producing an unsigned 16-bit quotient in X, and an unsigned 16-bit remainder in D. If both the divisor and the dividend are assumed to have radix points in the same positions, the radix point of the quotient is to the right of bit 0. In the case of division by zero, C is set, the quotient is set to $FFFF, and the remainder is indeterminate.
S X H I N Z V 0 C
CCR Details:
Z: Set if quotient is $0000; cleared otherwise V: 0; cleared C: X15 X14 X13 X12 ... X3 X2 X1 X0 Set if denominator was $0000; cleared otherwise
Glossary
IDIVS
Operation: Description:
IDIVS
Performs signed integer division of a signed 16-bit numerator in double accumulator D by a signed 16-bit denominator in index register X, producing a signed 16-bit quotient in X, and a signed 16-bit remainder in D. If division by zero is attempted, the values in D and X are not changed, C is set, and the values of the N, Z, and V status bits are undened. Other than division by zero, which is not legal and causes the C status bit to be set, the only overflow case is:
$8000 32,768 ----------------- = -------------------- = +32,768 $FFFF 1
But the highest positive value that can be represented in a 16-bit twos complement number is 32,767 ($7FFF).
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Undefined after overflow or division by zero Z: Set if quotient is $0000; cleared otherwise Undefined after overflow or division by zero V: Set if the result was > $7FFF or < $8000; cleared otherwise Undefined after division by zero C: X15 X14 X13 X12 ... X3 X2 X1 X0 Set if denominator was $0000; cleared otherwise
Instruction Glossary
INC
Operation: Description: (M) + $01 M
Increment Memory
INC
Add one to the content of memory location M. The N, Z and V status bits are set or cleared according to the results of the operation. The C status bit is not affected by the operation, thus allowing the INC instruction to be used as a loop counter in multiple-precision computations. When operating on unsigned values, only BEQ, BNE, LBEQ, and LBNE branches can be expected to perform consistently. When operating on twos complement values, all signed branches are available.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: Set if there is a twos complement overflow as a result of the operation; cleared otherwise. Twos complement overflow occurs if and only if (M) was $7F before the operation.
Source Form INC opr16a INC oprx0_xysp INC oprx9,xysp INC oprx16,xysp INC [D,xysp] INC [oprx16,xysp]
Access Detail Object Code HCS12 72 62 62 62 62 62 hh xb xb xb xb xb ll ff ee ff ee ff rPwO rPw rPwO frPwP fIfrPw fIPrPw M68HC12 rOPw rPw rPOw frPPw fIfrPw fIPrPw
Glossary
INCA
Operation: Description: (A) + $01 A
Increment A
INCA
Add one to the content of accumulator A. The N, Z, and V status bits are set or cleared according to the results of the operation. The C status bit is not affected by the operation, thus allowing the INC instruction to be used as a loop counter in multiple-precision computations. When operating on unsigned values, only BEQ, BNE, LBEQ, and LBNE branches can be expected to perform consistently. When operating on twos complement values, all signed branches are available.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: Set if there is a twos complement overflow as a result of the operation; cleared otherwise. Twos complement overflow occurs if and only if (A) was $7F before the operation.
Instruction Glossary
INCB
Operation: Description: (B) + $01 B
Increment B
INCB
Add one to the content of accumulator B. The N, Z, and V status bits are set or cleared according to the results of the operation. The C status bit is not affected by the operation, thus allowing the INC instruction to be used as a loop counter in multiple-precision computations. When operating on unsigned values, only BEQ, BNE, LBEQ, and LBNE branches can be expected to perform consistently. When operating on twos complement values, all signed branches are available.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: Set if there is a twos complement overflow as a result of the operation; cleared otherwise. Twos complement overflow occurs if and only if (B) was $7F before the operation.
Glossary
INS
Operation: Description:
INS
Add one to the SP. This instruction is assembled to LEAS 1,SP. The LEAS instruction does not affect condition codes as an INX or INY instruction would.
S X H I N Z V C
CCR Details:
1. Due to internal M68HC12 CPU requirements, the program word fetch is performed twice to the same address during this instruction.
Instruction Glossary
INX
Operation: Description:
INX
Add one to index register X. LEAX 1,X can produce the same result but LEAX does not affect the Z status bit. Although the LEAX instruction is more flexible, INX requires only one byte of object code. INX operation affects only the Z status bit.
S X H I N Z V C
CCR Details:
Glossary
INY
Operation: Description:
INY
Add one to index register Y. LEAY 1,Y can produce the same result but LEAY does not affect the Z status bit. Although the LEAY instruction is more flexible, INY requires only one byte of object code. INY operation affects only the Z status bit.
S X H I N Z V C
CCR Details:
Instruction Glossary
JMP
Operation: Description:
JMP
Jumps to the instruction stored at the effective address. The effective address is obtained according to the rules for extended or indexed addressing.
S X H I N Z V C
CCR Details:
Source Form JMP opr16a JMP oprx0_xysp JMP oprx9,xysp JMP oprx16,xysp JMP [D,xysp] JMP [oprx16,xysp]
Access Detail Object Code HCS12 06 05 05 05 05 05 hh xb xb xb xb xb ll ff ee ff ee ff PPP PPP PPP fPPP fIfPPP fIfPPP M68HC12 PPP PPP PPP fPPP fIfPPP fIfPPP
Glossary
JSR
Operation: Description:
Jump to Subroutine (SP) $0002 SP RTNH : RTNL M(SP) : M(SP + 1) Subroutine Address PC
JSR
Sets up conditions to return to normal program flow, then transfers control to a subroutine. Uses the address of the instruction following the JSR as a return address. Decrements the SP by two to allow the two bytes of the return address to be stacked. Stacks the return address. The SP points to the high order byte of the return address. Calculates an effective address according to the rules for extended, direct, or indexed addressing. Jumps to the location determined by the effective address. Subroutines are normally terminated with an RTS instruction, which restores the return address from the stack.
S X H I N Z V C
CCR Details:
Source Form JSR opr8a JSR opr16a JSR oprx0_xysp JSR oprx9,xysp JSR oprx16,xysp JSR [D,xysp] JSR [oprx16,xysp]
Access Detail Object Code HCS12 17 16 15 15 15 15 15 dd hh xb xb xb xb xb ll ff ee ff ee ff SPPP SPPP PPPS PPPS fPPPS fIfPPPS fIfPPPS M68HC12 PPPS PPPS PPPS PPPS fPPPS fIfPPPS fIfPPPS
Instruction Glossary
LBCC
Operation: Description:
Long Branch if Carry Cleared (Same as LBHS) If C = 0, then (PC) + $0004 + Rel PC Simple branch Tests the C status bit and branches if C = 0.
LBCC
CCR Details:
1. OPPP/OPO indicates this instruction takes four cycles to refill the instruction queue if the branch is taken and three cycles if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode LBGT 18 2E LBGE 18 2C LBEQ 18 27 LBLE 18 2F LBLT 18 2D LBHI 18 22 LBHS/LBCC 18 24 LBEQ 18 27 LBLS 18 23 LBLO/LBCS 18 25 LBCS 18 25 LBMI 18 2B LBVS 18 29 LBEQ 18 27 LBRA 18 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment LBLE 18 2F Signed LBLT 18 2D Signed LBNE 18 26 Signed LBGT 18 2E Signed LBGE 18 2C Signed LBLS 18 23 Unsigned LBLO/LBCS 18 25 Unsigned LBNE 18 26 Unsigned LBHI 18 22 Unsigned LBHS/LBCC 18 24 Unsigned LBCC 18 24 Simple LBPL 18 2A Simple LBVC 18 28 Simple LBNE 18 26 Simple LBRN 18 21 Unconditional
Glossary
LBCS
Operation: Description:
Long Branch if Carry Set (Same as LBLO) If C = 1, then (PC) + $0004 + Rel PC Simple branch Tests the C status bit and branches if C = 1.
LBCS
CCR Details:
1. OPPP/OPO indicates this instruction takes four cycles to refill the instruction queue if the branch is taken and three cycles if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode LBGT 18 2E LBGE 18 2C LBEQ 18 27 LBLE 18 2F LBLT 18 2D LBHI 18 22 LBHS/LBCC 18 24 LBEQ 18 27 LBLS 18 23 LBLO/LBCS 18 25 LBCS 18 25 LBMI 18 2B LBVS 18 29 LBEQ 18 27 LBRA 18 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment LBLE 18 2F Signed LBLT 18 2D Signed LBNE 18 26 Signed LBGT 18 2E Signed LBGE 18 2C Signed LBLS 18 23 Unsigned LBLO/LBCS 18 25 Unsigned LBNE 18 26 Unsigned LBHI 18 22 Unsigned LBHS/LBCC 18 24 Unsigned LBCC 18 24 Simple LBPL 18 2A Simple LBVC 18 28 Simple LBNE 18 26 Simple LBRN 18 21 Unconditional
Instruction Glossary
LBEQ
Operation: Simple branch Description:
LBEQ
Tests the Z status bit and branches if Z = 1. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
1. OPPP/OPO indicates this instruction takes four cycles to refill the instruction queue if the branch is taken and three cycles if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode LBGT 18 2E LBGE 18 2C LBEQ 18 27 LBLE 18 2F LBLT 18 2D LBHI 18 22 LBHS/LBCC 18 24 LBEQ 18 27 LBLS 18 23 LBLO/LBCS 18 25 LBCS 18 25 LBMI 18 2B LBVS 18 29 LBEQ 18 27 LBRA 18 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment LBLE 18 2F Signed LBLT 18 2D Signed LBNE 18 26 Signed LBGT 18 2E Signed LBGE 18 2C Signed LBLS 18 23 Unsigned LBLO/LBCS 18 25 Unsigned LBNE 18 26 Unsigned LBHI 18 22 Unsigned LBHS/LBCC 18 24 Unsigned LBCC 18 24 Simple LBPL 18 2A Simple LBVC 18 28 Simple LBNE 18 26 Simple LBRN 18 21 Unconditional
Glossary
LBGE
Operation: Description:
LBGE
For signed twos complement numbers, if (Accumulator) Memory), then branch LBGE can be used to branch after subtracting or comparing signed twos complement values. After CMPA, CMPB, CPD, CPS, CPX, CPY, SBCA, SBCB, SUBA, SUBB, or SUBD, the branch occurs if the CPU register value is greater than or equal to the value in M. After CBA or SBA, the branch occurs if the value in B is greater than or equal to the value in A. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
1. OPPP/OPO indicates this instruction takes four cycles to refill the instruction queue if the branch is taken and three cycles if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode LBGT 18 2E LBGE 18 2C LBEQ 18 27 LBLE 18 2F LBLT 18 2D LBHI 18 22 LBHS/LBCC 18 24 LBEQ 18 27 LBLS 18 23 LBLO/LBCS 18 25 LBCS 18 25 LBMI 18 2B LBVS 18 29 LBEQ 18 27 LBRA 18 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment LBLE 18 2F Signed LBLT 18 2D Signed LBNE 18 26 Signed LBGT 18 2E Signed LBGE 18 2C Signed LBLS 18 23 Unsigned LBLO/LBCS 18 25 Unsigned LBNE 18 26 Unsigned LBHI 18 22 Unsigned LBHS/LBCC 18 24 Unsigned LBCC 18 24 Simple LBPL 18 2A Simple LBVC 18 28 Simple LBNE 18 26 Simple LBRN 18 21 Unconditional
Instruction Glossary
LBGT
Operation: Description:
LBGT
For signed twos complement numbers, If (Accumulator) > (Memory), then branch LBGT can be used to branch after subtracting or comparing signed twos complement values. After CMPA, CMPB, CPD, CPS, CPX, CPY, SBCA, SBCB, SUBA, SUBB, or SUBD, the branch occurs if the CPU register value is greater than or equal to the value in M. After CBA or SBA, the branch occurs if the value in B is greater than or equal to the value in A. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
1. OPPP/OPO indicates this instruction takes four cycles to refill the instruction queue if the branch is taken and three cycles if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode LBGT 18 2E LBGE 18 2C LBEQ 18 27 LBLE 18 2F LBLT 18 2D LBHI 18 22 LBHS/LBCC 18 24 LBEQ 18 27 LBLS 18 23 LBLO/LBCS 18 25 LBCS 18 25 LBMI 18 2B LBVS 18 29 LBEQ 18 27 LBRA 18 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment LBLE 18 2F Signed LBLT 18 2D Signed LBNE 18 26 Signed LBGT 18 2E Signed LBGE 18 2C Signed LBLS 18 23 Unsigned LBLO/LBCS 18 25 Unsigned LBNE 18 26 Unsigned LBHI 18 22 Unsigned LBHS/LBCC 18 24 Unsigned LBCC 18 24 Simple LBPL 18 2A Simple LBVC 18 28 Simple LBNE 18 26 Simple LBRN 18 21 Unconditional
Glossary
LBHI
Operation: Description:
LBHI
For unsigned binary numbers, if (Accumulator) > (Memory), then branch LBHI can be used to branch after subtracting or comparing unsigned values. After CMPA, CMPB, CPD, CPS, CPX, CPY, SBCA, SBCB, SUBA, SUBB, or SUBD, the branch occurs if the CPU register value is greater than the value in M. After CBA or SBA, the branch occurs if the value in B is greater than the value in A. LBHI should not be used for branching after instructions that do not affect the C bit, such as increment, decrement, load, store, test, clear, or complement. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
1. OPPP/OPO indicates this instruction takes four cycles to refill the instruction queue if the branch is taken and three cycles if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode LBGT 18 2E LBGE 18 2C LBEQ 18 27 LBLE 18 2F LBLT 18 2D LBHI 18 22 LBHS/LBCC 18 24 LBEQ 18 27 LBLS 18 23 LBLO/LBCS 18 25 LBCS 18 25 LBMI 18 2B LBVS 18 29 LBEQ 18 27 LBRA 18 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment LBLE 18 2F Signed LBLT 18 2D Signed LBNE 18 26 Signed LBGT 18 2E Signed LBGE 18 2C Signed LBLS 18 23 Unsigned LBLO/LBCS 18 25 Unsigned LBNE 18 26 Unsigned LBHI 18 22 Unsigned LBHS/LBCC 18 24 Unsigned LBCC 18 24 Simple LBPL 18 2A Simple LBVC 18 28 Simple LBNE 18 26 Simple LBRN 18 21 Unconditional
Instruction Glossary
LBHS
Operation: Description:
Long Branch if Higher or Same (Same as LBCC) If C = 0, then (PC) + $0004 + Rel PC
LBHS
For unsigned binary numbers, if (Accumulator) (Memory), then branch LBHS can be used to branch after subtracting or comparing unsigned values. After CMPA, CMPB, CPD, CPS, CPX, CPY, SBCA, SBCB, SUBA, SUBB, or SUBD, the branch occurs if the CPU register value is greater than or equal to the value in M. After CBA or SBA, the branch occurs if the value in B is greater than or equal to the value in A. LBHS should not be used for branching after instructions that do not affect the C bit, such as increment, decrement, load, store, test, clear, or complement. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
1. OPPP/OPO indicates this instruction takes four cycles to refill the instruction queue if the branch is taken and three cycles if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode LBGT 18 2E LBGE 18 2C LBEQ 18 27 LBLE 18 2F LBLT 18 2D LBHI 18 22 LBHS/LBCC 18 24 LBEQ 18 27 LBLS 18 23 LBLO/LBCS 18 25 LBCS 18 25 LBMI 18 2B LBVS 18 29 LBEQ 18 27 LBRA 18 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment LBLE 18 2F Signed LBLT 18 2D Signed LBNE 18 26 Signed LBGT 18 2E Signed LBGE 18 2C Signed LBLS 18 23 Unsigned LBLO/LBCS 18 25 Unsigned LBNE 18 26 Unsigned LBHI 18 22 Unsigned LBHS/LBCC 18 24 Unsigned LBCC 18 24 Simple LBPL 18 2A Simple LBVC 18 28 Simple LBNE 18 26 Simple LBRN 18 21 Unconditional
Glossary
LBLE
Operation: Description:
Long Branch if Less Than or Equal to Zero If Z + (N V) = 1, then (PC) + $0004 + Rel PC
LBLE
For signed twos complement numbers, if (Accumulator) (Memory), then branch. LBLE can be used to branch after subtracting or comparing signed twos complement values. After CMPA, CMPB, CPD, CPS, CPX, CPY, SBCA, SBCB, SUBA, SUBB, or SUBD, the branch occurs if the CPU register value is less than or equal to the value in M. After CBA or SBA, the branch occurs if the value in B is less than or equal to the value in A. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
1. OPPP/OPO indicates this instruction takes four cycles to refill the instruction queue if the branch is taken and three cycles if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode LBGT 18 2E LBGE 18 2C LBEQ 18 27 LBLE 18 2F LBLT 18 2D LBHI 18 22 LBHS/LBCC 18 24 LBEQ 18 27 LBLS 18 23 LBLO/LBCS 18 25 LBCS 18 25 LBMI 18 2B LBVS 18 29 LBEQ 18 27 LBRA 18 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment LBLE 18 2F Signed LBLT 18 2D Signed LBNE 18 26 Signed LBGT 18 2E Signed LBGE 18 2C Signed LBLS 18 23 Unsigned LBLO/LBCS 18 25 Unsigned LBNE 18 26 Unsigned LBHI 18 22 Unsigned LBHS/LBCC 18 24 Unsigned LBCC 18 24 Simple LBPL 18 2A Simple LBVC 18 28 Simple LBNE 18 26 Simple LBRN 18 21 Unconditional
Instruction Glossary
LBLO
Operation: Description:
LBLO
For unsigned binary numbers, if (Accumulator) < (Memory), then branch LBLO can be used to branch after subtracting or comparing unsigned values. After CMPA, CMPB, CPD, CPS, CPX, CPY, SUBA, SUBB, or SUBD, the branch occurs if the CPU register value is less than the value in M. After CBA or SBA, the branch occurs if the value in B is less than the value in A. LBLO should not be used for branching after instructions that do not affect the C bit, such as increment, decrement, load, store, test, clear, or complement. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
1. OPPP/OPO indicates this instruction takes four cycles to refill the instruction queue if the branch is taken and three cycles if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode LBGT 18 2E LBGE 18 2C LBEQ 18 27 LBLE 18 2F LBLT 18 2D LBHI 18 22 LBHS/LBCC 18 24 LBEQ 18 27 LBLS 18 23 LBLO/LBCS 18 25 LBCS 18 25 LBMI 18 2B LBVS 18 29 LBEQ 18 27 LBRA 18 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment LBLE 18 2F Signed LBLT 18 2D Signed LBNE 18 26 Signed LBGT 18 2E Signed LBGE 18 2C Signed LBLS 18 23 Unsigned LBLO/LBCS 18 25 Unsigned LBNE 18 26 Unsigned LBHI 18 22 Unsigned LBHS/LBCC 18 24 Unsigned LBCC 18 24 Simple LBPL 18 2A Simple LBVC 18 28 Simple LBNE 18 26 Simple LBRN 18 21 Unconditional
Glossary
LBLS
Operation: Description:
LBLS
For unsigned binary numbers, if (Accumulator) (Memory), then branch LBLS can be used to branch after subtracting or comparing unsigned values. After CMPA, CMPB, CPD, CPS, CPX, CPY, SBCA, SBCB, SUBA, SUBB, or SUBD, the branch occurs if the CPU register value is less than or equal to the value in M. After CBA or SBA, the branch occurs if the value in B is less than or equal to the value in A. LBLS should not be used for branching after instructions that do not affect the C bit, such as increment, decrement, load, store, test, clear, or complement. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
1. OPPP/OPO indicates this instruction takes four cycles to refill the instruction queue if the branch is taken and three cycles if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode LBGT 18 2E LBGE 18 2C LBEQ 18 27 LBLE 18 2F LBLT 18 2D LBHI 18 22 LBHS/LBCC 18 24 LBEQ 18 27 LBLS 18 23 LBLO/LBCS 18 25 LBCS 18 25 LBMI 18 2B LBVS 18 29 LBEQ 18 27 LBRA 18 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment LBLE 18 2F Signed LBLT 18 2D Signed LBNE 18 26 Signed LBGT 18 2E Signed LBGE 18 2C Signed LBLS 18 23 Unsigned LBLO/LBCS 18 25 Unsigned LBNE 18 26 Unsigned LBHI 18 22 Unsigned LBHS/LBCC 18 24 Unsigned LBCC 18 24 Simple LBPL 18 2A Simple LBVC 18 28 Simple LBNE 18 26 Simple LBRN 18 21 Unconditional
Instruction Glossary
LBLT
Operation: Description:
LBLT
For signed twos complement numbers, if (Accumulator) < (Memory), then branch LBLT can be used to branch after subtracting or comparing signed two-s complement values. After CMPA, CMPB, CPD, CPS, CPX, CPY, SBCA, SBCB, SUBA, SUBB, or SUBD, the branch occurs if the CPU register value is less than the value in M. After CBA or SBA, the branch occurs if the value in B is less than the value in A. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
1. OPPP/OPO indicates this instruction takes four cycles to refill the instruction queue if the branch is taken and three cycles if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode LBGT 18 2E LBGE 18 2C LBEQ 18 27 LBLE 18 2F LBLT 18 2D LBHI 18 22 LBHS/LBCC 18 24 LBEQ 18 27 LBLS 18 23 LBLO/LBCS 18 25 LBCS 18 25 LBMI 18 2B LBVS 18 29 LBEQ 18 27 LBRA 18 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment LBLE 18 2F Signed LBLT 18 2D Signed LBNE 18 26 Signed LBGT 18 2E Signed LBGE 18 2C Signed LBLS 18 23 Unsigned LBLO/LBCS 18 25 Unsigned LBNE 18 26 Unsigned LBHI 18 22 Unsigned LBHS/LBCC 18 24 Unsigned LBCC 18 24 Simple LBPL 18 2A Simple LBVC 18 28 Simple LBNE 18 26 Simple LBRN 18 21 Unconditional
Glossary
LBMI
Operation: Simple branch Description:
LBMI
Tests the N status bit and branches if N = 1. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
1. OPPP/OPO indicates this instruction takes four cycles to refill the instruction queue if the branch is taken and three cycles if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode LBGT 18 2E LBGE 18 2C LBEQ 18 27 LBLE 18 2F LBLT 18 2D LBHI 18 22 LBHS/LBCC 18 24 LBEQ 18 27 LBLS 18 23 LBLO/LBCS 18 25 LBCS 18 25 LBMI 18 2B LBVS 18 29 LBEQ 18 27 LBRA 18 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment LBLE 18 2F Signed LBLT 18 2D Signed LBNE 18 26 Signed LBGT 18 2E Signed LBGE 18 2C Signed LBLS 18 23 Unsigned LBLO/LBCS 18 25 Unsigned LBNE 18 26 Unsigned LBHI 18 22 Unsigned LBHS/LBCC 18 24 Unsigned LBCC 18 24 Simple LBPL 18 2A Simple LBVC 18 28 Simple LBNE 18 26 Simple LBRN 18 21 Unconditional
Instruction Glossary
LBNE
Operation: Description:
Long Branch if Not Equal to Zero If Z = 0, then (PC) + $0004 + Rel PC Simple branch Tests the Z status bit and branches if Z = 0.
LBNE
CCR Details:
1. OPPP/OPO indicates this instruction takes four cycles to refill the instruction queue if the branch is taken and three cycles if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode LBGT 18 2E LBGE 18 2C LBEQ 18 27 LBLE 18 2F LBLT 18 2D LBHI 18 22 LBHS/LBCC 18 24 LBEQ 18 27 LBLS 18 23 LBLO/LBCS 18 25 LBCS 18 25 LBMI 18 2B LBVS 18 29 LBEQ 18 27 LBRA 18 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment LBLE 18 2F Signed LBLT 18 2D Signed LBNE 18 26 Signed LBGT 18 2E Signed LBGE 18 2C Signed LBLS 18 23 Unsigned LBLO/LBCS 18 25 Unsigned LBNE 18 26 Unsigned LBHI 18 22 Unsigned LBHS/LBCC 18 24 Unsigned LBCC 18 24 Simple LBPL 18 2A Simple LBVC 18 28 Simple LBNE 18 26 Simple LBRN 18 21 Unconditional
Glossary
LBPL
Operation: Simple branch Description:
LBPL
Tests the N status bit and branches if N = 0. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
1. OPPP/OPO indicates this instruction takes four cycles to refill the instruction queue if the branch is taken and three cycles if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode LBGT 18 2E LBGE 18 2C LBEQ 18 27 LBLE 18 2F LBLT 18 2D LBHI 18 22 LBHS/LBCC 18 24 LBEQ 18 27 LBLS 18 23 LBLO/LBCS 18 25 LBCS 18 25 LBMI 18 2B LBVS 18 29 LBEQ 18 27 LBRA 18 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment LBLE 18 2F Signed LBLT 18 2D Signed LBNE 18 26 Signed LBGT 18 2E Signed LBGE 18 2C Signed LBLS 18 23 Unsigned LBLO/LBCS 18 25 Unsigned LBNE 18 26 Unsigned LBHI 18 22 Unsigned LBHS/LBCC 18 24 Unsigned LBCC 18 24 Simple LBPL 18 2A Simple LBVC 18 28 Simple LBNE 18 26 Simple LBRN 18 21 Unconditional
Instruction Glossary
LBRA
Operation: Description:
LBRA
Unconditional branch to an address calculated as shown in the expression. Rel is a relative offset stored as a twos complement number in the second and third bytes of machine code corresponding to the long branch instruction. Execution time is longer when a conditional branch is taken than when it is not, because the instruction queue must be refilled before execution resumes at the new address. Since the LBRA branch condition is always satisfied, the branch is always taken, and the instruction queue must always be refilled, so execution time is always the larger value. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
Glossary
LBRN
Operation: Description:
LBRN
Never branches. LBRN is effectively a 4-byte NOP that requires three cycles to execute. LBRN is included in the instruction set to provide a complement to the LBRA instruction. The instruction is useful during program debug, to negate the effect of another branch instruction without disturbing the offset byte. A complement for LBRA is also useful in compiler implementations. Execution time is longer when a conditional branch is taken than when it is not, because the instruction queue must be refilled before execution resumes at the new address. Since the LBRN branch condition is never satisfied, the branch is never taken, and the queue does not need to be refilled, so execution time is always the smaller value.
S X H I N Z V C
CCR Details:
Instruction Glossary
LBVC
Operation: Description:
Long Branch if Overflow Cleared If V = 0, then (PC) + $0004 + Rel PC Simple branch Tests the V status bit and branches if V = 0.
LBVC
LBVC causes a branch when a previous operation on twos complement binary values does not cause an overflow. That is, when LBVC follows a twos complement operation, a branch occurs when the result of the operation is valid. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
1. OPPP/OPO indicates this instruction takes four cycles to refill the instruction queue if the branch is taken and three cycles if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode LBGT 18 2E LBGE 18 2C LBEQ 18 27 LBLE 18 2F LBLT 18 2D LBHI 18 22 LBHS/LBCC 18 24 LBEQ 18 27 LBLS 18 23 LBLO/LBCS 18 25 LBCS 18 25 LBMI 18 2B LBVS 18 29 LBEQ 18 27 LBRA 18 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment LBLE 18 2F Signed LBLT 18 2D Signed LBNE 18 26 Signed LBGT 18 2E Signed LBGE 18 2C Signed LBLS 18 23 Unsigned LBLO/LBCS 18 25 Unsigned LBNE 18 26 Unsigned LBHI 18 22 Unsigned LBHS/LBCC 18 24 Unsigned LBCC 18 24 Simple LBPL 18 2A Simple LBVC 18 28 Simple LBNE 18 26 Simple LBRN 18 21 Unconditional
Glossary
LBVS
Operation: Description:
Long Branch if Overflow Set If V = 1, then (PC) + $0004 + Rel PC Simple branch Tests the V status bit and branches if V = 1.
LBVS
LBVS causes a branch when a previous operation on twos complement binary values causes an overflow. That is, when LBVS follows a twos complement operation, a branch occurs when the result of the operation is invalid. See 3.8 Relative Addressing Mode for details of branch execution.
S X H I N Z V C
CCR Details:
1. OPPP/OPO indicates this instruction takes four cycles to refill the instruction queue if the branch is taken and three cycles if the branch is not taken.
Test r>m rm r=m rm r<m r>m rm r=m rm r<m Carry Negative Overflow r=0 Always
Branch Mnemonic Opcode LBGT 18 2E LBGE 18 2C LBEQ 18 27 LBLE 18 2F LBLT 18 2D LBHI 18 22 LBHS/LBCC 18 24 LBEQ 18 27 LBLS 18 23 LBLO/LBCS 18 25 LBCS 18 25 LBMI 18 2B LBVS 18 29 LBEQ 18 27 LBRA 18 20
Boolean Test Z + (N V) = 0 rm NV=0 r<m Z=1 rm Z + (N V) = 1 r>m NV=1 rm C+Z=0 rm C=0 r<m Z=1 rm C+Z=1 r>m C=1 rm C=1 No Carry N=1 Plus V=1 No Overflow Z=1 r0 Never
Complementary Branch Mnemonic Opcode Comment LBLE 18 2F Signed LBLT 18 2D Signed LBNE 18 26 Signed LBGT 18 2E Signed LBGE 18 2C Signed LBLS 18 23 Unsigned LBLO/LBCS 18 25 Unsigned LBNE 18 26 Unsigned LBHI 18 22 Unsigned LBHS/LBCC 18 24 Unsigned LBCC 18 24 Simple LBPL 18 2A Simple LBVC 18 28 Simple LBNE 18 26 Simple LBRN 18 21 Unconditional
Instruction Glossary
LDAA
Operation: Description: (M) A
Load Accumulator A
LDAA
Loads the content of memory location M into accumulator A. The condition codes are set according to the data.
S X H I N Z V 0 C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: 0; cleared
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 86 96 B6 A6 A6 A6 A6 A6 ii dd hh xb xb xb xb xb P rPf rPO rPf rPO frPP fIfrPf fIPrPf M68HC12 P rfP rOP rfP rPO frPP fIfrfP fIPrfP
Source Form LDAA #opr8i LDAA opr8a LDAA opr16a LDAA oprx0_xysp LDAA oprx9,xysp LDAA oprx16,xysp LDAA [D,xysp] LDAA [oprx16,xysp]
ll ff ee ff ee ff
Glossary
LDAB
Operation: Description: (M) B
Load Accumulator B
LDAB
Loads the content of memory location M into accumulator B. The condition codes are set according to the data.
S X H I N Z V 0 C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: 0; cleared
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 C6 D6 F6 E6 E6 E6 E6 E6 ii dd hh xb xb xb xb xb P rPf rPO rPf rPO frPP fIfrPf fIPrPf M68HC12 P rfP rOP rfP rPO frPP fIfrfP fIPrfP
Source Form LDAB #opr8i LDAB opr8a LDAB opr16a LDAB oprx0_xysp LDAB oprx9,xysp LDAB oprx16,xysp LDAB [D,xysp] LDAB [oprx16,xysp]
ll ff ee ff ee ff
Instruction Glossary
LDD
Operation: Description:
LDD
Loads the contents of memory locations M and M+1 into double accumulator D. The condition codes are set according to the data. The information from M is loaded into accumulator A, and the information from M+1 is loaded into accumulator B.
S X H I N Z V 0 C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $0000; cleared otherwise V: 0; cleared
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 CC DC FC EC EC EC EC EC jj dd hh xb xb xb xb xb kk ll ff ee ff ee ff PO RPf RPO RPf RPO fRPP fIfRPf fIPRPf M68HC12 OP RfP ROP RfP RPO fRPP fIfRfP fIPRfP
Source Form LDD #opr16i LDD opr8a LDD opr16a LDD oprx0_xysp LDD oprx9,xysp LDD oprx16,xysp LDD [D,xysp] LDD [oprx16,xysp]
Glossary
LDS
Operation: Description: (M : M+1) SP
LDS
Loads the most significant byte of the SP with the content of memory location M, and loads the least significant byte of the SP with the content of the next byte of memory at M+1.
S X H I N Z V 0 C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $0000; cleared otherwise V: 0; cleared
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 CF DF FF EF EF EF EF EF jj dd hh xb xb xb xb xb kk ll ff ee ff ee ff PO RPf RPO RPf RPO fRPP fIfRPf fIPRPf M68HC12 OP RfP ROP RfP RPO fRPP fIfRfP fIPRfP
Source Form LDS #opr16i LDS opr8a LDS opr16a LDS oprx0_xysp LDS oprx9,xysp LDS oprx16,xysp LDS [D,xysp] LDS [oprx16,xysp]
Instruction Glossary
LDX
Operation: Description: (M : M+1) X
LDX
Loads the most significant byte of index register X with the content of memory location M, and loads the least significant byte of X with the content of the next byte of memory at M+1.
S X H I N Z V 0 C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $0000; cleared otherwise V: 0; cleared
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 CE DE FE EE EE EE EE EE jj dd hh xb xb xb xb xb kk ll ff ee ff ee ff PO RPf RPO RPf RPO fRPP fIfRPf fIPRPf M68HC12 OP RfP ROP RfP RPO fRPP fIfRfP fIPRfP
Source Form LDX #opr16i LDX opr8a LDX opr16a LDX oprx0_xysp LDX oprx9,xysp LDX oprx16,xysp LDX [D,xysp] LDX [oprx16,xysp]
Glossary
LDY
Operation: Description: (M : M+1) Y
LDY
Loads the most significant byte of index register Y with the content of memory location M, and loads the least significant byte of Y with the content of the next memory location at M+1.
S X H I N Z V 0 C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $0000; cleared otherwise V: 0; cleared
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 CD DD FD ED ED ED ED ED jj dd hh xb xb xb xb xb kk ll ff ee ff ee ff PO RPf RPO RPf RPO fRPP fIfRPf fIPRPf M68HC12 OP RfP ROP RfP RPO fRPP fIfRfP fIPRfP
Source Form LDY #opr16i LDY opr8a LDY opr16a LDY oprx0_xysp LDY oprx9,xysp LDY oprx16,xysp LDY [D,xysp] LDY [oprx16,xysp]
Instruction Glossary
LEAS
Operation: Description:
LEAS
Loads the stack pointer with an effective address specified by the program. The effective address can be any indexed addressing mode operand address except an indirect address. Indexed addressing mode operand addresses are formed by adding an optional constant supplied by the program or an accumulator value to the current value in X, Y, SP, or PC. See 3.9 Indexed Addressing Modes for more details. LEAS does not alter condition code bits. This allows stack modification without disturbing CCR bits changed by recent arithmetic operations. Operation is a bit more complex when LEAS is used with auto-increment or auto-decrement operand specifications and the SP is the referenced index register. The index register is loaded with what would have gone out to the address bus in the case of a load index instruction. In the case of a pre-increment or pre-decrement, the modification is made before the index register is loaded. In the case of a post-increment or post-decrement, modification would have taken effect after the address went out on the address bus, so post-modification does not affect the content of the index register. In the unusual case where LEAS involves two different index registers and post-increment or post-decrement, both index registers are modified as demonstrated by the following example. Consider the instruction LEAS 4,Y+. First S is loaded with the value of Y, then Y is incremented by 4.
S X H I N Z V C
CCR Details:
1. Due to internal M68HC12 CPU requirements, the program word fetch is performed twice to the same address during this instruction.
Glossary
LEAX
Operation: Description:
LEAX
Loads index register X with an effective address specified by the program. The effective address can be any indexed addressing mode operand address except an indirect address. Indexed addressing mode operand addresses are formed by adding an optional constant supplied by the program or an accumulator value to the current value in X, Y, SP, or PC. See 3.9 Indexed Addressing Modes for more details. Operation is a bit more complex when LEAX is used with auto-increment or auto-decrement operand specifications and index register X is the referenced index register. The index register is loaded with what would have gone out to the address bus in the case of a load indexed instruction. In the case of a pre-increment or pre-decrement, the modification is made before the index register is loaded. In the case of a post-increment or post-decrement, modification would have taken effect after the address went out on the address bus, so post-modification does not affect the content of the index register. In the unusual case where LEAX involves two different index registers and post-increment and post-decrement, both index registers are modified as demonstrated by the following example. Consider the instruction LEAX 4,Y+. First X is loaded with the value of Y, then Y is incremented by 4.
S X H I N Z V C
CCR Details:
1. Due to internal M68HC12 CPU requirements, the program word fetch is performed twice to the same address during this instruction.
Instruction Glossary
LEAY
Operation: Description:
LEAY
Loads index register Y with an effective address specified by the program. The effective address can be any indexed addressing mode operand address except an indirect address. Indexed addressing mode operand addresses are formed by adding an optional constant supplied by the program or an accumulator value to the current value in X, Y, SP, or PC. See 3.9 Indexed Addressing Modes for more details. Operation is a bit more complex when LEAY is used with auto-increment or auto-decrement operand specifications and index register Y is the referenced index register. The index register is loaded with what would have gone out to the address bus in the case of a load indexed instruction. In the case of a pre-increment or pre-decrement, the modification is made before the index register is loaded. In the case of a post-increment or post-decrement, modification would have taken effect after the address went out on the address bus, so post-modification does not affect the content of the index register. In the unusual case where LEAY involves two different index registers and post-increment and post-decrement, both index registers are modified as demonstrated by the following example. Consider the instruction LEAY 4,X+. First Y is loaded with the value of X, then X is incremented by 4.
S X H I N Z V C
CCR Details:
1. Due to internal M68HC12 CPU requirements, the program word fetch is performed twice to the same address during this instruction.
Glossary
LSL
Operation: C Description:
LSL
0
b7 b0
Shifts all bits of the memory location M one place to the left. Bit 0 is loaded with 0. The C status bit is loaded from the most significant bit of M.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: N C = [N C] + [N C] (for N and C after the shift) Set if (N is set and C is cleared) or (N is cleared and C is set); cleared otherwise (for values of N and C after the shift) C: M7 Set if the LSB of M was set before the shift; cleared otherwise
Address Mode EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 78 68 68 68 68 68 hh xb xb xb xb xb ll ff ee ff ee ff rPwO rPw rPwO frPwP fIfrPw fIPrPw M68HC12 rOPw rPw rPOw frPPw fIfrPw fIPrPw
Source Form LSL opr16a LSL oprx0_xysp LSL oprx9,xysp LSL oprx16,xysp LSL [D,xysp] LSL [oprx16,xysp]
Instruction Glossary
LSLA
Operation: C Description:
LSLA
0
b7 b0
Shifts all bits of accumulator A one place to the left. Bit 0 is loaded with 0. The C status bit is loaded from the most significant bit of A.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: N C = [N C] + [N C] (for N and C after the shift) Set if (N is set and C is cleared) or (N is cleared and C is set); cleared otherwise (for values of N and C after the shift) C: A7 Set if the LSB of A was set before the shift; cleared otherwise
Address Mode INH Access Detail Object Code HCS12 48 O M68HC12 O
Glossary
LSLB
Operation: C Description:
LSLB
0
b7 b0
Shifts all bits of accumulator B one place to the left. Bit 0 is loaded with 0. The C status bit is loaded from the most significant bit of B.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: N C = [N C] + [N C] (for N and C after the shift) Set if (N is set and C is cleared) or (N is cleared and C is set); cleared otherwise (for values of N and C after the shift) C: B7 Set if the LSB of B was set before the shift; cleared otherwise
Address Mode INH Access Detail Object Code HCS12 58 O M68HC12 O
Instruction Glossary
LSLD
Operation:
C
LSLD
b7 b0 Accumulator B 0
b7 b0 Accumulator A
Description:
Shifts all bits of double accumulator D one place to the left. Bit 0 is loaded with 0. The C status bit is loaded from the most significant bit of accumulator A.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $0000; cleared otherwise V: N C = [N C] + [N C] (for N and C after the shift) Set if (N is set and C is cleared) or (N is cleared and C is set); cleared otherwise (for values of N and C after the shift) C: D15 Set if the MSB of D was set before the shift; cleared otherwise
Address Mode INH Access Detail Object Code HCS12 59 O M68HC12 O
Glossary
LSR
Operation: 0 Description:
LSR
C
b7 b0
Shifts all bits of memory location M one place to the right. Bit 7 is loaded with 0. The C status bit is loaded from the least significant bit of M.
S X H I N 0 Z V C
CCR Details:
N: 0; cleared Z: Set if result is $00; cleared otherwise V: N C = [N C] + [N C] (for N and C after the shift) Set if (N is set and C is cleared) or (N is cleared and C is set); cleared otherwise (for values of N and C after the shift) C: M0 Set if the LSB of M was set before the shift; cleared otherwise
Address Mode EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 74 64 64 64 64 64 hh xb xb xb xb xb ll ff ee ff ee ff rPwO rPw rPwO frPwP fIfrPw fIPrPw M68HC12 rOPw rPw rPOw frPPw fIfrPw fIPrPw
Source Form LSR opr16a LSR oprx0_xysp LSR oprx9,xysp LSR oprx16,xysp LSR [D,xysp] LSR [oprx16,xysp]
Instruction Glossary
LSRA
Operation: 0 Description:
LSRA
C
b7 b0
Shifts all bits of accumulator A one place to the right. Bit 7 is loaded with 0. The C status bit is loaded from the least significant bit of A.
S X H I N 0 Z V C
C
CCR Details:
N: 0; cleared Z: Set if result is $00; cleared otherwise V: N C = [N C] + [N C] (for N and C after the shift) Set if (N is set and C is cleared) or (N is cleared and C is set); cleared otherwise (for values of N and C after the shift) C: A0 Set if the LSB of A was set before the shift; cleared otherwise
Address Mode INH Access Detail Object Code HCS12 44 O M68HC12 O
Glossary
LSRB
Operation: 0 Description:
LSRB
C
b7 b0
Shifts all bits of accumulator B one place to the right. Bit 7 is loaded with 0. The C status bit is loaded from the least significant bit of B.
S X H I N 0 Z V C
CCR Details:
N: 0; cleared Z: Set if result is $00; cleared otherwise V: N C = [N C] + [N C] (for N and C after the shift) Set if (N is set and C is cleared) or (N is cleared and C is set); cleared otherwise (for values of N and C after the shift) C: B0 Set if the LSB of B was set before the shift; cleared otherwise
Address Mode INH Access Detail Object Code HCS12 54 O M68HC12 O
Instruction Glossary
LSRD
Operation:
0
LSRD
C
Accumulator B
b7 b0
Accumulator A
b7 b0
Description:
Shifts all bits of double accumulator D one place to the right. D15 (MSB of A) is loaded with 0. The C status bit is loaded from D0 (LSB of B).
S X H I N 0 Z V C
CCR Details:
N: 0; cleared Z: Set if result is $0000; cleared otherwise V: D0 Set if, after the shift operation, C is set; cleared otherwise C: D0 Set if the LSB of D was set before the shift; cleared otherwise
Address Mode INH Access Detail Object Code HCS12 49 O M68HC12 O
Glossary
MAXA
Operation: Description:
Place Larger of Two Unsigned 8-Bit Values in Accumulator A MAX ((A), (M)) A
MAXA
Subtracts an unsigned 8-bit value in memory from an unsigned 8-bit value in accumulator A to determine which is larger and leaves the larger of the two values in A. The Z status bit is set when the result of the subtraction is zero (the values are equal), and the C status bit is set when the subtraction requires a borrow (the value in memory is larger than the value in the accumulator). When C = 1, the value in A has been replaced by the value in memory. The unsigned value in memory is accessed by means of indexed addressing modes, which allow a great deal of flexibility in specifying the address of the operand. Auto increment/decrement variations of indexed addressing facilitate finding the largest value in a list of values.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: A7 M7 R7 + A7 M7 R7 Set if a twos complement overflow resulted from the operation; cleared otherwise C: A7 M7 + M7 R7 + R7 A7 Set if the value of the content of memory is larger than the value of the accumulator; cleared otherwise Condition codes reflect internal subtraction (R = A M)
Address Mode IDX IDX1 IDX2 [D,IDX] [IDX2] 18 18 18 18 18 Access Detail Object Code HCS12 18 18 18 18 18 xb xb ff xb ee ff xb xb ee ff OrPf OrPO OfrPP OfIfrPf OfIPrPf M68HC12 OrfP OrPO OfrPP OfIfrfP OfIPrfP
Source Form MAXA oprx0_xysp MAXA oprx9,xysp MAXA oprx16,xysp MAXA [D,xysp] MAXA [oprx16,xysp]
Instruction Glossary
MAXM
Operation: Description:
MAXM
MAX ((A), (M)) M Subtracts an unsigned 8-bit value in memory from an unsigned 8-bit value in accumulator A to determine which is larger and leaves the larger of the two values in the memory location. The Z status bit is set when the result of the subtraction is zero (the values are equal), and the C status bit is set when the subtraction requires a borrow (the value in memory is larger than the value in the accumulator). When C = 0, the value in accumulator A has replaced the value in memory. The unsigned value in memory is accessed by means of indexed addressing modes, which allow a great deal of flexibility in specifying the address of the operand.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: A7 M7 R7 + A7 M7 R7 Set if a twos complement overflow resulted from the operation; cleared otherwise C: A7 M7 + M7 R7 + R7 A7 Set if the value of the content of memory is larger than the value of the accumulator; cleared otherwise Condition codes reflect internal subtraction (R = A M)
Address Mode IDX IDX1 IDX2 [D,IDX] [IDX2] 18 18 18 18 18 Access Detail Object Code HCS12 1C 1C 1C 1C 1C xb xb ff xb ee ff xb xb ee ff OrPw OrPwO OfrPwP OfIfrPw OfIPrPw M68HC12 OrPw OrPwO OfrPwP OfIfrPw OfIPrPw
Source Form MAXM oprx0_xysp MAXM oprx9,xysp MAXM oprx16,xysp MAXM [D,xysp] MAXM [oprx16,xysp]
Glossary
MEM
Operation: Description:
Determine Grade of Membership (Fuzzy Logic) Grade of Membership M(Y) (Y) + $0001 Y (X) + $0004 X
MEM
Before executing MEM, initialize A, X, and Y. Load A with the current crisp value of a system input variable. Load Y with the fuzzy input RAM location where the grade of membership is to be stored. Load X with the first address of a 4-byte data structure that describes a trapezoidal membership function. The data structure consists of: Point_1 The x-axis starting point for the leading side (at MX) Point_2 The x-axis position of the rightmost point (at MX+1) Slope_1 The slope of the leading side (at MX+2) Slope_2 The slope of the trailing side (at MX+3); the right side slopes up and to the left from point_2
A slope_1 or slope_2 value of $00 is a special case in which the membership function either starts with a grade of $FF at input = point_1, or ends with a grade of $FF at input = point_2 (infinite slope). During execution, the value of A remains unchanged. X is incremented by four and Y is incremented by one.
S X H ? I N ? Z ? V ? C ?
CCR Details:
Instruction Glossary
MINA
Operation: Description:
Place Smaller of Two Unsigned 8-Bit Values in Accumulator A MIN ((A), (M)) A
MINA
Subtracts an unsigned 8-bit value in memory from an unsigned 8-bit value in accumulator A to determine which is larger, and leaves the smaller of the two values in accumulator A. The Z status bit is set when the result of the subtraction is zero (the values are equal), and the C status bit is set when the subtraction requires a borrow (the value in memory is larger than the value in the accumulator). When C = 0, the value in accumulator A has been replaced by the value in memory. The unsigned value in memory is accessed by means of indexed addressing modes, which allow a great deal of flexibility in specifying the address of the operand. Auto increment/decrement variations of indexed addressing facilitate finding the smallest value in a list of values.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: A7 M7 R7 + A7 M7 R7 Set if a twos complement overflow resulted from the operation; cleared otherwise C: A7 M7 + M7 R7 + R7 A7 Set if the value of the content of memory is larger than the value of the accumulator; cleared otherwise Condition codes reflect internal subtraction (R = A M)
Address Mode IDX IDX1 IDX2 [D,IDX] [IDX2] 18 18 18 18 18 Access Detail Object Code HCS12 19 19 19 19 19 xb xb ff xb ee ff xb xb ee ff OrPf OrPO OfrPP OfIfrPf OfIPrPf M68HC12 OrfP OrPO OfrPP OfIfrfP OfIPrfP
Source Form MINA oprx0_xysp MINA oprx9,xysp MINA oprx16,xysp MINA [D,xysp] MINA [oprx16,xysp]
Glossary
MINM
Operation: Description:
Place Smaller of Two Unsigned 8-Bit Values in Memory MIN ((A), (M)) M
MINM
Subtracts an unsigned 8-bit value in memory from an unsigned 8-bit value in accumulator A to determine which is larger and leaves the smaller of the two values in the memory location. The Z status bit is set when the result of the subtraction is zero (the values are equal), and the C status bit is set when the subtraction requires a borrow (the value in memory is larger than the value in the accumulator). When C = 1, the value in accumulator A has replaced the value in memory. The unsigned value in memory is accessed by means of indexed addressing modes, which allow a great deal of flexibility in specifying the address of the operand.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: A7 M7 R7 + A7 M7 R7 Set if a twos complement overflow resulted from the operation; cleared otherwise C: A7 M7 + M7 R7 + R7 A7 Set if the value of the content of memory is larger than the value of the accumulator; cleared otherwise Condition codes reflect internal subtraction (R = A M)
Address Mode IDX IDX1 IDX2 [D,IDX] [IDX2] 18 18 18 18 18 Access Detail Object Code HCS12 1D 1D 1D 1D 1D xb xb ff xb ee ff xb xb ee ff OrPw OrPwO OfrPwP OfIfrPw OfIPrPw M68HC12 OrPw OrPwO OfrPwP OfIfrPw OfIPrPw
Source Form MINM oprx0_xysp MINM oprx9,xysp MINM oprx16,xysp MINM [D,xysp] MINM [oprx16,xysp]
Instruction Glossary
MOVB
Operation: Description:
MOVB
(M1) M2 Moves the content of one memory location to another memory location. The content of the source memory location is not changed. Move instructions use separate addressing modes to access the source and destination of a move. The following combinations of addressing modes are supported: IMMEXT, IMMIDX, EXTEXT, EXTIDX, IDXEXT, and IDXIDX. IDX operands allow indexed addressing mode specifications that fit in a single postbyte including 5-bit constant, accumulator offsets, and auto increment/decrement modes. Nine-bit and 16-bit constant offsets would require additional extension bytes and are not allowed. Indexed indirect modes (for example [D,r]) are also not allowed. There are special considerations when using PC-relative addressing with move instructions. These are discussed in 3.10 Instructions Using Multiple Modes.
S X H I N Z V C
CCR Details:
Source Form(1) MOVB #opr8, opr16a MOVB #opr8i, oprx0_xysp MOVB opr16a, opr16a MOVB opr16a, oprx0_xysp MOVB oprx0_xysp, opr16a MOVB oprx0_xysp, oprx0_xysp
Access Detail Object Code HCS12 0B 08 0C 09 0D 0A ii xb hh xb xb xb hh ii ll hh hh xb ll hh ll ll ll OPwP OPwO OrPwPO OPrPw OrPwP OrPwO M68HC12 OPwP OPwO OrPwPO OPrPw OrPwP OrPwO
1. The first operand in the source code statement specifies the source for the move.
Glossary
MOVW
Operation: Description:
MOVW
(M : M + 11) M : M + 12 Moves the content of one 16-bit location in memory to another 16-bit location in memory. The content of the source memory location is not changed. Move instructions use separate addressing modes to access the source and destination of a move. The following combinations of addressing modes are supported: IMMEXT, IMMIDX, EXTEXT, EXTIDX, IDXEXT, and IDXIDX. IDX operands allow indexed addressing mode specifications that fit in a single postbyte including 5-bit constant, accumulator offsets, and auto increment/decrement modes. Nine-bit and 16-bit constant offsets would require additional extension bytes and are not allowed. Indexed indirect modes (for example [D,r]) are also not allowed. There are special considerations when using PC-relative addressing with move instructions. These are discussed in 3.10 Instructions Using Multiple Modes.
S X H I N Z V C
CCR Details:
Source Form(1) MOVW #opr16i, opr16a MOVW #opr16i, oprx0_xysp MOVW opr16a, opr16a MOVW opr16a, oprx0_xysp MOVW oprx0_xysp, opr16a MOVW oprx0_xysp, oprx0_xysp
Access Detail Object Code HCS12 03 00 04 01 05 02 jj xb hh xb xb xb kk jj ll hh hh xb hh ll kk hh ll ll ll OPWPO OPPW ORPWPO OPRPW ORPWP ORPWO M68HC12 OPWPO OPPW ORPWPO OPRPW ORPWP ORPWO
1. The first operand in the source code statement specifies the source for the move.
Instruction Glossary
MUL
Operation: Description:
MUL
Multiplies the 8-bit unsigned binary value in accumulator A by the 8-bit unsigned binary value in accumulator B and places the 16-bit unsigned result in double accumulator D. The carry flag allows rounding the most significant byte of the result through the sequence MUL, ADCA #0.
S X H I N Z V C
CCR Details:
Glossary
NEG
Operation: Description:
NEG
Replaces the content of memory location M with its twos complement (the value $80 is left unchanged).
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise. Z: Set if result is $00; cleared otherwise. V: R7 R6 R5 R4 R3 R2 R1 R0 Set if there is a twos complement overflow from the implied subtraction from zero; cleared otherwise. Twos complement overflow occurs if and only if (M) = $80 C: R7 + R6 + R5 + R4 + R3 + R2 + R1 + R0 Set if there is a borrow in the implied subtraction from zero; cleared otherwise. Set in all cases except when (M) = $00.
Address Mode EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 70 60 60 60 60 60 hh xb xb xb xb xb ll ff ee ff ee ff rPwO rPw rPwO frPwP fIfrPw fIPrPw M68HC12 rOPw rPw rPOw frPPw fIfrPw fIPrPw
Source Form NEG opr16a NEG oprx0_xysp NEG oprx9,xysp NEG oprx16,xysp NEG [D,xysp] NEG [oprx16,xysp]
Instruction Glossary
NEGA
Operation: Description: 0 (A) = (A) + 1 A
Negate A
NEGA
Replaces the content of accumulator A with its twos complement (the value $80 is left unchanged).
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: R7 R6 R5 R4 R3 R2 R1 R0 Set if there is a twos complement overflow from the implied subtraction from zero; cleared otherwise Twos complement overflow occurs if and only if (A) = $80 C: R7 + R6 + R5 + R4 + R3 + R2 + R1 + R0 Set if there is a borrow in the implied subtraction from zero; cleared otherwise Set in all cases except when (A) = $00
Address Mode INH Access Detail Object Code HCS12 40 O M68HC12 O
Glossary
NEGB
Operation: Description: 0 (B) = (B) + 1 B
Negate B
NEGB
Replaces the content of accumulator B with its twos complement (the value $80 is left unchanged).
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: R7 R6 R5 R4 R3 R2 R1 R0 Set if there is a twos complement overflow from the implied subtraction from zero; cleared otherwise Twos complement overflow occurs if and only if (B) = $80 C: R7 + R6 + R5 + R4 + R3 + R2 + R1 + R0 Set if there is a borrow in the implied subtraction from zero; cleared otherwise Set in all cases except when (B) = $00
Address Mode INH Access Detail Object Code HCS12 50 O M68HC12 O
Instruction Glossary
NOP
Operation: Description: No operation
Null Operation
NOP
This single-byte instruction increments the PC and does nothing else. No other CPU registers are affected. NOP is typically used to produce a time delay, although some software disciplines discourage CPU frequency-based time delays. During debug, NOP instructions are sometimes used to temporarily replace other machine code instructions, thus disabling the replaced instruction(s).
S X H I N Z V C
CCR Details:
Glossary
ORAA
Operation: Description: (A) + (M) A
Inclusive OR A
ORAA
Performs bitwise logical inclusive OR between the content of accumulator A and the content of memory location M and places the result in A. Each bit of A after the operation is the logical inclusive OR of the corresponding bits of M and of A before the operation.
S X H I N Z V 0 C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: 0; cleared
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 8A 9A BA AA AA AA AA AA ii dd hh xb xb xb xb xb P rPf rPO rPf rPO frPP fIfrPf fIPrPf M68HC12 P rfP rOP rfP rPO frPP fIfrfP fIPrfP
Source Form ORAA #opr8i ORAA opr8a ORAA opr16a ORAA oprx0_xysp ORAA oprx9,xysp ORAA oprx16,xysp ORAA [D,xysp] ORAA [oprx16,xysp]
ll ff ee ff ee ff
Instruction Glossary
ORAB
Operation: Description: (B) + (M) B
Inclusive OR B
ORAB
Performs bitwise logical inclusive OR between the content of accumulator B and the content of memory location M. The result is placed in B. Each bit of B after the operation is the logical inclusive OR of the corresponding bits of M and of B before the operation.
S X H I N Z V 0 C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: 0; cleared
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 CA DA FA EA EA EA EA EA ii dd hh xb xb xb xb xb P rPf rPO rPf rPO frPP fIfrPf fIPrPf M68HC12 P rfP rOP rfP rPO frPP fIfrfP fIPrfP
Source Form ORAB #opr8i ORAB opr8a ORAB opr16a ORAB oprx0_xysp ORAB oprx9,xysp ORAB oprx16,xysp ORAB [D,xysp] ORAB [oprx16,xysp]
ll ff ee ff ee ff
Glossary
ORCC
Operation: Description:
ORCC
Performs bitwise logical inclusive OR between the content of memory location M and the content of the CCR and places the result in the CCR. Each bit of the CCR after the operation is the logical OR of the corresponding bits of M and of CCR before the operation. To set one or more bits, set the corresponding bit of the mask equal to 1. Bits corresponding to 0s in the mask are not changed by the ORCC operation.
S X H I N Z V C
CCR Details:
Condition code bits are set if the corresponding bit was 1 before the operation or if the corresponding bit in the instruction-provided mask is 1. The X interrupt mask cannot be set by any software instruction.
Address Mode IMM Access Detail Object Code HCS12 14 ii P M68HC12 P
Instruction Glossary
PSHA
Operation: Description:
PSHA
Stacks the content of accumulator A. The stack pointer is decremented by one. The content of A is then stored at the address the SP points to. Push instructions are commonly used to save the contents of one or more CPU registers at the start of a subroutine. Complementary pull instructions can be used to restore the saved CPU registers just before returning from the subroutine.
S X H I N Z V C
CCR Details:
Glossary
PSHB
Operation: Description:
PSHB
Stacks the content of accumulator B. The stack pointer is decremented by one. The content of B is then stored at the address the SP points to. Push instructions are commonly used to save the contents of one or more CPU registers at the start of a subroutine. Complementary pull instructions can be used to restore the saved CPU registers just before returning from the subroutine.
S X H I N Z V C
CCR Details:
Instruction Glossary
PSHC
Operation: Description:
PSHC
Stacks the content of the condition codes register. The stack pointer is decremented by one. The content of the CCR is then stored at the address to which the SP points. Push instructions are commonly used to save the contents of one or more CPU registers at the start of a subroutine. Complementary pull instructions can be used to restore the saved CPU registers just before returning from the subroutine.
S X H I N Z V C
CCR Details:
Glossary
PSHD
Operation: Description:
PSHD
Stacks the content of double accumulator D. The stack pointer is decremented by two, then the contents of accumulators A and B are stored at the location to which the SP points. After PSHD executes, the SP points to the stacked value of accumulator A. This stacking order is the opposite of the order in which A and B are stacked when an interrupt is recognized. The interrupt stacking order is backward-compatible with the M6800, which had no 16-bit accumulator. Push instructions are commonly used to save the contents of one or more CPU registers at the start of a subroutine. Complementary pull instructions can be used to restore the saved CPU registers just before returning from the subroutine.
S X H I N Z V C
CCR Details:
Instruction Glossary
PSHX
Operation: Description:
Push Index Register X onto Stack (SP) $0002 SP (XH : XL) M(SP) : M(SP+1)
PSHX
Stacks the content of index register X. The stack pointer is decremented by two. The content of X is then stored at the address to which the SP points. After PSHX executes, the SP points to the stacked value of the high-order half of X. Push instructions are commonly used to save the contents of one or more CPU registers at the start of a subroutine. Complementary pull instructions can be used to restore the saved CPU registers just before returning from the subroutine.
S X H I N Z V C
CCR Details:
Glossary
PSHY
Operation: Description:
Push Index Register Y onto Stack (SP) $0002 SP (YH : YL) M(SP) : M(SP+1)
PSHY
Stacks the content of index register Y. The stack pointer is decremented by two. The content of Y is then stored at the address to which the SP points. After PSHY executes, the SP points to the stacked value of the high-order half of Y. Push instructions are commonly used to save the contents of one or more CPU registers at the start of a subroutine. Complementary pull instructions can be used to restore the saved CPU registers just before returning from the subroutine.
S X H I N Z V C
CCR Details:
Instruction Glossary
PULA
Operation: Description:
PULA
Accumulator A is loaded from the address indicated by the stack pointer. The SP is then incremented by one. Pull instructions are commonly used at the end of a subroutine, to restore the contents of CPU registers that were pushed onto the stack before subroutine execution.
S X H I N Z V C
CCR Details:
Glossary
PULB
Operation: Description:
PULB
Accumulator B is loaded from the address indicated by the stack pointer. The SP is then incremented by one. Pull instructions are commonly used at the end of a subroutine, to restore the contents of CPU registers that were pushed onto the stack before subroutine execution.
S X H I N Z V C
CCR Details:
Instruction Glossary
PULC
Operation: Description:
Pull Condition Code Register from Stack (M(SP)) CCR (SP) + $0001 SP
PULC
The condition code register is loaded from the address indicated by the stack pointer. The SP is then incremented by one. Pull instructions are commonly used at the end of a subroutine to restore the contents of CPU registers that were pushed onto the stack before subroutine execution.
S X H I N Z V C
CCR Details:
Condition codes take on the value pulled from the stack, except that the X mask bit cannot change from 0 to 1. Software can leave the X bit set, leave it cleared, or change it from 1 to 0, but it can be set only by a reset or by recognition of an XIRQ interrupt.
Address Mode INH Access Detail Object Code HCS12 38 ufO M68HC12 ufO
Glossary
PULD
Operation: Description:
PULD
Double accumulator D is loaded from the address indicated by the stack pointer. The SP is then incremented by two. The order in which A and B are pulled from the stack is the opposite of the order in which A and B are pulled when an RTI instruction is executed. The interrupt stacking order for A and B is backward-compatible with the M6800, which had no 16-bit accumulator. Pull instructions are commonly used at the end of a subroutine to restore the contents of CPU registers that were pushed onto the stack before subroutine execution.
S X H I N Z V C
CCR Details:
Instruction Glossary
PULX
Operation: Description:
PULX
Index register X is loaded from the address indicated by the stack pointer. The SP is then incremented by two. Pull instructions are commonly used at the end of a subroutine to restore the contents of CPU registers that were pushed onto the stack before subroutine execution.
S X H I N Z V C
CCR Details:
Glossary
PULY
Operation: Description:
PULY
Index register Y is loaded from the address indicated by the stack pointer. The SP is then incremented by two. Pull instructions are commonly used at the end of a subroutine to restore the contents of CPU registers that were pushed onto the stack before subroutine execution.
S X H I N Z V C
CCR Details:
Instruction Glossary
REV
Operation: Description:
REV
Performs an unweighted evaluation of a list of rules, using fuzzy input values to produce fuzzy outputs. REV can be interrupted, so it does not adversely affect interrupt latency. The REV instruction uses an 8-bit offset from a base address stored in index register Y to determine the address of each fuzzy input and fuzzy output. For REV to execute correctly, each rule in the knowledge base must consist of a table of 8-bit antecedent offsets followed by a table of 8-bit consequent offsets. The value $FE marks boundaries between antecedents and consequents and between successive rules. The value $FF marks the end of the rule list. REV can evaluate any number of rules with any number of inputs and outputs. Beginning with the address pointed to by the first rule antecedent, REV evaluates each successive fuzzy input value until it encounters an $FE separator. Operation is similar to that of a MINA instruction. The smallest input value is the truth value of the rule. Then, beginning with the address pointed to by the first rule consequent, the truth value is compared to each successive fuzzy output value until another $FE separator is encountered; if the truth value is greater than the current output value, it is written to the output. Operation is similar to that of a MAXM instruction. Rules are processed until an $FF terminator is encountered. Before executing REV, perform these set up operations. X must point to the first 8-bit element in the rule list. Y must point to the base address for fuzzy inputs and fuzzy outputs. A must contain the value $FF, and the CCR V bit must = 0. (LDAA #$FF places the correct value in A and clears V.) Clear fuzzy outputs to 0s.
Index register X points to the element in the rule list that is being evaluated. X is automatically updated so that execution can resume correctly if the instruction is interrupted. When execution is complete, X points to the next address after the $FF separator at the end of the rule list.
Glossary
REV
REV
Index register Y points to the base address for the fuzzy inputs and fuzzy outputs. The value in Y does not change during execution. Accumulator A holds intermediate results. During antecedent processing, a MIN function compares each fuzzy input to the value stored in A, and writes the smaller of the two to A. When all antecedents have been evaluated, A contains the smallest input value. This is the truth value used during consequent processing. Accumulator A must be initialized to $FF for the MIN function to evaluate the inputs of the first rule correctly. For subsequent rules, the value $FF is written to A when an $FE marker is encountered. At the end of execution, accumulator A holds the truth value for the last rule. The V status bit signals whether antecedents (0) or consequents (1) are being processed. V must be initialized to 0 for processing to begin with the antecedents of the first rule. Once execution begins, the value of V is automatically changed as $FE separators are encountered. At the end of execution, V should equal 1, because the last element before the $FF end marker should be a rule consequent. If V is equal to 0 at the end of execution, the rule list is incorrect. Fuzzy outputs must be cleared to $00 before processing begins in order for the MAX algorithm used during consequent processing to work correctly. Residual output values would cause incorrect comparison. Refer to Section 9. Fuzzy Logic Support for details.
S X H ? I N ? Z ? V C ?
CCR Details:
V: 1; Normally set, unless rule structure is erroneous H, N, Z, and C may be altered by this instruction
Address Mode Special Access Detail(1) Object Code HCS12 18 3A Orf(t,tx)O ff + Orf(t, M68HC12 Orf(t,tx)O ff + Orf(t,
1. The 3-cycle loop in parentheses is executed once for each element in the rule list. When an interrupt occurs, there is a 2-cycle exit sequence, a 4-cycle re-entry sequence, then execution resumes with a prefetch of the last antecedent or consequent being processed at the time of the interrupt.
Instruction Glossary
REVW
Operation: Description:
REVW
MIN-MAX Rule Evaluation with Optional Rule Weighting REVW performs either weighted or unweighted evaluation of a list of rules, using fuzzy inputs to produce fuzzy outputs. REVW can be interrupted, so it does not adversely affect interrupt latency. For REVW to execute correctly, each rule in the knowledge base must consist of a table of 16-bit antecedent pointers followed by a table of 16-bit consequent pointers. The value $FFFE marks boundaries between antecedents and consequents, and between successive rules. The value $FFFF marks the end of the rule list. REVW can evaluate any number of rules with any number of inputs and outputs. Setting the C status bit enables weighted evaluation. To use weighted evaluation, a table of 8-bit weighting factors, one per rule, must be stored in memory. Index register Y points to the weighting factors. Beginning with the address pointed to by the first rule antecedent, REVW evaluates each successive fuzzy input value until it encounters an $FFFE separator. Operation is similar to that of a MINA instruction. The smallest input value is the truth value of the rule. Next, if weighted evaluation is enabled, a computation is performed, and the truth value is modified. Then, beginning with the address pointed to by the first rule consequent, the truth value is compared to each successive fuzzy output value until another $FFFE separator is encountered; if the truth value is greater than the current output value, it is written to the output. Operation is similar to that of a MAXM instruction. Rules are processed until an $FFFF terminator is encountered. Perform these set up operations before execution: X must point to the first 16-bit element in the rule list. A must contain the value $FF, and the CCR V bit must = 0 (LDAA #$FF places the correct value in A and clears V). Clear fuzzy outputs to 0s. Set or clear the CCR C bit. When weighted evaluation is enabled, Y must point to the first item in a table of 8-bit weighting factors.
Glossary
REVW
REVW
Index register X points to the element in the rule list that is being evaluated. X is automatically updated so that execution can resume correctly if the instruction is interrupted. When execution is complete, X points to the address after the $FFFF separator at the end of the rule list. Index register Y points to the weighting factor being used. Y is automatically updated so that execution can resume correctly if the instruction is interrupted. When execution is complete, Y points to the last weighting factor used. When weighting is not used (C = 0), Y is not changed. Accumulator A holds intermediate results. During antecedent processing, a MIN function compares each fuzzy input to the value stored in A and writes the smaller of the two to A. When all antecedents have been evaluated, A contains the smallest input value. For unweighted evaluation, this is the truth value used during consequent processing. For weighted evaluation, the value in A is multiplied by the quantity (Rule Weight + 1) and the upper eight bits of the result replace the content of A. Accumulator A must be initialized to $FF for the MIN function to evaluate the inputs of the first rule correctly. For subsequent rules, the value $FF is automatically written to A when an $FFFE marker is encountered. At the end of execution, accumulator A holds the truth value for the last rule. The V status bit signals whether antecedents (0) or consequents (1) are being processed. V must be initialized to 0 for processing to begin with the antecedents of the first rule. Once execution begins, the value of V is automatically changed as $FFFE separators are encountered. At the end of execution, V should equal 1, because the last element before the $FF end marker should be a rule consequent. If V is equal to 0 at the end of execution, the rule list is incorrect. Fuzzy outputs must be cleared to $00 before processing begins in order for the MAX algorithm used during consequent processing to work correctly. Residual output values would cause incorrect comparison. Refer to Section 9. Fuzzy Logic Support for details.
Instruction Glossary
REVW
S
REVW
H ?
N ?
Z ?
C !
CCR Details:
V: 1; Normally set, unless rule structure is erroneous C: Selects weighted (1) or unweighted (0) rule evaluation H, N, Z, and C may be altered by this instruction
Address Mode Access Detail(1) Object Code HCS12 18 3B ORf(t,Tx)O (r,RfRf) ffff + ORf(t, M68HC12 ORf(tTx)O (r,RfRf) ffff + ORf(t,
Source Form REVW (add 2 at end of ins if wts) (replace comma if interrupted)
Special
1. The 3-cycle loop in parentheses expands to five cycles for separators when weighting is enabled. The loop is executed once for each element in the rule list. When an interrupt occurs, there is a 2-cycle exit sequence, a 4-cycle re-entry sequence, then execution resumes with a prefetch of the last antecedent or consequent being processed at the time of the interrupt.
Glossary
ROL
Operation: C Description:
ROL
C
b7 b0
Shifts all bits of memory location M one place to the left. Bit 0 is loaded from the C status bit. The C bit is loaded from the most significant bit of M. Rotate operations include the carry bit to allow extension of shift and rotate operations to multiple bytes. For example, to shift a 24-bit value one bit to the left, the sequence ASL LOW, ROL MID, ROL HIGH could be used where LOW, MID and HIGH refer to the low-order, middle and high-order bytes of the 24-bit value, respectively.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: N C = [N C] + [N C] (for N and C after the shift) Set if (N is set and C is cleared) or (N is cleared and C is set); cleared otherwise (for values of N and C after the shift) C: M7 Set if the MSB of M was set before the shift; cleared otherwise
Address Mode EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 75 65 65 65 65 65 hh xb xb xb xb xb ll ff ee ff ee ff rPwO rPw rPwO frPwP fIfrPw fIPrPw M68HC12 rOPw rPw rPOw frPPw fIfrPw fIPrPw
Source Form ROL opr16a ROL oprx0_xysp ROL oprx9,xysp ROL oprx16,xysp ROL [D,xysp] ROL [oprx16,xysp]
Instruction Glossary
ROLA
Operation: C Description:
Rotate Left A
ROLA
C
b7 b0
Shifts all bits of accumulator A one place to the left. Bit 0 is loaded from the C status bit. The C bit is loaded from the most significant bit of A. Rotate operations include the carry bit to allow extension of shift and rotate operations to multiple bytes. For example, to shift a 24-bit value one bit to the left, the sequence ASL LOW, ROL MID, and ROL HIGH could be used where LOW, MID, and HIGH refer to the low-order, middle, and high-order bytes of the 24-bit value, respectively.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: N C = [N C] + [N C] (for N and C after the shift) Set if (N is set and C is cleared) or (N is cleared and C is set); cleared otherwise (for values of N and C after the shift) C: A7 Set if the MSB of A was set before the shift; cleared otherwise
Address Mode INH Access Detail Object Code HCS12 45 O M68HC12 O
Glossary
ROLB
Operation: C Description:
Rotate Left B
ROLB
C
b7 b0
Shifts all bits of accumulator B one place to the left. Bit 0 is loaded from the C status bit. The C bit is loaded from the most significant bit of B. Rotate operations include the carry bit to allow extension of shift and rotate operations to multiple bytes. For example, to shift a 24-bit value one bit to the left, the sequence ASL LOW, ROL MID, and ROL HIGH could be used where LOW, MID, and HIGH refer to the low-order, middle and high-order bytes of the 24-bit value, respectively.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: N C = [N C] + [N C] (for N and C after the shift) Set if (N is set and C is cleared) or (N is cleared and C is set); cleared otherwise (for values of N and C after the shift) C: B7 Set if the MSB of B was set before the shift; cleared otherwise
Address Mode INH Access Detail Object Code HCS12 55 O M68HC12 O
Instruction Glossary
ROR
Operation: C Description:
ROR
C
b7 b0
Shifts all bits of memory location M one place to the right. Bit 7 is loaded from the C status bit. The C bit is loaded from the least significant bit of M. Rotate operations include the carry bit to allow extension of shift and rotate operations to multiple bytes. For example, to shift a 24-bit value one bit to the right, the sequence LSR HIGH, ROR MID, and ROR LOW could be used where LOW, MID, and HIGH refer to the low-order, middle, and high-order bytes of the 24-bit value, respectively.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: N C = [N C] + [N C] (for N and C after the shift) Set if (N is set and C is cleared) or (N is cleared and C is set); cleared otherwise (for values of N and C after the shift) C: M0 Set if the LSB of M was set before the shift; cleared otherwise
Address Mode EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 76 66 66 66 66 66 hh xb xb xb xb xb ll ff ee ff ee ff rPwO rPw rPwO frPwP fIfrPw fIPrPw M68HC12 rOPw rPw rPOw frPPw fIfrPw fIPrPw
Source Form ROR opr16a ROR oprx0_xysp ROR oprx9,xysp ROR oprx16,xysp ROR [D,xysp] ROR [oprx16,xysp]
Glossary
RORA
Operation: C Description:
Rotate Right A
RORA
C
b7 b0
Shifts all bits of accumulator A one place to the right. Bit 7 is loaded from the C status bit. The C bit is loaded from the least significant bit of A. Rotate operations include the carry bit to allow extension of shift and rotate operations to multiple bytes. For example, to shift a 24-bit value one bit to the right, the sequence LSR HIGH, ROR MID, and ROR LOW could be used where LOW, MID, and HIGH refer to the low-order, middle, and high-order bytes of the 24-bit value, respectively.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: N C = [N C] + [N C] (for N and C after the shift) Set if (N is set and C is cleared) or (N is cleared and C is set); cleared otherwise (for values of N and C after the shift) C: A0 Set if the LSB of A was set before the shift; cleared otherwise
Address Mode INH Access Detail Object Code HCS12 46 O M68HC12 O
Instruction Glossary
RORB
Operation: C Description:
Rotate Right B
RORB
C
b7 b0
Shifts all bits of accumulator B one place to the right. Bit 7 is loaded from the C status bit. The C bit is loaded from the least significant bit of B. Rotate operations include the carry bit to allow extension of shift and rotate operations to multiple bytes. For example, to shift a 24-bit value one bit to the right, the sequence LSR HIGH, ROR MID, and ROR LOW could be used where LOW, MID, and HIGH refer to the low-order, middle and high-order bytes of the 24-bit value, respectively.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: N C = [N C] + [N C] (for N and C after the shift) Set if (N is set and C is cleared) or (N is cleared and C is set); cleared otherwise (for values of N and C after the shift) C: B0 Set if the LSB of B was set before the shift; cleared otherwise
Address Mode INH Access Detail Object Code HCS12 56 O M68HC12 O
Glossary
RTC
Operation:
Return from Call (M(SP)) PPAGE (SP) + $0001 SP (M(SP) : M(SP+1)) PCH : PCL (SP) + $0002 SP
RTC
Description:
Terminates subroutines in expanded memory invoked by the CALL instruction. Returns execution flow from the subroutine to the calling program. The program overlay page (PPAGE) register and the return address are restored from the stack; program execution continues at the restored address. For code compatibility purposes, CALL and RTC also execute correctly in devices that do not have expanded memory capability.
S X H I N Z V C
CCR Details:
Instruction Glossary
RTI
Operation:
Return from Interrupt (M(SP)) CCR; (SP) + $0001 SP (M(SP) : M(SP+1)) B : A; (SP) + $0002 SP (M(SP) : M(SP+1)) XH : XL; (SP) + $0004 SP (M(SP) : M(SP+1)) PCH : PCL; (SP) $0002 SP (M(SP) : M(SP+1)) YH : YL; (SP) + $0004 SP
RTI
Description:
Restores system context after interrupt service processing is completed. The condition codes, accumulators B and A, index register X, the PC, and index register Y are restored to a state pulled from the stack. The X mask bit may be cleared as a result of an RTI instruction, but cannot be set if it was cleared prior to execution of the RTI instruction. If another interrupt is pending when RTI has finished restoring registers from the stack, the SP is adjusted to preserve stack content, and the new vector is fetched. This operation is functionally identical to the same operation in the M68HC11, where registers actually are re-stacked, but is faster.
S X H I N Z V C
CCR Details:
Condition codes take on the value pulled from the stack, except that the X mask bit cannot change from 0 to 1. Software can leave the X bit set, leave it cleared, or change it from 1 to 0, but it can be set only by a reset or by recognition of an XIRQ interrupt.
Address Mode INH Access Detail Object Code HCS12 0B uUUUUPPP uUUUUfVfPPP M68HC12 uUUUUPPP uUUUUVfPPP
Glossary
RTS
Operation: Description:
RTS
Restores context at the end of a subroutine. Loads the program counter with a 16-bit value pulled from the stack and increments the stack pointer by two. Program execution continues at the address restored from the stack.
S X H I N Z V C
CCR Details:
Instruction Glossary
SBA
Operation: Description: (A) (B) A
Subtract Accumulators
SBA
Subtracts the content of accumulator B from the content of accumulator A and places the result in A. The content of B is not affected. For subtraction instructions, the C status bit represents a borrow.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: A7 B7 R7 + A7 B7 R7 Set if a twos complement overflow resulted from the operation; cleared otherwise C: A7 B7 + B7 R7 + R7 A7 Set if the absolute value of B is larger than the absolute value of A; cleared otherwise
Address Mode INH Access Detail Object Code HCS12 18 16 OO M68HC12 OO
Glossary
SBCA
Operation: Description:
SBCA
Subtracts the content of memory location M and the value of the C status bit from the content of accumulator A. The result is placed in A. For subtraction instructions, the C status bit represents a borrow.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: A7 M7 R7 + A7 M7 R7 Set if a twos complement overflow resulted from the operation; cleared otherwise C: A7 M7 + M7 R7 + R7 A7 Set if the absolute value of the content of memory plus previous carry is larger than the absolute value of the accumulator; cleared otherwise
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 82 92 B2 A2 A2 A2 A2 A2 ii dd hh xb xb xb xb xb P rPf rPO rPf rPO frPP fIfrPf fIPrPf M68HC12 P rfP rOP rfP rPO frPP fIfrfP fIPrfP
Source Form SBCA #opr8i SBCA opr8a SBCA opr16a SBCA oprx0_xysp SBCA oprx9,xysp SBCA oprx16,xysp SBCA [D,xysp] SBCA [oprx16,xysp]
ll ff ee ff ee ff
Instruction Glossary
SBCB
Operation: Description:
SBCB
Subtracts the content of memory location M and the value of the C status bit from the content of accumulator B. The result is placed in B. For subtraction instructions, the C status bit represents a borrow.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: B7 M7 R7 + B7 M7 R7 Set if a twos complement overflow resulted from the operation; cleared otherwise C: B7 M7 + M7 R7 + R7 B7 Set if the absolute value of the content of memory plus previous carry is larger than the absolute value of the accumulator; cleared otherwise
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 C2 D2 F2 E2 E2 E2 E2 E2 ii dd hh xb xb xb xb xb P rPf rPO rPf rPO frPP fIfrPf fIPrPf M68HC12 P rfP rOP rfP rPO frPP fIfrfP fIPrfP
Source Form SBCB #opr8i SBCB opr8a SBCB opr16a SBCB oprx0_xysp SBCB oprx9,xysp SBCB oprx16,xysp SBCB [D,xysp] SBCB [oprx16,xysp]
ll ff ee ff ee ff
Glossary
SEC
Operation: Description: 1 C bit
Set Carry
SEC
Sets the C status bit. This instruction is assembled as ORCC #$01. The ORCC instruction can be used to set any combination of bits in the CCR in one operation. SEC can be used to set up the C bit prior to a shift or rotate instruction involving the C bit.
S X H I N Z V C 1
CCR Details:
C: 1; set
Address Mode IMM Access Detail Object Code HCS12 14 01 P M68HC12 P
Instruction Glossary
SEI
Operation: Description: 1 I bit
SEI
Sets the I mask bit. This instruction is assembled as ORCC #$10. The ORCC instruction can be used to set any combination of bits in the CCR in one operation. When the I bit is set, all maskable interrupts are inhibited, and the CPU will recognize only non-maskable interrupt sources or an SWI.
S X H I 1 N Z V C
CCR Details:
I:
1; set
Address Mode IMM Access Detail Object Code HCS12 14 10 P M68HC12 P
Glossary
SEV
Operation: Description:
SEV
Sets the V status bit. This instruction is assembled as ORCC #$02. The ORCC instruction can be used to set any combination of bits in the CCR in one operation.
S X H I N Z V 1 C
CCR Details:
V: 1; set
Address Mode IMM Access Detail Object Code HCS12 14 02 P M68HC12 P
Instruction Glossary
SEX
Operation: Description:
Sign Extend into 16-Bit Register If r1 bit 7 = 0, then $00 : (r1) r2 If r1 bit 7 = 1, then $FF : (r1) r2
SEX
This instruction is an alternate mnemonic for the TFR r1,r2 instruction, where r1 is an 8-bit register and r2 is a 16-bit register. The result in r2 is the 16-bit sign extended representation of the original twos complement number in r1. The content of r1 is unchanged in all cases except that of SEX A,D (D is A : B).
S X H I N Z V C
CCR Details:
1. Legal coding for eb is summarized in the following table. Columns represent the high-order source digit. Rows represent the low-order destination digit (MSB is a dont care). Values are in hexadecimal.
0 3 4 5 6 7
sex:A TMP2 sex:A D SEX A,D sex:A X SEX A,X sex:A Y SEX A,Y sex:A SP SEX A,SP
1
sex:B TMP2 sex:B D SEX B,D sex:B X SEX B,X sex:B Y SEX B,Y sex:B SP SEX B,SP
2
sex:CCR TMP2 sex:CCR D SEX CCR,D sex:CCR X SEX CCR,X sex:CCR Y SEX CCR,Y sex:CCR SP SEX CCR,SP
Glossary
STAA
Operation: Description: (A) M
Store Accumulator A
STAA
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: 0; cleared
Address Mode DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 5A 7A 6A 6A 6A 6A 6A dd hh xb xb xb xb xb ll ff ee ff ee ff Pw PwO Pw PwO PwP PIfw PIPw M68HC12 Pw wOP Pw PwO PwP PIfPw PIPPw
Source Form STAA opr8a STAA opr16a STAA oprx0_xysp STAA oprx9,xysp STAA oprx16,xysp STAA [D,xysp] STAA [oprx16,xysp]
Instruction Glossary
STAB
Operation: Description: (B) M
Store Accumulator B
STAB
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: 0; cleared
Address Mode DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 5B 7B 6B 6B 6B 6B 6B dd hh xb xb xb xb xb ll ff ee ff ee ff Pw PwO Pw PwO PwP PIfw PIPw M68HC12 Pw wOP Pw PwO PwP PIfPw PIPPw
Source Form STAB opr8a STAB opr16a STAB oprx0_xysp STAB oprx9,xysp STAB oprx16,xysp STAB [D,xysp] STAB [oprx16,xysp]
Glossary
STD
Operation: Description:
STD
Stores the content of double accumulator D in memory location M : M + 1. The content of D is unchanged.
S X H I N Z V 0 C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $0000; cleared otherwise V: 0; cleared
Address Mode DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 5C 7C 6C 6C 6C 6C 6C dd hh xb xb xb xb xb ll ff ee ff ee ff PW PWO PW PWO PWP PIfW PIPW M68HC12 PW WOP PW PWO PWP PIfPW PIPPW
Source Form STD opr8a STD opr16a STD oprx0_xysp STD oprx9,xysp STD oprx16,xysp STD [D,xysp] STD [oprx16,xysp]
Instruction Glossary
STOP
Operation:
Stop Processing (SP) $0002 SP; RTNH : RTNL (M(SP) : M(SP+1)) (SP) $0002 SP; YH : YL (M(SP) : M(SP+1)) (SP) $0002 SP; XH : XL (M(SP) : M(SP+1)) (SP) $0002 SP; B : A (M(SP) : M(SP+1)) (SP) $0001 SP; CCR (M(SP)) Stop All Clocks
STOP
Description:
When the S control bit is set, STOP is disabled and operates like a 2-cycle NOP instruction. When the S bit is cleared, STOP stacks CPU context, stops all system clocks, and puts the device in standby mode. Standby operation minimizes system power consumption. The contents of registers and the states of I/O pins remain unchanged. Asserting the RESET, XIRQ, or IRQ signals ends standby mode. Stacking on entry to STOP allows the CPU to recover quickly when an interrupt is used, provided a stable clock is applied to the device. If the system uses a clock reference crystal that also stops during low-power mode, crystal startup delay lengthens recovery time. If XIRQ is asserted while the X mask bit = 0 (XIRQ interrupts enabled), execution resumes with a vector fetch for the XIRQ interrupt. If the X mask bit = 1 (XIRQ interrupts disabled), a 2-cycle recovery sequence including an O cycle is used to adjust the instruction queue and the stack-pointer, and execution continues with the next instruction after STOP.
S X H I N Z V C
CCR Details:
Source Form STOP (entering STOP) (exiting STOP) (continue) (if STOP disabled)
Access Detail Object Code HCS12 18 3E OOSSSSsf fVfPPP ff OO M68HC12 OOSSSfSs fVfPPP fO OO
Glossary
STS
Operation: Description:
STS
Stores the content of the stack pointer in memory. The most significant byte of the SP is stored at the specified address, and the least significant byte of the SP is stored at the next higher byte address (the specified address plus one).
S X H I N Z V 0 C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $0000; cleared otherwise V: 0; cleared
Address Mode DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 5F 7F 6F 6F 6F 6F 6F dd hh xb xb xb xb xb ll ff ee ff ee ff PW PWO PW PWO PWP PIfW PIPW M68HC12 PW WOP PW PWO PWP PIfPW PIPPW
Source Form STS opr8a STS opr16a STS oprx0_xysp STS oprx9,xysp STS oprx16,xysp STS [D,xysp] STS [oprx16,xysp]
Instruction Glossary
STX
Operation: Description:
STX
Stores the content of index register X in memory. The most significant byte of X is stored at the specified address, and the least significant byte of X is stored at the next higher byte address (the specified address plus one).
S X H I N Z V 0 C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $0000; cleared otherwise V: 0; cleared
Address Mode DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 5E 7E 6E 6E 6E 6E 6E dd hh xb xb xb xb xb ll ff ee ff ee ff PW PWO PW PWO PWP PIfW PIPW M68HC12 PW WOP PW PWO PWP PIfPW PIPPW
Source Form STX opr8a STX opr16a STX oprx0_xysp STX oprx9,xysp STX oprx16,xysp STX [D,xysp] STX [oprx16,xysp]
Glossary
STY
Operation: Description:
STY
Stores the content of index register Y in memory. The most significant byte of Y is stored at the specified address, and the least significant byte of Y is stored at the next higher byte address (the specified address plus one).
S X H I N Z V 0 C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $0000; cleared otherwise V: 0; cleared
Address Mode DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 5D 7D 6D 6D 6D 6D 6D dd hh xb xb xb xb xb ll ff ee ff ee ff PW PWO PW PWO PWP PIfW PIPW M68HC12 PW WOP PW PWO PWP PIfPW PIPPW
Source Form STY opr8a STY opr16a STY oprx0_xysp STY oprx9,xysp STY oprx16,xysp STY [D,xysp] STY [oprx16,xysp]
Instruction Glossary
SUBA
Operation: Description: (A) (M) A
Subtract A
SUBA
Subtracts the content of memory location M from the content of accumulator A, and places the result in A. For subtraction instructions, the C status bit represents a borrow.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: A7 M7 R7 + A7 M7 R7 Set if a twos complement overflow resulted from the operation; cleared otherwise C: A7 M7 + M7 R7 + R7 A7 Set if the value of the content of memory is larger than the value of the accumulator; cleared otherwise
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 80 90 B0 A0 A0 A0 A0 A0 ii dd hh xb xb xb xb xb P rPf rPO rPf rPO frPP fIfrPf fIPrPf M68HC12 P rfP rOP rfP rPO frPP fIfrfP fIPrfP
Source Form SUBA #opr8i SUBA opr8a SUBA opr16a SUBA oprx0_xysp SUBA oprx9,xysp SUBA oprx16,xysp SUBA [D,xysp] SUBA [oprx16,xysp]
ll ff ee ff ee ff
Glossary
SUBB
Operation: Description: (B) (M) B
Subtract B
SUBB
Subtracts the content of memory location M from the content of accumulator B and places the result in B. For subtraction instructions, the C status bit represents a borrow.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: B7 M7 R7 + B7 M7 R7 Set if a twos complement overflow resulted from the operation; cleared otherwise C: B7 M7 + M7 R7 + R7 B7 Set if the value of the content of memory is larger than the value of the accumulator; cleared otherwise
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 C0 D0 F0 E0 E0 E0 E0 E0 ii dd hh xb xb xb xb xb P rPf rPO rPf rPO frPP fIfrPf fIPrPf M68HC12 P rfP rOP rfP rPO frPP fIfrfP fIPrfP
Source Form SUBB #opr8i SUBB opr8a SUBB opr16a SUBB oprx0_xysp SUBB oprx9,xysp SUBB oprx16,xysp SUBB [D,xysp] SUBB [oprx16,xysp]
ll ff ee ff ee ff
Instruction Glossary
SUBD
Operation: Description:
SUBD
Subtracts the content of memory location M : M + 1 from the content of double accumulator D and places the result in D. For subtraction instructions, the C status bit represents a borrow.
S X H I N Z V C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $0000; cleared otherwise V: D15 M15 R15 + D15 M15 R15 Set if a twos complement overflow resulted from the operation; cleared otherwise C: D15 M15 + M15 R15 + R15 D15 Set if the value of the content of memory is larger than the value of the accumulator; cleared otherwise
Address Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] Access Detail Object Code HCS12 83 93 B3 A3 A3 A3 A3 A3 jj dd hh xb xb xb xb xb kk ll ff ee ff ee ff PO RPf RPO RPf RPO fRPP fIfRPf fIPRPf M68HC12 OP RfP ROP RfP RPO fRPP fIfRfP fIPRfP
Source Form SUBD #opr16i SUBD opr8a SUBD opr16a SUBD oprx0_xysp SUBD oprx9,xyssp SUBD oprx16,xysp SUBD [D,xysp] SUBD [oprx16,xysp]
Glossary
SWI
Operation:
Software Interrupt (SP) $0002 SP; RTNH : RTNL (M(SP) : M(SP+1)) (SP) $0002 SP; YH : YL (M(SP) : M(SP+1)) (SP) $0002 SP; XH : XL (M(SP) : M(SP+1)) (SP) $0002 SP; B : A (M(SP) : M(SP+1)) (SP) $0001 SP; CCR (M(SP)) 1I (SWI Vector) PC
SWI
Description:
Causes an interrupt without an external interrupt service request. Uses the address of the next instruction after SWI as a return address. Stacks the return address, index registers Y and X, accumulators B and A, and the CCR, decrementing the SP before each item is stacked. The I mask bit is then set, the PC is loaded with the SWI vector, and instruction execution resumes at that location. SWI is not affected by the I mask bit. Refer to Section 7. Exception Processing for more information.
S X H I 1 N Z V C
CCR Details:
I:
1; set
Address Mode INH Access Detail Object Code HCS12 3F VSPSSPSsP(1) M68HC12 VSPSSPSsP(1)
1. The CPU also uses the SWI processing sequence for hardware interrupts and unimplemented opcode traps. A variation of the sequence (VfPPP) is used for resets.
Instruction Glossary
TAB
Operation: Description: (A) B
TAB
Moves the content of accumulator A to accumulator B. The former content of B is lost; the content of A is not affected. Unlike the general transfer instruction TFR A,B which does not affect condition codes, the TAB instruction affects the N, Z, and V status bits for compatibility with M68HC11.
S X H I N Z V 0 C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: 0; cleared
Address Mode INH Access Detail Object Code HCS12 18 0E OO M68HC12 OO
Glossary
TAP
Operation: Description:
TAP
Transfers the logic states of bits [7:0] of accumulator A to the corresponding bit positions of the CCR. The content of A remains unchanged. The X mask bit can be cleared as a result of a TAP, but cannot be set if it was cleared prior to execution of the TAP. If the I bit is cleared, there is a 1-cycle delay before the system allows interrupt requests. This prevents interrupts from occurring between instructions in the sequences CLI, WAI and CLI, STOP. This instruction is accomplished with the TFR A,CCR instruction. For compatibility with the M68HC11, the mnemonic TAP is translated by the assembler.
S X H I N Z V C
CCR Details:
Condition codes take on the value of the corresponding bit of accumulator A, except that the X mask bit cannot change from 0 to 1. Software can leave the X bit set, leave it cleared, or change it from 1 to 0, but it can only be set by a reset or by recognition of an XIRQ interrupt.
Address Mode INH Access Detail Object Code HCS12 B7 02 P M68HC12 P
Instruction Glossary
TBA
Operation: Description: (B) A
TBA
Moves the content of accumulator B to accumulator A. The former content of A is lost; the content of B is not affected. Unlike the general transfer instruction TFR B,A, which does not affect condition codes, the TBA instruction affects N, Z, and V for compatibility with M68HC11.
S X H I N Z V 0 C
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise V: 0; cleared
Address Mode INH Access Detail Object Code HCS12 18 0F OO M68HC12 OO
Glossary
TBEQ
Operation: Description:
Test and Branch if Equal to Zero If (Counter) = 0, then (PC) + $0003 + Rel PC
TBEQ
Tests the specified counter register A, B, D, X, Y, or SP. If the counter register is zero, branches to the specified relative destination. TBEQ is encoded into three bytes of machine code including a 9-bit relative offset (256 to +255 locations from the start of the next instruction). DBEQ and IBEQ instructions are similar to TBEQ, except that the counter is decremented or incremented rather than simply being tested. Bits 7 and 6 of the instruction postbyte are used to determine which operation is to be performed.
S X H I N Z V C
CCR Details:
1. Encoding for lb is summarized in the following table. Bit 3 is not used (dont care), bit 5 selects branch on zero (TBEQ 0) or not zero (TBNE 1) versions, and bit 4 is the sign bit of the 9-bit relative offset. Bits 7 and 6 should be 0:1 for TBEQ.
Count Bits 2:0 Register A B D X Y SP 000 001 100 101 110 111
Source Form TBEQ A, rel9 TBEQ B, rel9 TBEQ D, rel9 TBEQ X, rel9 TBEQ Y, rel9 TBEQ SP, rel9
Instruction Glossary
TBL
Operation: Description:
TBL
Linearly interpolates one of 256 result values that fall between each pair of data entries in a lookup table stored in memory. Data entries in the table represent the Y values of endpoints of equally spaced line segments. Table entries and the interpolated result are 8-bit values. The result is stored in accumulator A. Before executing TBL, an index register points to the table entry corresponding to the X value (X1) that is closest to, but less than or equal to, the desired lookup point (XL, YL). This defines the left end of a line segment and the right end is defined by the next data entry in the table. Prior to execution, accumulator B holds a binary fraction (radix point to left of MSB), representing the ratio (XLX1) (X2X1). The 8-bit unrounded result is calculated using the following expression: A = Y1 + [(B) (Y2 Y1)] Where (B) = (XL X1) (X2 X1) Y1 = 8-bit data entry pointed to by <effective address> Y2 = 8-bit data entry pointed to by <effective address> + 1 The intermediate value [(B) (Y2 Y1)] produces a 16-bit result with the radix point between bits 7 and 8. Any indexed addressing mode referenced to X, Y, SP, or PC, except indirect modes or 9-bit and 16-bit offset modes, can be used to identify the first data point (X1,Y1). The second data point is the next table entry.
S X H I N Z V C (1)
CCR Details:
N: Set if MSB of result is set; cleared otherwise Z: Set if result is $00; cleared otherwise C: Set if result can be rounded up; cleared otherwise
Source Form TBL oprx0_xysp Address Mode IDX Access Detail Object Code HCS12 18 3D xb ORfffP M68HC12 OrrffffP
Glossary
TBNE
Operation: Description:
Test and Branch if Not Equal to Zero If (Counter) 0, then (PC) + $0003 + Rel PC
TBNE
Tests the specified counter register A, B, D, X, Y, or SP. If the counter register is not zero, branches to the specified relative destination. TBNE is encoded into three bytes of machine code including a 9-bit relative offset (256 to +255 locations from the start of the next instruction). DBNE and IBNE instructions are similar to TBNE, except that the counter is decremented or incremented rather than simply being tested. Bits 7 and 6 of the instruction postbyte are used to determine which operation is to be performed.
S X H I N Z V C
CCR Details:
1. Encoding for lb is summarized in the following table. Bit 3 is not used (dont care), bit 5 selects branch on zero (TBEQ 0) or not zero (TBNE 1) versions, and bit 4 is the sign bit of the 9-bit relative offset. Bits 7 and 6 should be 0:1 for TBNE.
Count Bits 2:0 Register A B D X Y SP 000 001 100 101 110 111
Source Form TBNE A, rel9 TBNE B, rel9 TBNE D, rel9 TBNE X, rel9 TBNE Y, rel9 TBNE SP, rel9
Instruction Glossary
TFR
Operation: Description: See table.
TFR
Transfers the content of a source register to a destination register specied in the instruction. The order in which transfers between 8-bit and 16-bit registers are specified affects the high byte of the 16-bit registers differently. Cases involving TMP2 and TMP3 are reserved for Freescale use, so some assemblers may not permit their use. It is possible to generate these cases by using DC.B or DC.W assembler directives.
S X H I N Z V C Or: S X H I N Z V C
CCR Details:
None affected, unless the CCR is the destination register. Condition codes take on the value of the corresponding source bits, except that the X mask bit cannot change from 0 to 1. Software can leave the X bit set, leave it cleared, or change it from 1 to 0, but it can be set only by a reset or by recognition of an XIRQ interrupt.
Access Detail HCS12 B7 eb P M68HC12 P
Object Code(1)
1. Legal coding for eb is summarized in the following table. Columns represent the high-order source digit. Rows represent the low-order destination digit (MSB is a dont-care). Values are in hexadecimal.
0 0 1 2 3 4 5 6 7
AA AB A CCR sex:A TMP2 sex:A D SEX A,D sex:A X SEX A,X sex:A Y SEX A,Y sex:A SP SEX A,SP
1
BA BB B CCR sex:B TMP2 sex:B D SEX B,D sex:B X SEX B,X sex:B Y SEX B,Y sex:B SP SEX B,SP
2
CCR A CCR B CCR CCR sex:CCR TMP2 sex:CCR D SEX CCR,D sex:CCR X SEX CCR,X sex:CCR Y SEX CCR,Y sex:CCR SP SEX CCR,SP
3
TMP3L A TMP3L B TMP3L CCR TMP3 TMP2 TMP3 D TMP3 X TMP3 Y TMP3 SP
4
BA BB B CCR D TMP2 DD DX DY D SP
5
XL A XL B XL CCR X TMP2 XD XX XY X SP
6
YL A YL B YL CCR Y TMP2 YD YX YY Y SP
7
SPL A SPL B SPL CCR SP TMP2 SP D SP X SP Y SP SP
Glossary
TPA
Operation: Description:
TPA
Transfers the content of the condition code register to corresponding bit positions of accumulator A. The CCR remains unchanged. This mnemonic is implemented by the TFR CCR,A instruction. For compatibility with the M68HC11, the mnemonic TPA is translated into the TFR CCR,A instruction by the assembler.
S X H I N Z V C
CCR Details:
Instruction Glossary
TRAP
Operation:
Unimplemented Opcode Trap (SP) $0002 SP; RTNH : RTNL (M(SP) : M(SP+1)) (SP) $0002 SP; YH : YL (M(SP) : M(SP+1)) (SP) $0002 SP; XH : XL (M(SP) : M(SP+1)) (SP) $0002 SP; B : A (M(SP) : M(SP+1)) (SP) $0001 SP; CCR (M(SP)) 1I (Trap Vector) PC
TRAP
Description:
Traps unimplemented opcodes. There are opcodes in all 256 positions in the page 1 opcode map, but only 54 of the 256 positions on page 2 of the opcode map are used. If the CPU attempts to execute one of the unimplemented opcodes on page 2, an opcode trap interrupt occurs. Unimplemented opcode traps are essentially interrupts that share the $FFF8:$FFF9 interrupt vector. TRAP uses the next address after the unimplemented opcode as a return address. It stacks the return address, index registers Y and X, accumulators B and A, and the CCR, automatically decrementing the SP before each item is stacked. The I mask bit is then set, the PC is loaded with the trap vector, and instruction execution resumes at that location. This instruction is not maskable by the I bit. Refer to Section 7. Exception Processing for more information.
S X H I 1 N Z V C
CCR Details:
I:
1; set
Access Detail Object Code HCS12 $18 tn(1) OVSPSSPSsP M68HC12 OfVSPSSPSsP
1. The value tn represents an unimplemented page 2 opcode in either of the two ranges $30 to $39 or $40 to $FF.
Glossary
TST
Operation: Description: (M) $00
Test Memory
TST
Subtracts $00 from the content of memory location M and sets the condition codes accordingly. The subtraction is accomplished internally without modifying M. The TST instruction provides limited information when testing unsigned values. Since no unsigned value is less than zero, BLO and BLS have no utility following TST. While BHI can be used after TST, it performs the same function as BNE, which is preferred. After testing signed values, all signed branches are available.
S X H I N Z V 0 C 0
CCR Details:
N: Z: V: C:
Set if MSB of result is set; cleared otherwise Set if result is $00; cleared otherwise 0; cleared 0; cleared
Source Form TST opr16a TST oprx0_xysp TST oprx9,xysp TST oprx16,xysp TST [D,xysp] TST [oprx16,xysp]
Access Detail Object Code HCS12 F7 E7 E7 E7 E7 E7 hh xb xb xb xb xb ll ff ee ff ee ff rPO rPf rPO frPP fIfrPf fIPrPf M68HC12 rOP rfP rPO frPP fIfrfP fIPrfP
Instruction Glossary
TSTA
Operation: Description: (A) $00
Test A
TSTA
Subtracts $00 from the content of accumulator A and sets the condition codes accordingly. The subtraction is accomplished internally without modifying A. The TSTA instruction provides limited information when testing unsigned values. Since no unsigned value is less than zero, BLO and BLS have no utility following TSTA. While BHI can be used after TST, it performs the same function as BNE, which is preferred. After testing signed values, all signed branches are available.
S X H I N Z V 0 C 0
CCR Details:
N: Z: V: C:
Set if MSB of result is set; cleared otherwise Set if result is $00; cleared otherwise 0; cleared 0; cleared
Glossary
TSTB
Operation: Description: (B) $00
Test B
TSTB
Subtracts $00 from the content of accumulator B and sets the condition codes accordingly. The subtraction is accomplished internally without modifying B. The TSTB instruction provides limited information when testing unsigned values. Since no unsigned value is less than zero, BLO and BLS have no utility following TSTB. While BHI can be used after TST, it performs the same function as BNE, which is preferred. After testing signed values, all signed branches are available.
S X H I N Z V 0 C 0
CCR Details:
N: Z: V: C:
Set if MSB of result is set; cleared otherwise Set if result is $00; cleared otherwise 0; cleared 0; cleared
Instruction Glossary
TSX
Operation: Description: (SP) X
TSX
This is an alternate mnemonic to transfer the stack pointer value to index register X. The content of the SP remains unchanged. After a TSX instruction, X points at the last value that was stored on the stack.
S X H I N Z V C
CCR Details:
Glossary
TSY
Operation: Description: (SP) Y
TSY
This is an alternate mnemonic to transfer the stack pointer value to index register Y. The content of the SP remains unchanged. After a TSY instruction, Y points at the last value that was stored on the stack.
S X H I N Z V C
CCR Details:
Instruction Glossary
TXS
Operation: Description: (X) SP
TXS
This is an alternate mnemonic to transfer index register X value to the stack pointer. The content of X is unchanged.
S X H I N Z V C
CCR Details:
Glossary
TYS
Operation: Description: (Y) SP
TYS
This is an alternate mnemonic to transfer index register Y value to the stack pointer. The content of Y is unchanged.
S X H I N Z V C
CCR Details:
Instruction Glossary
WAI
Operation:
Wait for Interrupt (SP) $0002 SP; RTNH : RTNL (M(SP) : M(SP+1)) (SP) $0002 SP; YH : YL (M(SP) : M(SP+1)) (SP) $0002 SP; XH : XL (M(SP) : M(SP+1)) (SP) $0002 SP; B : A (M(SP) : M(SP+1)) (SP) $0001 SP; CCR (M(SP)) Stop CPU Clocks
WAI
Description:
Puts the CPU into a wait state. Uses the address of the instruction following WAI as a return address. Stacks the return address, index registers Y and X, accumulators B and A, and the CCR, decrementing the SP before each item is stacked. The CPU then enters a wait state for an integer number of bus clock cycles. During the wait state, CPU clocks are stopped, but other MCU clocks can continue to run. The CPU leaves the wait state when it senses an interrupt that has not been masked. Upon leaving the wait state, the CPU sets the appropriate interrupt mask bit(s), fetches the vector corresponding to the interrupt sensed, and instruction execution continues at the location the vector points to.
S X H I N Z V C
CCR Details:
Access Detail Object Code HCS12 OSSSSsf 3E fVfPPP VfPPP M68HC12 OSSSfSsf
Although the WAI instruction itself does not alter the condition codes, the interrupt that causes the CPU to resume processing also causes the I mask bit (and the X mask bit, if the interrupt was XIRQ) to be set as the interrupt vector is fetched.
Glossary
WAV
Operation:
WAV
Partial Product = (M pointed to by X) (M pointed to by Y) Sum-of-Products (24-bit SOP) = Previous SOP + Partial Product Sum-of-Weights (16-bit SOW) = Previous SOW + (M pointed to by Y) (X) + $0001 X; (Y) + $0001 Y (B) $01 B Description: Performs weighted average calculations on values stored in memory. Uses indexed (X) addressing mode to reference one source operand list, and indexed (Y) addressing mode to reference a second source operand list. Accumulator B is used as a counter to control the number of elements to be included in the weighted average. For each pair of data points, a 24-bit sum of products (SOP) and a 16-bit sum of weights (SOW) is accumulated in temporary registers. When B reaches zero (no more data pairs), the SOP is placed in Y : D. The SOW is placed in X. To arrive at the final weighted average, divide the content of Y : D by X by executing an EDIV after the WAV. This instruction can be interrupted. If an interrupt occurs during WAV execution, the intermediate results (six bytes) are stacked in the order SOW[15:0], SOP[15:0], $00:SOP[23:16] before the interrupt is processed. The wavr pseudo-instruction is used to resume execution after an interrupt. The mechanism is re-entrant. New WAV instructions can be started and interrupted while a previous WAV instruction is interrupted. This instruction is often used in fuzzy logic rule evaluation. Refer to Section 9. Fuzzy Logic Support for more information.
S X H ? I N ? Z 1 V ? C ?
CCR Details:
1. The replace comma sequence in parentheses represents the loop for one iteration of SOP and SOW accumulation.
Instruction Glossary
XGDX
Operation: Description: (D) (X)
XGDX
Exchanges the content of double accumulator D and the content of index register X. For compatibility with the M68HC11, the XGDX instruction is translated into an EXG D,X instruction by the assembler.
S X H I N Z V C
CCR Details:
Glossary
XGDY
Operation: Description: (D) (Y)
XGDY
Exchanges the content of double accumulator D and the content of index register Y. For compatibility with the M68HC11, the XGDY instruction is translated into an EXG D,Y instruction by the assembler.
S X H I N Z V C
CCR Details:
Instruction Glossary
Each exception has an associated 16-bit vector, which points to the memory location where the routine that handles the exception is located. As shown in Table 7-1, vectors are stored in the upper bytes of the standard 64-Kbyte address map. The six highest vector addresses are used for resets and unmaskable interrupt sources. The remaining vectors are used for maskable interrupts. All vectors must be programmed to point to the address of the appropriate service routine.
1. See Device User Guide and Interrupt Block Guide for further details
The CPU12 can handle up to 128 exception vectors, but the number actually used varies from device to device, and some vectors are reserved for Freescale use. Refer to Device User Guide for more information. Exceptions can be classified by the effect of the X and I interrupt mask bits on recognition of a pending request. Resets, the unimplemented opcode trap, and the SWI instruction are not affected by the X and I mask bits. Interrupt service requests from the XIRQ pin are inhibited when X = 1, but are not affected by the I bit. All other interrupts are inhibited when I = 1.
External reset and POR share the highest exception-processing priority, followed by clock monitor reset, and then the on-chip watchdog reset. The XIRQ interrupt is pseudo-non-maskable. After reset, the X bit in the CCR is set, which inhibits all interrupt service requests from the XIRQ pin until the X bit is cleared. The X bit can be cleared by a program instruction, but program instructions cannot change X from 0 to 1. Once the X bit is cleared, interrupt service requests made via the XIRQ pin become non-maskable. The unimplemented page 2 opcode trap (TRAP) and the SWI are special cases. In one sense, these two exceptions have very low priority, because any enabled interrupt source that is pending prior to the time exception processing begins will take precedence. However, once the CPU begins processing a TRAP or SWI, neither can be interrupted. Also, since these are mutually exclusive instructions, they have no relative priority. All remaining interrupts are subject to masking via the I bit in the CCR. Most HCS12 microcontroller units (MCU) have an external IRQ pin, which is assigned the highest I-bit interrupt priority and an internal periodic real-time interrupt generator, which has the next highest priority. The other maskable sources have default priorities that follow the address order of the interrupt vectors the higher the address, the higher the priority of the interrupt. Other maskable interrupts are associated with on-chip peripherals such as timers or serial ports. On the HCS12, logic in the device integration module can give one I-masked source priority over other I-masked sources. Refer to the documentation for the specific HCS12 derivative for more information.
7.4 Resets
M68HC12 devices perform resets with a combination of hardware and software. Integration module circuitry determines the type of reset that has occurred, performs basic system configuration, then passes control to the CPU12. The CPU fetches a vector determined by the type of reset that has occurred, jumps to the address pointed to by the vector, and begins to execute code at that address. The are four possible sources of reset are: Power-on reset (POR) External reset (RESET pin) COP reset Clock monitor reset
S12CPUV2 Reference Manual, Rev. 4.0 Freescale Semiconductor 313
Power-on reset (POR) and external reset share the same reset vector. The computer operating properly (COP) reset and the clock monitor reset each have a vector.
7.4.1 Power-On Reset The HCS12 incorporate circuitry to detect a positive transition in the VDD supply and initialize the device during cold starts, generally by asserting the reset signal internally. The signal is typically released after a delay that allows the device clock generator to stabilize.
7.4.2 External Reset The MCU distinguishes between internal and external resets by sensing how quickly the signal on the RESET pin rises to logic level 1 after it has been asserted. When the MCU senses any of the four reset conditions, internal circuitry drives the RESET signal low for N clock cycles, then releases. M clock cycles later, the MCU samples the state of the signal applied to the RESET pin. If the signal is still low, an external reset has occurred. If the signal is high, reset is assumed to have been initiated internally by either the COP system or the clock monitor.
7.4.3 COP Reset The MCU includes a computer operating properly (COP) system to help protect against software failures. When the COP is enabled, software must write a particular code sequence to a specific address to keep a watchdog timer from timing out. If software fails to execute the sequence properly, a reset occurs.
7.4.4 Clock Monitor Reset The clock monitor circuit uses an internal RC circuit to determine whether clock frequency is above a predetermined limit. If clock frequency falls below the limit when the clock monitor is enabled, a reset occurs.
7.5 Interrupts
Each HCS12 device can recognize a number of interrupt sources. Each source has a vector in the vector table. The XIRQ signal, the unimplemented opcode trap, and the SWI instruction are non-maskable, and have a fixed priority. The remaining interrupt sources can be masked by the I bit. In most devices, the external interrupt request pin is assigned the highest maskable interrupt priority, and the internal periodic real-time interrupt generator has the next highest priority. Other maskable interrupts are associated with on-chip peripherals such as timers or serial ports. These maskable sources have default priorities that follow the address order of the interrupt vectors. The higher the vector address, the higher the priority of the interrupt. On The HCS12, a device integration module incorporates logic that can give any one maskable source priority over other maskable sources.
7.5.1 Non-Maskable Interrupt Request (XIRQ) The XIRQ input is an updated version of the non-maskable interrupt (NMI) input of earlier MCUs. The XIRQ function is disabled during system reset and upon entering the interrupt service routine for an XIRQ interrupt. During reset, both the I bit and the X bit in the CCR are set. This disables maskable interrupts and interrupt service requests made by asserting the XIRQ signal. After minimum system initialization, software can clear the X bit using an instruction such as ANDCC #$BF. Software cannot set the X bit from 0 to 1 once it has been cleared, and interrupt requests made via the XIRQ pin become non-maskable. When a non-maskable interrupt is recognized, both the X and I bits are set after context is saved. The X bit is not affected by maskable interrupts. Execution of an return-from-interrupt (RTI) instruction at the end of the interrupt service routine normally restores the X and I bits to the pre-interrupt request state.
7.5.2 Maskable Interrupts Maskable interrupt sources include on-chip peripheral systems and external interrupt service requests. Interrupts from these sources are recognized when the global interrupt mask bit (I) in the CCR is cleared. The default state of the I bit out of reset is 1, but it can be written at any time. The interrupt module manages maskable interrupt priorities. Typically, an on-chip interrupt source is subject to masking by associated bits in control registers in addition to global masking by the I bit in the CCR. Sources
S12CPUV2 Reference Manual, Rev. 4.0 Freescale Semiconductor 315
generally must be enabled by writing one or more bits in associated control registers. There may be other interrupt-related control bits and flags, and there may be specific register read-write sequences associated with interrupt service. Refer to individual on-chip peripheral descriptions for details.
7.5.3 Interrupt Recognition Once enabled, an interrupt request can be recognized at any time after the I mask bit is cleared. When an interrupt service request is recognized, the CPU responds at the completion of the instruction being executed. Interrupt latency varies according to the number of cycles required to complete the current instruction. Because the fuzzy logic rule evaluation (REV), fuzzy logic rule evaluation weighted (REVW), and weighted average (WAV) instructions can take many cycles to complete, they are designed so that they can be interrupted. Instruction execution resumes when interrupt execution is complete. When the CPU begins to service an interrupt, the instruction queue is refilled, a return address is calculated, and then the return address and the contents of the CPU registers are stacked as shown in Table 7-2. Table 7-2. Stacking Order on Entry to Interrupts
Memory Location SP + 7 SP + 5 SP + 3 SP + 1 SP CPU Registers RTNH : RTNL YH : YL XH : XL B:A CCR
After the CCR is stacked, the I bit (and the X bit, if an XIRQ interrupt service request caused the interrupt) is set to prevent other interrupts from disrupting the interrupt service routine. Execution continues at the address pointed to by the vector for the highest-priority interrupt that was pending at the beginning of the interrupt sequence. At the end of the interrupt service routine, an RTI instruction restores context from the stacked registers, and normal program execution resumes.
7.5.4 External Interrupts External interrupt service requests are made by asserting an active-low signal connected to the IRQ pin. Typically, control bits affect how the signal is detected and recognized. The I bit serves as the IRQ interrupt enable flag. When an IRQ interrupt is recognized, the I bit is set to inhibit interrupts during the interrupt service routine. Before other maskable interrupt requests can be recognized, the I bit must be cleared. This is generally done by an RTI instruction at the end of the service routine.
7.5.5 Return-from-Interrupt Instruction (RTI) RTI is used to terminate interrupt service routines. RTI is an 8-cycle instruction when no other interrupt is pending and 11 cycles (10 cycles in M68HC12) when another interrupt is pending. In either case, the first five cycles are used to restore (pull) the CCR, B:A, X, Y, and the return address from the stack. If no other interrupt is pending at this point, three program words are fetched to refill the instruction queue from the area of the return address and processing proceeds from there. If another interrupt is pending after registers are restored, a new vector is fetched, and the stack pointer is adjusted to point at the CCR value that was just recovered (SP = SP 9). This makes it appear that the registers have been stacked again. After the SP is adjusted, three program words are fetched to refill the instruction queue, starting at the address the vector points to. Processing then continues with execution of the instruction that is now at the head of the queue.
CPU12, the stacked return address can be used to calculate the address of the unimplemented opcode for software-controlled traps.
7.8.1 Vector Fetch The first cycle of all exception processing, regardless of the cause, is a vector fetch. The vector points to the address where exception processing will continue. Exception vectors are stored in a table located at the top of the memory map ($FFxx). The CPU cannot use the fetched vector until the third cycle of the exception processing sequence. During the vector fetch cycle, the CPU issues a signal that tells the interrupt module to drive the vector address of the highest priority, pending exception onto the system address bus (the CPU does not provide this address). After the vector fetch, the CPU selects one of the three alternate execution paths, depending upon the cause of the exception.
START YES
T.1 - f
INTERNAL CALCULATIONS
2.0 - f
NO BUS ACCESS
2.1 - S
2.2 - S
SET S, X, AND I
3.0 - P
3.1 - P
3.2 - P
4.0 - P
4.1 - S
PUSH Y
4.2 - S
PUSH Y
CONTINUE TO FILL INSTRUCTION QUEUE 5.1 - S 5.0 - P FETCH PROGRAM WORD FINISH FILLING INSTRUCTION QUEUE 6.1 - P END FETCH PROGRAM WORD 6.2 - P FETCH PROGRAM WORD PUSH X 5.2 - S PUSH X
7.1 - S
PUSH B:A
7.2 - S
PUSH B:A
8.1 - s
END END
7.8.2 Reset Exception Processing If reset caused the exception, processing continues to cycle 2.0. This cycle sets the S, X, and I bits in the CCR. Cycles 3.0 through 5.0 are program word fetches that refill the instruction queue. Fetches start at the address pointed to by the reset vector. When the fetches are completed, exception processing ends, and the CPU starts executing the instruction at the head of the instruction queue. 7.8.3 Interrupt and Unimplemented Opcode Trap Exception Processing If an exception was not caused by a reset, a return address is calculated. Cycles 2.1and 2.2 are both S cycles (stack a 16-bit word), but the CPU12 performs different return address calculations for each type of exception. When an X- or I-related interrupt causes the exception, the return address points to the next instruction that would have been executed had processing not been interrupted. When an exception is caused by an SWI opcode or by an unimplemented opcode (see 7.6 Unimplemented Opcode Trap), the return address points to the next address after the opcode. Once calculated, the return address is pushed onto the stack. Cycles 3.1 through 9.1 are identical to cycles 3.2 through 9.2 for the rest of the sequence, except for optional setting of the X mask bit performed in cycle 8.1 (see below). Cycle 3.1/3.2 is the first of three program word fetches that refill the instruction queue. Cycle 4.1/4.2 pushes Y onto the stack. Cycle 5.1/5.2 pushes X onto the stack. Cycle 6.1/6.2 is the second of three program word fetches that refill the instruction queue. During this cycle, the contents of the A and B accumulators are concatenated into a 16-bit word in the order B:A. This makes register order in the stack frame the same as that of the M68HC11, M6801, and the M6800. Cycle 7.1/7.2 pushes the 16-bit word containing B:A onto the stack.
Cycle 8.1/8.2 pushes the 8-bit CCR onto the stack, then updates the mask bits. When an XIRQ interrupt causes an exception, both X and I are set, which inhibits further interrupts during exception processing. When any other interrupt causes an exception, the I bit is set, but the X bit is not changed.
Cycle 9.1/9.2 is the third of three program word fetches that refill the instruction queue. It is the last cycle of exception processing. After this cycle the CPU starts executing the first cycle of the instruction at the head of the instruction queue.
Section 8.
8.1 Introduction
Instruction Queue
This section describes development and debug support features related to the central processor unit (CPU12). Topics include: Single-wire background debug interface Hardware breakpoint system Instruction queue operation and reconstruction Instruction tagging 1 = Valid Data TRACE Trace Flag Indicates when tracing is enabled. Firmware in the BDM ROM sets TRACE in response to a TRACE1 command and TRACE is cleared upon completion of the TRACE1 command. Do not attempt to write TRACE directly with WRITE_BD_BYTE commands. 0 = Tracing not enabled 1 = TRACE1 command in progress
Because of the queue, program information is fetched a few cycles before it is used by the CPU. Internally, the microcontroller unit (MCU) only needs to buffer the fetched data. But, in order to monitor cycle-by-cycle CPU activity externally, it is necessary to capture data and address to discern what is happening in the instruction queue. Two external pins, IPIPE1 and IPIPE0, provide time-multiplexed information about data movement in the queue and instruction execution. The instruction queue and cycle-by-cycle activity can be reconstructed in real time or from trace history captured by a logic analyzer. However, neither scheme can be used to stop the CPU12 at a specific instruction. By the time an operation is visible outside the MCU, the instruction has already begun execution. A separate instruction tagging mechanism is provided for this purpose. A tag follows the information in the queue as the queue is advanced. During debugging, the CPU enters active background debug mode when a tagged instruction reaches the head of the queue, rather than executing the tagged instruction. For more information about tagging, refer to 8.6 Instruction Tagging.
8.3.1 HCS12 Timing Detail In the HCS12, data-movement information is available when E clock is high or on falling edges of the E clock; execution-start information is available when E clock is low or on rising edges of the E clock, as shown in Figure 8-1. Data-movement information refers to data on the bus. Execution-start information refers to the bus cycle that starts with that E-low time and continues through the following E-high time. Table 8-1 summarizes the information encoded on the IPIPE1 and IPIPE0 pins.
CYCLE 0 E CLOCK
CYCLE 1
ADDRESS
ADDR0
ADDR1
DATA
DATA0
DATA1
IPIPE[1:0]
EX0
DM0
EX1
DM1
8.3.2 M68HC12 Timing Detail In the M68HC12, data movement information is available on rising edges of the E clock; execution start information is available on falling edges of the E clock, as shown in Figure 8-2. Data movement information refers to data on the bus at the previous falling edge of E. Execution information refers to the bus cycle from the current falling edge to the next falling edge of E. Table 8-1 summarizes the information encoded on the IPIPE1 and IPIPE0 pins.
CYCLE 0 E CLOCK
CYCLE 1
CYCLE 2
ADDRESS
ADDR0
ADDR1
ADDR2
DATA
DATA0
DATA1
DATA2
IPIPE[1:0]
EX1
DM0
EX2
DM1
Capture at E Fall in HCS12 (E Rise in M68HC12) LAT(1) ALD ALL(1) No movement Latch data from bus Advance queue and load from bus Advance queue and load from latch
Capture at E Rise in HCS12 (E Fall in M68HC12) INT SEV SOD No start Start interrupt sequence Start even instruction Start odd instruction
1. The HCS12 implementation does not include a holding latch, so these data movement codes are used only in the original M68HC12.
8.3.3 Null (Code 0:0) The 0:0 data movement state indicates that there was no data movement in the instruction queue; the 0:0 execution start state indicates continuation of an instruction or interrupt sequence (no new instruction or interrupt start).
8.3.4 LAT Latch Data from Bus (Code 0:1) This code is not used in the HCS12. In the M68HC12, fetched program information has arrived, but the queue is not ready to advance. The information is latched into a buffer. Later, when the queue does advance, stage 1 is refilled from the buffer or from the data bus if the buffer is empty. In some instruction sequences, there can be several latch cycles before the queue advances. In these cases, the buffer is filled on the first latch event and additional latch requests are ignored.
8.3.5 ALD Advance and Load from Data Bus (Code 1:0) The instruction queue is advanced by one word and stage one is refilled with a word of program information from the data bus. The CPU requested the information two bus cycles earlier but, due to access delays, the information was not available until the E cycle referred to by the ALD code.
8.3.6 ALL Advance and Load from Latch (Code 1:1) This code is not used in the HCS12. In the M68HC12, the 2-stage instruction queue is advanced by one word and stage one is refilled with a word of program information from the buffer. The information was latched from the data bus at the falling edge of a previous E cycle because the instruction queue was not ready to advance when it arrived.
8.3.7 INT Interrupt Sequence Start (Code 0:1) The E cycle associated with this code is the first cycle of an interrupt sequence. Normally, this cycle is a read of the interrupt vector. However, in systems that have interrupt vectors in external memory and an 8-bit data bus, this cycle reads the upper byte of the 16-bit interrupt vector.
8.3.8 SEV Start Instruction on Even Address (Code 1:0) The E cycle associated with this code is the first cycle of the instruction in the even (high order) half of the word at the head of the instruction queue. The queue treats the $18 prebyte for instructions on page 2 of the opcode map as a special 1-byte, 1-cycle instruction, except that interrupts are not recognized at the boundary between the prebyte and the rest of the instruction.
8.3.9 SOD Start Instruction on Odd Address (Code 1:1) The E cycle associated with this code is the first cycle of the instruction in the odd (low order) half of the word at the head of the instruction queue. The queue treats the $18 prebyte for instructions on page 2 of the opcode map as a special 1-byte, 1-cycle instruction, except that interrupts are not recognized at the boundary between the prebyte and the rest of the instruction.
a single 16-bit access, so the CPU sees only 16-bit words of program information. To recover the 16-bit program words externally, latch the data bus state at the falling edge of E when ADDR0 = 0, and gate the outputs of the latch onto DATA[15:8] when an ALD cycle occurs. Since the 8-bit data bus is connected to DATA[7:0], the 16-bit word on the data lines corresponds to the ALD during the last half of the second 8-bit fetch, which is always to an odd address. IPIPE[1:0] status signals indicate 0:0 for the second half of the E cycle corresponding to the first 8-bit fetch. Some MCUs have address lines to support memory expansion beyond the standard 64-Kbyte address space. When memory expansion is used, expanded addresses must also be captured and maintained.
8.4.1 Queue Reconstruction Registers (for HCS12) Queue reconstruction requires the following registers, which can be implemented as software variables when previously captured trace data is used, or as hardware latches in real time. 8.4.1.1 fetch_add Register This register buffers the fetch address. 8.4.1.2 st1_add, st1_dat Registers These registers contain address and data for the first stage of the reconstructed instruction queue. 8.4.1.3 st2_add, st2_dat Registers These registers contain address and data for the middle stage of the reconstructed instruction queue. 8.4.1.4 st3_add, st3_dat Registers These registers contain address and data for the final stage of the reconstructed instruction queue. When the IPIPE[1:0] signals indicate the execution status, the address and opcode can be found in these registers.
8.4.2 Reconstruction Algorithm (for HCS12) This section describes how to use IPIPE[1:0] signals and queue reconstruction registers to reconstruct the queue. Typically, the first few cycles of raw capture data are not useful because it takes several cycles before an instruction propagates to the head of the queue. During these first raw cycles, the only meaningful information available is data movement signals. Information on the external address and data buses during this setup time is still captured and propagated through the reconstructed queue, but the information reflects the actions of instructions that were fetched before data collection started. In the special case of a reset, there is a five-cycle sequence (VfPPP) during which the reset vector is fetched and the instruction queue is filled, before execution of the first instruction begins. Due to the timing of the switchover of the IPIPE[1:0] pins from their alternate function as mode-select inputs, the status information on these two pins may be erroneous during the first cycle or two after the release of reset. This is not a problem because the status is correct in time for queue reconstruction logic to correctly replicate the queue. On an advance-and-load-from-data-bus (ALD) cycle, the information in the instruction queue must advance by one stage. Whatever was in stage three of the queue simply disappears. The previous contents of stage two go to stage three, the previous contents of stage one go to stage two, and the contents of fetch_add and data from the current cycle go to stage one. Figure 8-3 shows the reset sequence and illustrates the relationship between instruction cycle codes (VfPPP) and pipe status signals. One cycle of the data bus is shown to indicate the relationship between the ALD data movement code and the data value it refers to. The SEV execution start code indicates that the reset vector pointed to an even address in this example.
INSTRUCTION CYCLE CODES E CLOCK FIRST USER INSTRUCTION DM EX
P DM
P DM
8.5.1 Queue Reconstruction Registers (for M68HC12) Queue reconstruction requires these registers, which can be implemented as software variables when previously captured trace data is used or as hardware latches in real time.
8.5.1.1 in_add, in_dat Registers These registers contain the address and data from the previous external bus cycle. Depending on how records are read and processed from the raw capture information, it may be possible to simply read this information from the raw capture data file when needed. 8.5.1.2 fetch_add, fetch_dat Registers These registers buffer address and data for information that was fetched before the queue was ready to advance. 8.5.1.3 st1_add, st1_dat Registers These registers contain address and data for the first stage of the reconstructed instruction queue. 8.5.1.4 st2_add, st2_dat Registers These registers contain address and data for the final stage of the reconstructed instruction queue. When the IPIPE1 and IPIPE0 signals indicate that an instruction is starting to execute, the address and opcode can be found in these registers.
8.5.2 Reconstruction Algorithm (for M68HC12) This subsection describes in detail how to use IPIPE1 and IPIPE0 signals and queue reconstruction registers to reconstruct the queue. An is_full flag is used to indicate when the fetch_add and fetch_dat buffer registers contain information. The use of the flag is explained more fully in subsequent paragraphs. Typically, the first few cycles of raw capture data are not useful because it takes several cycles before an instruction propagates to the head of the queue. During these first raw cycles, the only meaningful information available are data movement signals. Information on the external address and data buses during this setup time reflects the actions of instructions that were fetched before data collection started. In the special case of a reset, there is a 5-cycle sequence (VfPPP) during which the reset vector is fetched and the instruction queue is filled, before execution of the first instruction begins. Due to the timing of the switchover
S12CPUV2 Reference Manual, Rev. 4.0 332 Freescale Semiconductor
of the IPIPE1 and IPIPE0 pins from their alternate function as mode select inputs, the status information on these two pins may be erroneous during the first cycle or two after the release of reset. This is not a problem because the status is correct in time for queue reconstruction logic to correctly replicate the queue. Before starting to reconstruct the queue, clear the is_full flag to indicate that there is no meaningful information in the fetch_add and fetch_dat buffers. Further movement of information in the instruction queue is based on the decoded status on the IPIPE1 and IPIPE0 signals at the rising edges of E. 8.5.2.1 LAT Decoding On a latch cycle (LAT), check the is_full flag. If and only if is_full = 0, transfer the address and data from the previous bus cycle (in_add and in_dat) into the fetch_add and fetch_dat registers, respectively. Then, set the is_full flag. The usual reason for a latch request instead of an advance request is that the previous instruction ended with a single aligned byte of program information in the last stage of the instruction queue. Since the odd half of this word still holds the opcode for the next instruction, the queue cannot advance on this cycle. However, the cycle to fetch the next word of program information has already started and the data is on its way. 8.5.2.2 ALD Decoding On an advance-and-load-from-data-bus (ALD) cycle, the information in the instruction queue must advance by one stage. Whatever was in stage 2 of the queue is simply thrown away. The previous contents of stage 1 are moved to stage 2, and the address and data from the previous cycle (in_add and in_dat) are transferred into stage 1 of the instruction queue. Finally, clear the is_full flag to indicate the buffer latch is ready for new data. Usually, there would be no useful information in the fetch buffer when an ALD cycle was encountered, but in the case of a change-of-flow, any data that was there needs to be flushed out (by clearing the is_full flag). 8.5.2.3 ALL Decoding On an advance-and-load-from-latch (ALL) cycle, the information in the instruction queue must advance by one stage. Whatever was in stage 2 of the queue is simply thrown away. The previous contents of stage 1 are moved to stage 2, and the contents of the fetch buffer latch are transferred into stage 1 of the instruction queue. One or more cycles preceding the ALL
S12CPUV2 Reference Manual, Rev. 4.0 Freescale Semiconductor 333
cycle will have been a LAT cycle. After updating the instruction queue, clear the is_full flag to indicate the fetch buffer is ready for new information. Figure 8-4 shows the reset sequence and illustrates the relationship between instruction cycle codes (VfPPP) and pipe status signals. One cycle of the data bus is shown to indicate the relationship between the ALD data movement code and the data value it refers to. The SEV execution start code indicates that the reset vector pointed to an even address in this example.
INSTRUCTION CYCLE CODES E CLOCK DM DM EX DM
LSTRB/TAGLO
LSTRB VALID
TAGLO VALID
BKGD/TAGHI
TAGHI VALID
Figure 8-5. Tag Input Timing Table 8-2 shows the functions of the two independent tagging pins. The presence of logic level 0 on either pin at the fall of ECLK tags (marks) the associated byte of program information as it is read into the instruction queue. Tagging is allowed in all modes. Tagging is disabled when BDM becomes active. Table 8-2. Tag Pin Function
TAGHI 1 1 0 0 TAGLO 1 0 1 0 Tag No tag Low byte High byte Both bytes
In HCS12 and M68HC12 derivatives that have hardware breakpoint capability, the breakpoint control logic and BDM control logic use the same internal signals for instruction tagging. The CPU does not differentiate between the two kinds of tags. The tag follows program information as it advances through the queue. When a tagged instruction reaches the head of the queue, the CPU enters active background debug mode rather than executing the instruction.
Other instructions that are useful for custom fuzzy logic programs include: MINA (place smaller of two unsigned 8-bit values in accumulator A) EMIND (place smaller of two unsigned 16-bit values in accumulator D) MAXM (place larger of two unsigned 8-bit values in memory) EMAXM (place larger of two unsigned 16-bit values in memory) TBL (table lookup and interpolate) ETBL (extended table lookup and interpolate) EMACS (extended multiply and accumulate signed 16-bit by 16-bit to 32-bit) For higher resolution fuzzy programs, the fast extended precision math instructions in the CPU12 are also beneficial. Flexible indexed addressing modes help simplify access to fuzzy logic data structures stored as lists or tabular data structures in memory. The actual logic additions required to implement fuzzy logic support in the CPU12 are quite small, so there is no appreciable increase in cost for the typical user. A fuzzy inference kernel for the CPU12 requires one-fifth as much code space and executes almost 50 times faster than a comparable kernel implemented on a typical midrange microcontroller.
solve certain types of complex problems that have eluded traditional control methods. Fuzzy sets provide a means of using linguistic expressions like temperature is warm in rules which can then be evaluated with a high degree of numerical precision and repeatability. This directly contradicts the common misperception that fuzzy logic produces approximate results a specific set of input conditions always produces the same result, just as a conventional control system does. A microcontroller-based fuzzy logic control system has two parts: A fuzzy inference kernel which is executed periodically to determine system outputs based on current system inputs A knowledge base which contains membership functions and rules
RULE LIST
DEFUZZIFICATION
SYSTEM OUTPUTS
The knowledge base can be developed by an application expert without any microcontroller programming experience. Membership functions are simply expressions of the experts understanding of the linguistic terms that describe the system to be controlled. Rules are ordinary language statements that describe the actions a human expert would take to solve the application problem. Rules and membership functions can be reduced to relatively simple data structures (the knowledge base) stored in non-volatile memory. A fuzzy inference kernel can be written by a programmer who does not know how the application system works. The only thing the programmer needs to do with knowledge base information is store it in the memory locations used by the kernel. One execution pass through the fuzzy inference kernel generates system output signals in response to current input conditions. The kernel is executed as often as needed to maintain control. If the kernel is executed more often than needed, processor bandwidth and power are wasted; delaying too long between passes can cause the system to get too far out of control. Choosing a periodic rate for a fuzzy control system is the same as it would be for a conventional control system.
9.2.1 Fuzzification (MEM) During the fuzzification step, the current system input values are compared against stored input membership functions to determine the degree to which each label of each system input is true. This is accomplished by finding the y-value for the current input value on a trapezoidal membership function for each label of each system input. The MEM instruction in the CPU12 performs this calculation for one label of one system input. To perform the complete fuzzification task for a system, several MEM instructions must be executed, usually in a program loop structure. Figure 9-2 shows a system of three input membership functions, one for each label of the system input. The x-axis of all three membership functions represents the range of possible values of the system input. The vertical line through all three membership functions represents a specific system input value. The y-axis represents degree of truth and varies from completely false ($00 or 0 percent) to completely true ($FF or 100 percent). The y-value where the vertical line intersects each of the membership functions, is the degree to which the current input value matches the associated label for this system input. For example, the expression temperature is warm is 25
percent true ($40). The value $40 is stored to a random-access memory (RAM) location and is called a fuzzy input (in this case, the fuzzy input for temperature is warm). There is a RAM location for each fuzzy input (for each label of each system input).
MEMBERSHIP FUNCTIONS FOR TEMPERATURE $FF $C0 $80 $40 $00 0F $FF $C0 $80 $40 $00 0 F $FF $C0 $80 $40 $00 0 F 32F 64F 96F 128F TEMPERATURE IS COLD $C0 COLD 32F 64F 96F 128F TEMPERATURE IS WARM $40 32F 64F 96F 128F TEMPERATURE IS HOT $00 HOT
FUZZY INPUTS
WARM
Figure 9-2. Fuzzification Using Membership Functions When the fuzzification step begins, the current value of the system input is in an accumulator of the CPU12, one index register points to the first membership function definition in the knowledge base, and a second index register points to the first fuzzy input in RAM. As each fuzzy input is calculated by executing a MEM instruction, the result is stored to the fuzzy input and both pointers are updated automatically to point to the locations associated with the next fuzzy input. The MEM instruction takes care of everything except counting the number of labels per system input and loading the current value of any subsequent system inputs. The end result of the fuzzification step is a table of fuzzy inputs representing current system conditions.
9.2.2 Rule Evaluation (REV and REVW) Rule evaluation is the central element of a fuzzy logic inference program. This step processes a list of rules from the knowledge base using current fuzzy input values from RAM to produce a list of fuzzy outputs in RAM. These fuzzy outputs can be thought of as raw suggestions for what the system output should be in response to the current input conditions. Before the results can be applied, the fuzzy outputs must be further processed, or defuzzified, to produce a single output value that represents the combined effect of all of the fuzzy outputs. The CPU12 offers two variations of rule evaluation instructions. The REV instruction provides for unweighted rules (all rules are considered to be equally important). The REVW instruction is similar but allows each rule to have a separate weighting factor which is stored in a separate parallel data structure in the knowledge base. In addition to the weights, the two rule evaluation instructions also differ in the way rules are encoded into the knowledge base. An understanding of the structure and syntax of rules is needed to understand how a microcontroller performs the rule evaluation task. An example of a typical rule is: If temperature is warm and pressure is high, then heat is (should be) off. At first glance, it seems that encoding this rule in a compact form understandable to the microcontroller would be difficult, but it is actually simple to reduce the rule to a small list of memory pointers. The antecedent portion of the rule is a statement of input conditions and the consequent portion of the rule is a statement of output actions. The antecedent portion of a rule is made up of one or more (in this case two) antecedents connected by a fuzzy and operator. Each antecedent expression consists of the name of a system input, followed by is, followed by a label name. The label must be defined by a membership function in the knowledge base. Each antecedent expression corresponds to one of the fuzzy inputs in RAM. Since and is the only operator allowed to connect antecedent expressions, there is no need to include these in the encoded rule. The antecedents can be encoded as a simple list of pointers to (or addresses of) the fuzzy inputs to which they refer. The consequent portion of a rule is made up of one or more (in this case one) consequents. Each consequent expression consists of the name of a system output, followed by is, followed by a label name. Each consequent
S12CPUV2 Reference Manual, Rev. 4.0 342 Freescale Semiconductor
expression corresponds to a specific fuzzy output in RAM. Consequents for a rule can be encoded as a simple list of pointers to (or addresses of) the fuzzy outputs to which they refer. The complete rules are stored in the knowledge base as a list of pointers or addresses of fuzzy inputs and fuzzy outputs. For the rule evaluation logic to work, there must be some means of knowing which pointers refer to fuzzy inputs and which refer to fuzzy outputs. There also must be a way to know when the last rule in the system has been reached. One method of organization is to have a fixed number of rules with a specific number of antecedents and consequents. A second method, employed in Freescale Freeware M68HC11 kernels, is to mark the end of the rule list with a reserved value, and use a bit in the pointers to distinguish antecedents from consequents. A third method of organization, used in the CPU12, is to mark the end of the rule list with a reserved value, and separate antecedents and consequents with another reserved value. This permits any number of rules, and allows each rule to have any number of antecedents and consequents, subject to the limits imposed by availability of system memory.
Each rule is evaluated sequentially, but the rules as a group are treated as if they were all evaluated simultaneously. Two mathematical operations take place during rule evaluation. The fuzzy and operator corresponds to the mathematical minimum operation and the fuzzy or operation corresponds to the mathematical maximum operation. The fuzzy and is used to connect antecedents within a rule. The fuzzy or is implied between successive rules. Before evaluating any rules, all fuzzy outputs are set to zero (meaning not true at all). As each rule is evaluated, the smallest (minimum) antecedent is taken to be the overall truth of the rule. This rule truth value is applied to each consequent of the rule (by storing this value to the corresponding fuzzy output) unless the fuzzy output is already larger (maximum). If two rules affect the same fuzzy output, the rule that is most true governs the value in the fuzzy output because the rules are connected by an implied fuzzy or. In the case of rule weighting, the truth value for a rule is determined as usual by finding the smallest rule antecedent. Before applying this truth value to the consequents for the rule, the value is multiplied by a fraction from zero (rule disabled) to one (rule fully enabled). The resulting modified truth value is then applied to the fuzzy outputs.
The end result of the rule evaluation step is a table of suggested or raw fuzzy outputs in RAM. These values were obtained by plugging current conditions (fuzzy input values) into the system rules in the knowledge base. The raw results cannot be supplied directly to the system outputs because they may be ambiguous. For instance, one raw output can indicate that the system output should be medium with a degree of truth of 50 percent while, at the same time, another indicates that the system output should be low with a degree of truth of 25 percent. The defuzzification step resolves these ambiguities. 9.2.3 Defuzzification (WAV) The final step in the fuzzy logic program combines the raw fuzzy outputs into a composite system output. Unlike the trapezoidal shapes used for inputs, the CPU12 typically uses singletons for output membership functions. As with the inputs, the x-axis represents the range of possible values for a system output. Singleton membership functions consist of the x-axis position for a label of the system output. Fuzzy outputs correspond to the y-axis height of the corresponding output membership function. The WAV instruction calculates the numerator and denominator sums for weighted average of the fuzzy outputs according to the formula:
Si Fi
Where n is the number of labels of a system output, Si are the singleton positions from the knowledge base, and Fi are fuzzy outputs from RAM. For a common fuzzy logic program on the CPU12, n is eight or less (though this instruction can handle any value to 255) and Si and Fi are 8-bit values. The final divide is performed with a separate EDIV instruction placed immediately after the WAV instruction. Before executing WAV, an accumulator must be loaded with the number of iterations (n), one index register must be pointed at the list of singleton positions in the knowledge base, and a second index register must be pointed at the list of fuzzy outputs in RAM. If the system has more than one system output, the WAV instruction is executed once for each system output.
01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
* [2] [2] [3] [1] [5] [3] [3] [1] [5] [3]
FUZZIFY
GRAD_LOOP
GRAD_LOOP1
LDX LDY LDAA LDAB MEM DBNE LDAA LDAB MEM DBNE LDAB CLR DBNE LDX LDY LDAA REV LDY LDX LDAB WAV EDIV TFR STAB
#INPUT_MFS #FUZ_INS CURRENT_INS #7 B,GRAD_LOOP CURRENT_INS+1 #7 B,GRAD_LOOP1 #7 1,Y+ b,RULE_EVAL #RULE_START #FUZ_INS #$FF #FUZ_OUT #SGLTN_POS #7 Y,D COG_OUT
;Point at MF definitions ;Point at fuzzy input table ;Get first input value ;7 labels per input ;Evaluate one MF ;For 7 labels of 1 input ;Get second input value ;7 labels per input ;Evaluate one MF ;For 7 labels of 1 input ;Loop count ;Clr a fuzzy out & inc ptr ;Loop to clr all fuzzy outs ;Point at first rule element ;Point at fuzzy ins and outs ;Init A (and clears V-bit) ;Process rule list ;Point at fuzzy outputs ;Point at singleton positions ;7 fuzzy outs per COG output ;Calculate sums for wtd av ;Final divide for wtd av ;Move result to A:B ;Store system output
[1] [2] RULE_EVAL [3] [2] [2] [1] [3n+4] [2] DEFUZ [2] [1] [7b+4] [11] [1] [3] * ***** End
Figure 9-3. Fuzzy Inference Engine Lines 1 to 3 set up pointers and load the system input value into the A accumulator. Line 4 sets the loop count for the loop in lines 5 and 6. Lines 5 and 6 make up the fuzzification loop for seven labels of one system input. The MEM instruction finds the y-value on a trapezoidal membership function for the current input value, for one label of the current input, and then stores the result to the corresponding fuzzy input. Pointers in X and Y
S12CPUV2 Reference Manual, Rev. 4.0 Freescale Semiconductor 345
are automatically updated by four and one so they point at the next membership function and fuzzy input respectively. Line 7 loads the current value of the next system input. Pointers in X and Y already point to the right places as a result of the automatic update function of the MEM instruction in line 5. Line 8 reloads a loop count. Lines 9 and 10 form a loop to fuzzify the seven labels of the second system input. When the program drops to line 11, the Y index register is pointing at the next location after the last fuzzy input, which is the first fuzzy output in this system. Line 11 sets the loop count to clear seven fuzzy outputs. Lines 12 and 13 form a loop to clear all fuzzy outputs before rule evaluation starts. Line 14 initializes the X index register to point at the first element in the rule list for the REV instruction. Line 15 initializes the Y index register to point at the fuzzy inputs and outputs in the system. The rule list (for REV) consists of 8-bit offsets from this base address to particular fuzzy inputs or fuzzy outputs. The special value $FE is interpreted by REV as a marker between rule antecedents and consequents. Line 16 initializes the A accumulator to the highest 8-bit value in preparation for finding the smallest fuzzy input referenced by a rule antecedent. The LDAA #$FF instruction also clears the V-bit in the CPU12s condition code register so the REV instruction knows it is processing antecedents. During rule list processing, the V bit is toggled each time an $FE is detected in the list. The V bit indicates whether REV is processing antecedents or consequents. Line 17 is the REV instruction, a self-contained loop to process successive elements in the rule list until an $FF character is found. For a system of 17 rules with two antecedents and one consequent each, the REV instruction takes 259 cycles, but it is interruptible so it does not cause a long interrupt latency. Lines 18 through 20 set up pointers and an iteration count for the WAV instruction.
Line 21 is the beginning of defuzzification. The WAV instruction calculates a sum-of-products and a sum-of-weights. Line 22 completes defuzzification. The EDIV instruction performs a 32-bit by 16-bit divide on the intermediate results from WAV to get the weighted average. Line 23 moves the EDIV result into the double accumulator. Line 24 stores the low 8-bits of the defuzzification result. This example inference program shows how easy it is to incorporate fuzzy logic into general applications using the CPU12. Code space and execution time are no longer serious factors in the decision to use fuzzy logic. The next section begins a much more detailed look at the fuzzy logic instructions of the CPU12.
9.4.1 Membership Function Definitions Figure 9-4 shows how a normal membership function is specified in the CPU12. Typically, a software tool is used to input membership functions graphically, and the tool generates data structures for the target processor and software kernel. Alternatively, points and slopes for the membership functions can be determined and stored in memory with define-constant assembler directives.
GRAPHICAL REPRESENTATION
$FF $E0 $C0 DEGREE OF TRUTH $A0 $80 $60 $40 $20 $00 $00 $10 $20 $30 $40 $50 $60 $70 $80 $90 $A0 $B0 $C0 $D0 $E0 $F0 $FF point_1 slope_1 point_2 slope_2
INPUT RANGE MEMORY REPRESENTATION ADDR ADDR+1 ADDR+2 ADDR+3 $40 $D0 $08 $04 X-POSITION OF point_1 X-POSITION OF point_2 slope_1 ($FF/(X-POS OF SATURATION point_1)) slope_2 ($FF/(point_2 X-POS OF SATURATION))
Figure 9-4. Defining a Normal Membership Function An internal CPU algorithm calculates the y-value where the current input intersects a membership function. This algorithm assumes the membership function obeys some common-sense rules. If the membership function definition is improper, the results may be unusual. See 9.4.2 Abnormal Membership Function Definitions for a discussion of these cases. These rules apply to normal membership functions. $00 point1 < $FF $00 < point2 $FF point1 < point2 The sloping sides of the trapezoid meet at or above $FF.
Each system input such as temperature has several labels such as cold, cool, normal, warm, and hot. Each label of each system input must have a membership function to describe its meaning in an unambiguous numerical way. Typically, there are three to seven labels per system input, but there is no practical restriction on this number as far as the fuzzification step is concerned.
9.4.2 Abnormal Membership Function Definitions In the CPU12, it is possible (and proper) to define crisp membership functions. A crisp membership function has one or both sides vertical (infinite slope). Since the slope value $00 is not used otherwise, it is assigned to mean infinite slope to the MEM instruction in the CPU12. Although a good fuzzy development tool will not allow the user to specify an improper membership function, it is possible to have program errors or memory errors which result in erroneous abnormal membership functions. Although these abnormal shapes do not correspond to any working systems, understanding how the CPU12 treats these cases can be helpful for debugging. A close examination of the MEM instruction algorithm will show how such membership functions are evaluated. Figure 9-5 is a complete flow diagram for the execution of a MEM instruction. Each rectangular box represents one CPU bus cycle. The number in the upper left corner corresponds to the cycle number and the letter corresponds to the cycle type (refer to Section 6. Instruction Glossary for details). The upper portion of the box includes information about bus activity during this cycle (if any). The lower portion of the box, which is separated by a dashed line, includes information about internal CPU processes. It is common for several internal functions to take place during a single CPU cycle (for example, in cycle 2, two 8-bit subtractions take place and a flag is set based on the results). Consider 4a: If (((Slope_2 = 0) or (Grade_2 > $FF)) and (flag_d12n = 0)). The flag_d12n is zero as long as the input value (in accumulator A) is within the trapezoid. Everywhere outside the trapezoid, one or the other delta term will be negative, and the flag will equal one. Slope_2 equals zero indicates the right side of the trapezoid has infinite slope, so the resulting grade should be $FF everywhere in the trapezoid, including at point_2, as far as this side is concerned. The term grade_2 greater than $FF means the value is far enough into the trapezoid that the right sloping side of the trapezoid has crossed above the $FF cutoff level and the resulting grade should be $FF as far as the right sloping side is concerned. 4a decides if the value is left of the right sloping side (Grade = $FF), or on the sloping portion of the right side of the trapezoid (Grade = Grade_2). 4b could still override this tentative value in grade.
START
1-R
2-R
2a Delta_1 = ACCA Point_1 2b Delta_2 = Point_2 ACCA 2c IF (Delta_1 OR Delta_2) < 0 THEN flag_d12n = 1 ELSE flag_d12n = 0
3-f
NO BUS ACCESS
3a IF flag_d12n = 1 THEN Grade_1 = 0 ELSE Grade_1 = Slope_1 * Delta_1 3b IF flag_d12n = 1 THEN Grade_2 = 0 ELSE Grade_2 = Slope_2 * Delta_2
4-O
IF MISALIGNED THEN READ PROGRAM WORD TO FILL INSTRUCTION QUEUE ELSE NO BUS ACCESS
4a IF (((Slope_2 = 0) OR (Grade_2 > $FF)) AND (flag_d12n = 0)) THEN GRADE = $FF ELSE GRADE = Grade_2 4b IF (((Slope_1 = 0) OR (Grade_1 > $FF)) AND (flag_d12n = 0)) THEN GRADE = GRADE ELSE GRADE = Grade_1
5-w
END
Figure 9-5. MEM Instruction Flow Diagram In 4b, slope_1 is zero if the left side of the trapezoid has infinite slope (vertical). If so, the result (grade) should be $FF at and to the right of point_1 everywhere within the trapezoid as far as the left side is concerned. The grade_1 greater than $FF term corresponds to the input being to the right of where the left sloping side passes the $FF cutoff level. If either of these conditions is true, the result (grade) is left at the value it got from 4a. The else condition in 4b corresponds to the input falling on the sloping portion of the left side of the trapezoid (or possibly outside the trapezoid), so the result is grade equal grade_1. If the input was outside the trapezoid, flag_d12n would be one and grade_1 and grade_2 would have been forced to $00 in cycle 3. The else condition of 4b would set the result to $00.
The special cases shown here represent abnormal membership function definitions. The explanations describe how the specific algorithm in the CPU12 resolves these unusual cases. The results are not all intuitively obvious, but rather fall out from the specific algorithm. Remember, these cases should not occur in a normal system. 9.4.2.1 Abnormal Membership Function Case 1 This membership function is abnormal because the sloping sides cross below the $FF cutoff level. The flag_d12n signal forces the membership function to evaluate to $00 everywhere except from point_1 to point_2. Within this interval, the tentative values for grade_1 and grade_2 calculated in cycle 3 fall on the crossed sloping sides. In step 4a, grade gets set to the grade_2 value, but in 4b this is overridden by the grade_1 value, which ends up as the result of the MEM instruction. One way to say this is that the result follows the left sloping side until the input passes point_2, where the result goes to $00.
MEMORY DEFINITION: $60, $80, $04, $04; point_1, point_2, slope_1, slope_2 GRAPHICAL REPRESENTATION HOW INTERPRETED
P1
P2
P1
P2
Figure 9-6. Abnormal Membership Function Case 1 If point_1 was to the right of point_2, flag_d12n would force the result to be $00 for all input values. In fact, flag_d12n always limits the region of interest to the space greater than or equal to point_1 and less than or equal to point_2.
9.4.2.2 Abnormal Membership Function Case 2 Like the previous example, the membership function in case 2 is abnormal because the sloping sides cross below the $FF cutoff level, but the left sloping side reaches the $FF cutoff level before the input gets to point_2. In this case, the result follows the left sloping side until it reaches the $FF cutoff level. At this point, the (grade_1 > $FF) term of 4b kicks in, making the expression true so grade equals grade (no overwrite). The result from here to point_2 becomes controlled by the else part of 4a (grade = grade_2), and the result follows the right sloping side.
MEMORY DEFINITION: $60, $C0, $04, $04; point_1, point_2, slope_1, slope_2 GRAPHICAL REPRESENTATION HOW INTERPRETED
P1
P2
P1
Figure 9-7. Abnormal Membership Function Case 2 9.4.2.3 Abnormal Membership Function Case 3 The membership function in case 3 is abnormal because the sloping sides cross below the $FF cutoff level, and the left sloping side has infinite slope. In this case, 4a is not true, so grade equals grade_2. 4b is true because slope_1 is zero, so 4b does not overwrite grade.
MEMORY DEFINITION: $60, $80, $00, $04; point_1, point_2, slope_1, slope_2 GRAPHICAL REPRESENTATION HOW INTERPRETED
P1
P2
P1
P2
9.5.1 Unweighted Rule Evaluation (REV) This instruction implements basic min-max rule evaluation. CPU registers are used for pointers and intermediate calculation results. Since the REV instruction is essentially a list-processing instruction, execution time is dependent on the number of elements in the rule list. The REV instruction is interruptible (typically within three bus cycles), so it does not adversely affect worst case interrupt latency. Since all intermediate results and instruction status are held in stacked CPU registers, the interrupt service code can even include independent REV and REVW instructions. 9.5.1.1 Set Up Prior to Executing REV Some CPU registers and memory locations need to be set up prior to executing the REV instruction. X and Y index registers are used as index pointers to the rule list and the fuzzy inputs and outputs. The A accumulator is used for intermediate calculation results and needs to be set to $FF initially. The V condition code bit is used as an instruction status indicator to show whether antecedents or consequents are being processed. Initially, the V bit is cleared to zero to indicate antecedents are being processed. The fuzzy outputs (working RAM locations) need to be cleared to $00. If these values are not initialized before executing the REV instruction, results will be erroneous. The X index register is set to the address of the first element in the rule list (in the knowledge base). The REV instruction automatically updates this pointer so that the instruction can resume correctly if it is interrupted. After the REV instruction finishes, X will point at the next address past the $FF separator character that marks the end of the rule list.
The Y index register is set to the base address for the fuzzy inputs and outputs (in working RAM). Each rule antecedent is an unsigned 8-bit offset from this base address to the referenced fuzzy input. Each rule consequent is an unsigned 8-bit offset from this base address to the referenced fuzzy output. The Y index register remains constant throughout execution of the REV instruction. The 8-bit A accumulator is used to hold intermediate calculation results during execution of the REV instruction. During antecedent processing, A starts out at $FF and is replaced by any smaller fuzzy input that is referenced by a rule antecedent (MIN). During consequent processing, A holds the truth value for the rule. This truth value is stored to any fuzzy output that is referenced by a rule consequent, unless that fuzzy output is already larger (MAX). Before starting to execute REV, A must be set to $FF (the largest 8-bit value) because rule evaluation always starts with processing of the antecedents of the first rule. For subsequent rules in the list, A is automatically set to $FF when the instruction detects the $FE marker character between the last consequent of the previous rule and the first antecedent of a new rule. The instruction LDAA #$FF clears the V bit at the same time it initializes A to $FF. This satisfies the REV setup requirement to clear the V bit as well as the requirement to initialize A to $FF. Once the REV instruction starts, the value in the V bit is automatically maintained as $FE separator characters are detected. The final requirement to clear all fuzzy outputs to $00 is part of the MAX algorithm. Each time a rule consequent references a fuzzy output, that fuzzy output is compared to the truth value for the current rule. If the current truth value is larger, it is written over the previous value in the fuzzy output. After all rules have been evaluated, the fuzzy output contains the truth value for the most-true rule that referenced that fuzzy output. After REV finishes, A will hold the truth value for the last rule in the rule list. The V condition code bit should be one because the last element before the $FF end marker should have been a rule consequent. If V is zero after executing REV, it indicates the rule list was structured incorrectly.
9.5.1.2 Interrupt Details The REV instruction includes a 3-cycle processing loop for each byte in the rule list (including antecedents, consequents, and special separator characters). Within this loop, a check is performed to see if any qualified interrupt request is pending. If an interrupt is detected, the current CPU registers are stacked and the interrupt is honored. When the interrupt service routine finishes, an RTI instruction causes the CPU to recover its previous context from the stack, and the REV instruction is resumed as if it had not been interrupted. The stacked value of the program counter (PC), in case of an interrupted REV instruction, points to the REV instruction rather than the instruction that follows. This causes the CPU to try to execute a new REV instruction upon return from the interrupt. Since the CPU registers (including the V bit in the condition codes register) indicate the current status of the interrupted REV instruction, this effectively causes the rule evaluation operation to resume from where it left off. 9.5.1.3 Cycle-by-Cycle Details for REV The central element of the REV instruction is a 3-cycle loop that is executed once for each byte in the rule list. There is a small amount of housekeeping activity to get this loop started as REV begins and a small sequence to end the instruction. If an interrupt comes, there is a special small sequence to save CPU status on the stack before honoring the requested interrupt. Figure 9-9 is a REV instruction flow diagram. Each rectangular box represents one CPU clock cycle. Decision blocks and connecting arrows are considered to take no time at all. The letters in the small rectangles in the upper left corner of each bold box correspond to execution cycle codes (refer to Section 6. Instruction Glossary for details). Lower case letters indicate a cycle where 8-bit or no data is transferred. Upper case letters indicate cycles where 16-bit or no data is transferred. When a value is read from memory, it cannot be used by the CPU until the second cycle after the read takes place. This is due to access and propagation delays.
START
1.0 - O
2.0 - r
READ BYTE @ 0,X (RULE ELEMENT Rx) X = X + 1 POINT AT NEXT RULE ELEMENT
3.0 - f
NO BUS ACCESS
4.0 - t
UPDATE RX WITH VALUE READ IN CYC 2 OR 5 IF Rx $FE OR $FF THEN READ BYTE @ Rx,Y (FUZZY IN OR OUT Fy) ELSE NO BUS ACCESS
IF Rx = $FE & V WAS 1, RESET ACCA TO $FF IF Rx = $FE TOGGLE V-BIT YES INTERRUPT PENDING? NO 5.0 - t $FF Rx = $FF, OTHER? OTHER READ BYTE @ 0,X (RULE ELEMENT Rx) X = X + 1 POINT AT NEXT RULE ELEMENT 5.2 - f NO BUS ACCESS
6.2 - f
NO BUS ACCESS
V-BIT 0 (MIN)
1 (MAX)
6.0 - x NO BUS ACCESS UPDATE Fy WITH VALUE READ IN CYC 4.0 IF Rx $FE THEN A = MIN(A, Fy) ELSE A = A (NO CHANGE TO A)
6.1 - x
UPDATE FY WITH VALUE READ IN CYC 4.0 IF Rx $FE OR $FF, AND ACCA > Fy THEN WRITE BYTE @ Rx,Y ELSE NO BUS ACCESS
NO
7.0 - O
END
Since there is more than one flow path through the REV instruction, cycle numbers have a decimal place. This decimal place indicates which of several possible paths is being used. The CPU normally moves forward by one digit at a time within the same flow (flow number is indicated after the decimal point in the cycle number). There are two exceptions possible to this orderly sequence through an instruction. The first is a branch back to an earlier cycle number to form a loop as in 6.0 to 4.0. The second type of sequence change is from one flow to a parallel flow within the same instruction such as 4.0 to 5.2, which occurs if the REV instruction senses an interrupt. In this second type of sequence branch, the whole number advances by one and the flow number changes to a new value (the digit after the decimal point). In cycle 1.0, the CPU12 does an optional program word access to replace the $18 prebyte of the REV instruction. Notice that cycle 7.0 is also an O type cycle. One or the other of these will be a program word fetch, while the other will be a free cycle where the CPU does not access the bus. Although the $18 page prebyte is a required part of the REV instruction, it is treated by the CPU12 as a somewhat separate single cycle instruction. Rule evaluation begins at cycle 2.0 with a byte read of the first element in the rule list. Usually this would be the first antecedent of the first rule, but the REV instruction can be interrupted, so this could be a read of any byte in the rule list. The X index register is incremented so it points to the next element in the rule list. Cycle 3.0 is needed to satisfy the required delay between a read and when data is valid to the CPU. Some internal CPU housekeeping activity takes place during this cycle, but there is no bus activity. By cycle 4.0, the rule element that was read in cycle 2.0 is available to the CPU. Cycle 4.0 is the first cycle of the main three cycle rule evaluation loop. Depending upon whether rule antecedents or consequents are being processed, the loop will consist of cycles 4.0, 5.0, 6.0, or the sequence 4.0, 5.0, 6.1. This loop is executed once for every byte in the rule list, including the $FE separators and the $FF end-of-rules marker. At each cycle 4.0, a fuzzy input or fuzzy output is read, except during the loop passes associated with the $FE and $FF marker bytes, where no bus access takes place during cycle 4.0. The read access uses the Y index register as the base address and the previously read rule byte (Rx) as an unsigned offset from Y. The fuzzy input or output value read here will be used during the next cycle 6.0 or 6.1. Besides being used as the offset from Y for this read, the previously read Rx is checked to see if it is a separator character ($FE). If Rx was $FE and the V bit was one, this indicates a switch
S12CPUV2 Reference Manual, Rev. 4.0 Freescale Semiconductor 357
from processing consequents of one rule to starting to process antecedents of the next rule. At this transition, the A accumulator is initialized to $FF to prepare for the min operation to find the smallest fuzzy input. Also, if Rx is $FE, the V bit is toggled to indicate the change from antecedents to consequents, or consequents to antecedents. During cycle 5.0, a new rule byte is read unless this is the last loop pass, and Rx is $FF (marking the end of the rule list). This new rule byte will not be used until cycle 4.0 of the next pass through the loop. Between cycle 5.0 and 6.x, the V-bit is used to decide which of two paths to take. If V is zero, antecedents are being processed and the CPU progresses to cycle 6.0. If V is one, consequents are being processed and the CPU goes to cycle 6.1. During cycle 6.0, the current value in the A accumulator is compared to the fuzzy input that was read in the previous cycle 4.0, and the lower value is placed in the A accumulator (min operation). If Rx is $FE, this is the transition between rule antecedents and rule consequents, and this min operation is skipped (although the cycle is still used). No bus access takes place during cycle 6.0 but cycle 6.x is considered an x type cycle because it could be a byte write (cycle 6.1) or a free cycle (cycle 6.0 or 6.1 with Rx = $FE or $FF). If an interrupt arrives while the REV instruction is executing, REV can break between cycles 4.0 and 5.0 in an orderly fashion so that the rule evaluation operation can resume after the interrupt has been serviced. Cycles 5.2 and 6.2 are needed to adjust the PC and X index register so the REV operation can recover after the interrupt. PC is adjusted backward in cycle 5.2 so it points to the currently running REV instruction. After the interrupt, rule evaluation will resume, but the values that were stored on the stack for index registers, accumulator A, and CCR will cause the operation to pick up where it left off. In cycle 6.2, the X index register is adjusted backward by one because the last rule byte needs to be re-fetched when the REV instruction resumes. After cycle 6.2, the REV instruction is finished, and execution would continue to the normal interrupt processing flow.
9.5.2 Weighted Rule Evaluation (REVW) This instruction implements a weighted variation of min-max rule evaluation. The weighting factors are stored in a table with one 8-bit entry per rule. The weight is used to multiply the truth value of the rule (minimum of all antecedents) by a value from zero to one to get the weighted result. This weighted result is then applied to the consequents, just as it would be for unweighted rule evaluation. Since the REVW instruction is essentially a list-processing instruction, execution time is dependent on the number of rules and the number of elements in the rule list. The REVW instruction is interruptible (typically within three to five bus cycles), so it does not adversely affect worst case interrupt latency. Since all intermediate results and instruction status are held in stacked CPU registers, the interrupt service code can even include independent REV and REVW instructions. The rule structure is different for REVW than for REV. For REVW, the rule list is made up of 16-bit elements rather than 8-bit elements. Each antecedent is represented by the full 16-bit address of the corresponding fuzzy input. Each rule consequent is represented by the full address of the corresponding fuzzy output. The markers separating antecedents from consequents are the reserved 16-bit value $FFFE, and the end of the last rule is marked by the reserved 16-bit value $FFFF. Since $FFFE and $FFFF correspond to the addresses of the reset vector, there would never be a fuzzy input or output at either of these locations. 9.5.2.1 Set Up Prior to Executing REVW Some CPU registers and memory locations need to be set up prior to executing the REVW instruction. X and Y index registers are used as index pointers to the rule list and the list of rule weights. The A accumulator is used for intermediate calculation results and needs to be set to $FF initially. The V condition code bit is used as an instruction status indicator that shows whether antecedents or consequents are being processed. Initially the V bit is cleared to zero to indicate antecedents are being processed. The C condition code bit is used to indicate whether rule weights are to be used (1) or not (0). The fuzzy outputs (working RAM locations) need to be cleared to $00. If these values are not initialized before executing the REVW instruction, results will be erroneous. The X index register is set to the address of the first element in the rule list (in the knowledge base). The REVW instruction automatically updates this
S12CPUV2 Reference Manual, Rev. 4.0 Freescale Semiconductor 359
pointer so that the instruction can resume correctly if it is interrupted. After the REVW instruction finishes, X will point at the next address past the $FFFF separator word that marks the end of the rule list. The Y index register is set to the starting address of the list of rule weights. Each rule weight is an 8-bit value. The weighted result is the truncated upper eight bits of the 16-bit result, which is derived by multiplying the minimum rule antecedent value ($00$FF) by the weight plus one ($001$100). This method of weighting rules allows an 8-bit weighting factor to represent a value between zero and one inclusive. The 8-bit A accumulator is used to hold intermediate calculation results during execution of the REVW instruction. During antecedent processing, A starts out at $FF and is replaced by any smaller fuzzy input that is referenced by a rule antecedent. If rule weights are enabled by the C condition code bit equal one, the rule truth value is multiplied by the rule weight just before consequent processing starts. During consequent processing, A holds the truth value (possibly weighted) for the rule. This truth value is stored to any fuzzy output that is referenced by a rule consequent, unless that fuzzy output is already larger (MAX). Before starting to execute REVW, A must be set to $FF (the largest 8-bit value) because rule evaluation always starts with processing of the antecedents of the first rule. For subsequent rules in the list, A is automatically set to $FF when the instruction detects the $FFFE marker word between the last consequent of the previous rule, and the first antecedent of a new rule. Both the C and V condition code bits must be set up prior to starting a REVW instruction. Once the REVW instruction starts, the C bit remains constant and the value in the V bit is automatically maintained as $FFFE separator words are detected. The final requirement to clear all fuzzy outputs to $00 is part of the MAX algorithm. Each time a rule consequent references a fuzzy output, that fuzzy output is compared to the truth value (weighted) for the current rule. If the current truth value is larger, it is written over the previous value in the fuzzy output. After all rules have been evaluated, the fuzzy output contains the truth value for the most-true rule that referenced that fuzzy output. After REVW finishes, A will hold the truth value (weighted) for the last rule in the rule list. The V condition code bit should be one because the last element before the $FFFF end marker should have been a rule consequent. If V is zero after executing REVW, it indicates the rule list was structured incorrectly.
S12CPUV2 Reference Manual, Rev. 4.0 360 Freescale Semiconductor
9.5.2.2 Interrupt Details The REVW instruction includes a 3-cycle processing loop for each word in the rule list (this loop expands to five cycles between antecedents and consequents to allow time for the multiplication with the rule weight). Within this loop, a check is performed to see if any qualified interrupt request is pending. If an interrupt is detected, the current CPU registers are stacked and the interrupt is honored. When the interrupt service routine finishes, an RTI instruction causes the CPU to recover its previous context from the stack, and the REVW instruction is resumed as if it had not been interrupted. The stacked value of the program counter (PC), in case of an interrupted REVW instruction, points to the REVW instruction rather than the instruction that follows. This causes the CPU to try to execute a new REVW instruction upon return from the interrupt. Since the CPU registers (including the C bit and V bit in the condition codes register) indicate the current status of the interrupted REVW instruction, this effectively causes the rule evaluation operation to resume from where it left off. 9.5.2.3 Cycle-by-Cycle Details for REVW The central element of the REVW instruction is a 3-cycle loop that is executed once for each word in the rule list. For the special case pass (where the $FFFE separator word is read between the rule antecedents and the rule consequents, and weights are enabled by the C bit equal one), this loop takes five cycles. There is a small amount of housekeeping activity to get this loop started as REVW begins and a small sequence to end the instruction. If an interrupt comes, there is a special small sequence to save CPU status on the stack before the interrupt is serviced. Figure 9-10 is a detailed flow diagram for the REVW instruction. Each rectangular box represents one CPU clock cycle. Decision blocks and connecting arrows are considered to take no time at all. The letters in the small rectangles in the upper left corner of each bold box correspond to the execution cycle codes (refer to Section 6. Instruction Glossary for details). Lower case letters indicate a cycle where 8-bit or no data is transferred. Upper case letters indicate cycles where 16-bit data could be transferred.
START
1.0 - O 2.0 - R
READ PROGRAM WORD IF $18 MISALIGNED READ WORD @ 0,X (RULE ELEMENT Rx)
4.0 - t IF Rx = $FFFE IF V = 0, THEN TMP2 = TMP2 + 1 IF V = 0 AND C = 1, THEN READ RULE WEIGHT @,TMP2 ELSE NO BUS ACCESS TOGGLE V BIT; IF V NOW 0, A = $FF
UPDATE Rx WITH VALUE READ IN CYC 2 OR 5 IF Rx = $FFFF THEN NO BUS ACCESS IF Rx = OTHER THEN READ BYTE @,Rx FUZZY IN/OUT FRx
NO
INTERRUPT PENDING?
YES
5.0 - T
5.3 - f
NO BUS ACCESS
MAX V = 1 & RX $FFFE or $FFFF 6.1 - x IF A > FRx WRITE A TO Rx ELSE NO BUS ACCESS
IF (Rx = $FFFE OR $FFFE) AND V = 0 THEN TMP2 = TMP2 1 8.3 - f NO BUS ACCESS
A = MIN(A, FRx)
6.2 - f NO Rx = $FFFF (END OF RULES)? YES 7.0 - O READ PROGRAM WORD IF $3B MISALIGNED
NO BUS ACCESS
FINISH MULTIPLY
END
In cycle 2.0, the first element of the rule list (a 16-bit address) is read from memory. Due to propagation delays, this value cannot be used for calculations until two cycles later (cycle 4.0). The X index register, which is used to access information from the rule list, is incremented by two to point at the next element of the rule list. The operations performed in cycle 4.0 depend on the value of the word read from the rule list. $FFFE is a special token that indicates a transition from antecedents to consequents or from consequents to antecedents of a new rule. The V bit can be used to decide which transition is taking place, and V is toggled each time the $FFFE token is detected. If V was zero, a change from antecedents to consequents is taking place, and it is time to apply weighting (provided it is enabled by the C bit equal one). The address in TMP2 (derived from Y) is used to read the weight byte from memory. In this case, there is no bus access in cycle 5.0, but the index into the rule list is updated to point to the next rule element. The old value of X (X0) is temporarily held on internal nodes, so it can be used to access a rule word in cycle 7.2. The read of the rule word is timed to start two cycles before it will be used in cycle 4.0 of the next loop pass. The actual multiply takes place in cycles 6.2 through 8.2. The 8-bit weight from memory is incremented (possibly overflowing to $100) before the multiply, and the upper eight bits of the 16-bit internal result is used as the weighted result. By using weight+1, the result can range from 0.0 times A to 1.0 times A. After 8.2, flow continues to the next loop pass at cycle 4.0. At cycle 4.0, if Rx is $FFFE and V was one, a change from consequents to antecedents of a new rule is taking place, so accumulator A must be reinitialized to $FF. During processing of rule antecedents, A is updated with the smaller of A, or the current fuzzy input (cycle 6.0). Cycle 5.0 is usually used to read the next rule word and update the pointer in X. This read is skipped if the current Rx is $FFFF (end of rules mark). If this is a weight multiply pass, the read is delayed until cycle 7.2. During processing of consequents, cycle 6.1 is used to optionally update a fuzzy output if the value in accumulator A is larger. After all rules have been processed, cycle 7.0 is used to update the PC to point at the next instruction. If weights were enabled, Y is updated to point at the location that immediately follows the last rule weight.
Si Fi
Where n is the number of labels of a system output, Si are the singleton positions from the knowledge base, and Fi are fuzzy outputs from RAM. Si and Fi are 8-bit values. The 8-bit B accumulator holds the iteration count n. Internal temporary registers hold intermediate sums, 24 bits for the numerator and 16 bits for the denominator. This makes this instruction suitable for n values up to 255 although eight is a more typical value. The final long division is performed with a separate EDIV instruction immediately after the WAV instruction. The WAV instruction returns the numerator and denominator sums in the correct registers for the EDIV. (EDIV performs the unsigned division Y = Y : D / X; remainder in D.) Execution time for this instruction depends on the number of iterations (labels for the system output). WAV is interruptible so that worst case interrupt latency is not affected by the execution time for the complete weighted average operation. WAV includes initialization for the 24-bit and 16-bit partial sums so the first entry into WAV looks different than a resume from interrupt operation. The CPU12 handles this difficulty with a pseudo-instruction (wavr), which is specifically intended to resume an interrupted weighted average calculation. Refer to 9.6.3 Cycle-by-Cycle Details for WAV and wavr for more detail. 9.6.1 Set Up Prior to Executing WAV Before executing the WAV instruction, index registers X and Y and accumulator B must be set up. Index register X is a pointer to the Si singleton list. X must have the address of the first singleton value in the knowledge base. Index register Y is a pointer to the fuzzy outputs Fi. Y must have the address of the first fuzzy output for this system output. B is the iteration count n. The B accumulator must be set to the number of labels for this system output.
S12CPUV2 Reference Manual, Rev. 4.0 364 Freescale Semiconductor
9.6.2 WAV Interrupt Details The WAV instruction includes a 7-cycle processing loop for each label of the system output (8 cycles in M68HC12). Within this loop, the CPU checks whether a qualified interrupt request is pending. If an interrupt is detected, the current values of the internal temporary registers for the 24-bit and 16-bit sums are stacked, the CPU registers are stacked, and the interrupt is serviced. A special processing sequence is executed when an interrupt is detected during a weighted average calculation. This exit sequence adjusts the PC so that it points to the second byte of the WAV object code ($3C), before the PC is stacked. Upon return from the interrupt, the $3C value is interpreted as a wavr pseudo-instruction. The wavr pseudo-instruction causes the CPU to execute a special WAV resumption sequence. The wavr recovery sequence adjusts the PC so that it looks like it did during execution of the original WAV instruction, then jumps back into the WAV processing loop. If another interrupt occurs before the weighted average calculation finishes, the PC is adjusted again as it was for the first interrupt. WAV can be interrupted any number of times, and additional WAV instructions can be executed while a WAV instruction is interrupted.
9.6.3 Cycle-by-Cycle Details for WAV and wavr The WAV instruction is unusual in that the logic flow has two separate entry points. The first entry point is the normal start of a WAV instruction. The second entry point is used to resume the weighted average operation after a WAV instruction has been interrupted. This recovery operation is called the wavr pseudo-instruction. Figure 9-12 is a flow diagram of the WAV instruction in the HCS12, including the wavr pseudo-instruction. Figure 9-12 is a flow diagram of the WAV instruction in the M68HC12, including the wavr pseudo-instruction. Each rectangular box in these figures represents one CPU clock cycle. Decision blocks and connecting arrows are considered to take no time at all. The letters in the small rectangles in the upper left corner of the boxes correspond to execution cycle codes (refer to Section 6. Instruction Glossary for details). Lower case letters indicate a cycle where 8-bit or no data is transferred. Upper case letters indicate cycles where 16-bit data could be transferred. The cycle-by-cycle description provided here refers to the HCS12 flow in Figure 9-11. In terms of cycle-by-cycle bus activity, the $18 page select
S12CPUV2 Reference Manual, Rev. 4.0 Freescale Semiconductor 365
prebyte is treated as a special 1-byte instruction. In cycle 1.0 of the WAV instruction, one word of program information will be fetched into the instruction queue if the $18 is located at an odd address. If the $18 is at an even address, the instruction queue cannot advance so there is no bus access in this cycle.
WAV wavr
1.0 - O 2.0 - f
1.1 - U
SP = SP + 2 4.0 - f READ BYTE @ 0,Y (FUZZY OUTPUT Fi) 4.1 - r READ BYTE @ 1,Y (FUZZY OUTPUT Fi)
Y = Y + 1 point at next fuzzy output 5.0 - r READ BYTE @ 0,X (SINGLETON Si) 5.1 - r READ BYTE @ 1,X (SINGLETON Si)
YES INTERRUPT PENDING? NO 6.0 - f NO BUS ACCESS 6.1 - S WRITE WORD @ 2,SP (STACK TMP3)
TMP1 = TMP1 + (CARRY FROM PPROD ADD) CONTINUE TO INTERRUPT STACKING NO B = 0? YES 10.0 - O READ PROGRAM WORD IF $3C MISALIGNED
END
Figure 9-11. WAV and wavr Instruction Flow Diagram (for HCS12)
WAV wavr 1.0 - O 2.0 - f 3.0 - f READ PROGRAM WORD IF $18 MISALIGNED NO BUS ACCESS NO BUS ACCESS 2.1 - U READ WORD @ 0,SP (UNSTACK TMP3)
B = B 1 DECREMENT ITERATION COUNTER 5.0 - r READ BYTE @ 0,Y (FUZZY OUTPUT Fi)
SP = SP + 2 5.1 - r 6.1 - r READ BYTE @ 1,Y (FUZZY OUTPUT Fi) READ BYTE @ 1,X (SINGLETON Si)
Y = Y + 1 point at next fuzzy output 6.0 - r READ BYTE @ 0,X (SINGLETON Si)
YES INTERRUPT PENDING? NO 7.0 - f NO BUS ACCESS 7.1 - S WRITE WORD @ 2,SP (STACK TMP1)
TMP3 = TMP3 + (CARRY FROM PPROD ADD) NO B = 0? YES 12.0 - O READ PROGRAM WORD IF $3C MISALIGNED
END
Figure 9-12. WAV and wavr Instruction Flow Diagram (for M68HC12)
In cycle 2.0, three internal 16-bit temporary registers are cleared in preparation for summation operations, but there is no bus access. The WAV instruction maintains a 32-bit sum-of-products in TMP1 : TMP2 and a 16-bit sum-of-weights in TMP3. By keeping these sums inside the CPU, bus accesses are reduced and the WAV operation is optimized for high speed. Cycles 3.0 through 9.0 form the 7-cycle main loop for WAV. The value in the 8-bit B accumulator is used to count the number of loop iterations. B is decremented at the top of the loop in cycle 3.0, and the test for zero is located at the bottom of the loop after cycle 9.0. Cycle 4.0 and 5.0 are used to fetch the 8-bit operands for one iteration of the loop. X and Y index registers are used to access these operands. The index registers are incremented as the operands are fetched. Cycle 6.0 is used to accumulate the current fuzzy output into TMP3. Cycles 7.0 through 9.0 are used to perform the eight by eight multiply of Fi times Si, and accumulate this result into TMP1 : TMP2. Even though the sum-of-products will not exceed 24 bits, the sum is maintained in the 32-bit combined TMP1 : TMP2 register because it is easier to use existing 16-bit operations than it would be to create a new smaller operation to handle the high order bits of this sum. Since the weighted average operation could be quite long, it is made to be interruptible. The usual longest latency path is from very early in cycle 6.0, through cycle 9.0, to the top of the loop to cycle 3.0, through cycle 5.0 to the interrupt check. If the WAV instruction is interrupted, the internal temporary registers TMP3, TMP2, and TMP1 need to be stored on the stack so the operation can be resumed. Since the WAV instruction included initialization in cycle 2.0, the recovery path after an interrupt needs to be different. The wavr pseudo-instruction has the same opcode as WAV, but it is on the first page of the opcode map so there is no page prebyte ($18) like there is for WAV. When WAV is interrupted, the PC is adjusted to point at the second byte of the WAV object code, so that it will be interpreted as the wavr pseudo-instruction on return from the interrupt, rather than the WAV instruction. During the recovery sequence, the PC is readjusted in case another interrupt comes before the weighted average operation finishes. The resume sequence includes recovery of the temporary registers from the stack (1.1 through 3.1), and reads to get the operands for the current iteration. The normal WAV flow is then rejoined at cycle 6.0. Upon normal completion of the instruction (cycle 10.0), the PC is adjusted so it points to the next instruction. The results are transferred from the TMP registers into CPU registers in such a way that the EDIV instruction can be
S12CPUV2 Reference Manual, Rev. 4.0 368 Freescale Semiconductor
used to divide the sum-of-products by the sum-of-weights. TMP1 : TMP2 is transferred into Y : D and TMP3 is transferred into X.
9.7.1 Fuzzification Variations The MEM instruction supports trapezoidal membership functions and several other varieties, including membership functions with vertical sides (infinite slope sides). Triangular membership functions are a subset of trapezoidal functions. Some practitioners refer to s-, z-, and -shaped membership functions. These refer to a trapezoid butted against the right end of the x-axis, a trapezoid butted against the left end of the x-axis, and a trapezoidal membership function that isnt butted against either end of the x-axis, respectively. Many other membership function shapes are possible, if memory space and processing bandwidth are sufficient. Tabular membership functions offer complete flexibility in shape and very fast evaluation time. However, tables take a very large amount of memory space (as many as 256 bytes per label of one system input). The excessive size to specify tabular membership functions makes them impractical for most microcontroller-based fuzzy systems. The CPU12 instruction set includes two instructions (TBL and ETBL) for lookup and interpolation of compressed tables. The TBL instruction uses 8-bit table entries (y-values) and returns an 8-bit result. The ETBL instruction uses 16-bit table entries (y-values) and returns a 16-bit result. A flexible indexed addressing mode is used to identify the effective address of the data point at the beginning of the line segment, and the data value for the end point of the line segment is the next consecutive memory location (byte for TBL and word for ETBL). In both cases, the B
accumulator represents the ratio of (the x-distance from the beginning of the line segment to the lookup point) to (the x-distance from the beginning of the line segment to the end of the line segment). B is treated as an 8-bit binary fraction with radix point left of the MSB, so each line segment can effectively be divided into 256 pieces. During execution of the TBL or ETBL instruction, the difference between the end point y-value and the beginning point y-value (a signed byte-TBL or word-ETBL) is multiplied by the B accumulator to get an intermediate delta-y term. The result is the y-value of the beginning point, plus this signed intermediate delta-y value. Because indexed addressing mode is used to identify the starting point of the line segment of interest, there is a great deal of flexibility in constructing tables. A common method is to break the x-axis range into 256 equal width segments and store the y value for each of the resulting 257 endpoints. The 16-bit D accumulator is then used as the x input to the table. The upper eight bits (A) is used as a coarse lookup to find the line segment of interest, and the lower eight bits (B) is used to interpolate within this line segment. In the program sequence LDX #TBL_START LDD DATA_IN TBL A,X The notation A,X causes the TBL instruction to use the Ath line segment in the table. The low-order half of D (B) is used by TBL to calculate the exact data value from this line segment. This type of table uses only 257 entries to approximate a table with 16 bits of resolution. This type of table has the disadvantage of equal width line segments, which means just as many points are needed to describe a flat portion of the desired function as are needed for the most active portions. Another type of table stores x:y coordinate pairs for the endpoints of each linear segment. This type of table may reduce the table storage space compared to the previous fixed-width segments because flat areas of the functions can be specified with a single pair of endpoints. This type of table is a little harder to use with the CPU12 TBL and ETBL instructions because the table instructions expect y-values for segment endpoints to be in consecutive memory locations. Consider a table made up of an arbitrary number of x:y coordinate pairs, where all values are eight bits. The table is entered with the x-coordinate of the desired point to lookup in the A accumulator. When the table is exited, the corresponding y-value is in the A accumulator. Figure 9-13 shows one way to work with this type of table.
BEGIN FIND_LOOP
;setup initial table pointer ;find first Xn > XL ;(auto pre-inc Y by 2) BLS FIND_LOOP ;loop if XL .le. Xn * on fall thru, XB@-2,Y YB@-1,Y XE@0,Y and YE@1,Y TFR D,X ;save XL in high half of X CLRA ;zero upper half of D LDAB 0,Y ;D = 0:XE SUBB -2,Y ;D = 0:(XE-XB) EXG D,X ;X = (XE-XB).. D = XL:junk SUBA -2,Y ;A = (XL-XB) EXG A,D ;D = 0:(XL-XB), uses trick of EXG FDIV ;X reg = (XL-XB)/(XE-XB) EXG D,X ;move fractional result to A:B EXG A,B ;byte swap - need result in B TSTA ;check for rounding BPL NO_ROUND INCB ;round B up by 1 NO_ROUND LDAA 1,Y ;YE PSHA ;put on stack for TBL later LDAA -1,Y ;YB PSHA ;now YB@0,SP and YE@1,SP TBL 2,SP+ ;interpolate and deallocate ;stack temps
LDY CMPA
#TABLE_START-2 2,+Y
Figure 9-13. Endpoint Table Handling The basic idea is to find the segment of interest, temporarily build a 1-segment table of the correct format on the stack, then use TBL with stack relative indexed addressing to interpolate. The most difficult part of the routine is calculating the proportional distance from the beginning of the segment to the lookup point versus the width of the segment ((XLXB)/(XEXB)). With this type of table, this calculation must be done at run time. In the previous type of table, this proportional term is an inherent part (the lowest order bits) of the data input to the table. Some fuzzy theorists have suggested membership functions should be shaped like normal distribution curves or other mathematical functions. This may be correct, but the processing requirements to solve for an intercept on such a function would be unacceptable for most microcontroller-based fuzzy systems. Such a function could be encoded into a table of one of the previously described types. For many common systems, the thing that is most important about membership function shape is that there is a gradual transition from non-membership to membership as the system input value approaches the central range of the membership function. Examine the human problem of stopping a car at an intersection. Rules such as If intersection is close and speed is fast, apply brakes might be used.
The meaning (reflected in membership function shape and position) of the labels close and fast will be different for a teenager than they are for a grandmother, but both can accomplish the goal of stopping. It makes intuitive sense that the exact shape of a membership function is much less important than the fact that it has gradual boundaries.
9.7.2 Rule Evaluation Variations The REV and REVW instructions expect fuzzy input and fuzzy output values to be 8-bit values. In a custom fuzzy inference program, higher resolution may be desirable (although this is not a common requirement). The CPU12 includes variations of minimum and maximum operations that work with the fuzzy MIN-MAX inference algorithm. The problem with the fuzzy inference algorithm is that the min and max operations need to store their results differently, so the min and max instructions must work differently or more than one variation of these instructions is needed. The CPU12 has MIN and MAX instructions for 8- or 16-bit operands, where one operand is in an accumulator and the other is a referenced memory location. There are separate variations that replace the accumulator or the memory location with the result. While processing rule antecedents in a fuzzy inference program, a reference value must be compared to each of the referenced fuzzy inputs, and the smallest input must end up in an accumulator. The instruction EMIND 2,X+ ;process one rule antecedent automates the central operations needed to process rule antecedents. The E stands for extended, so this instruction compares 16-bit operands. The D at the end of the mnemonic stands for the D accumulator, which is both the first operand for the comparison and the destination of the result. The 2,X+ is an indexed addressing specification that says X points to the second operand for the comparison and it will be post-incremented by 2 to point at the next rule antecedent. When processing rule consequents, the operand in the accumulator must remain constant (in case there is more than one consequent in the rule), and the result of the comparison must replace the referenced fuzzy output in RAM. To do this, use the instruction EMAXM 2,X+ ;process one rule consequent The M at the end of the mnemonic indicates that the result will replace the referenced memory operand. Again, indexed addressing is used. These two
instructions would form the working part of a 16-bit resolution fuzzy inference routine. There are many other methods of performing inference, but none of these are as widely used as the min-max method. Since the CPU12 is a general-purpose microcontroller, the programmer has complete freedom to program any algorithm desired. A custom programmed algorithm would typically take more code space and execution time than a routine that used the built-in REV or REVW instructions.
9.7.3 Defuzzification Variations Other CPU12 instructions can help with custom defuzzification routines in two main areas: The first case is working with operands that are more than eight bits. The second case involves using an entirely different approach than weighted average of singletons.
The primary part of the WAV instruction is a multiply and accumulate operation to get the numerator for the weighted average calculation. When working with operands as large as 16 bits, the EMACS instruction could at least be used to automate the multiply and accumulate function. The CPU12 has extended math capabilities, including the EMACS instruction which uses 16-bit input operands and accumulates the sum to a 32-bit memory location and 32-bit by 16-bit divide instructions. One benefit of the WAV instruction is that both a sum of products and a sum of weights are maintained, while the fuzzy output operand is only accessed from memory once. Since memory access time is such a significant part of execution time, this provides a speed advantage compared to conventional instructions. The weighted average of singletons is the most commonly used technique in microcontrollers because it is computationally less difficult than most other methods. The simplest method is called max defuzzification, which simply uses the largest fuzzy output as the system result. However, this approach does not take into account any other fuzzy outputs, even when they are almost as true as the chosen max output. Max defuzzification is not a good general choice because it only works for a subset of fuzzy logic applications.
The CPU12 is well suited for more computationally challenging algorithms than weighted average. A 32-bit by 16-bit divide instruction takes 11 or 12 25-MHz cycles for unsigned or signed variations. A 16-bit by 16-bit multiply with a 32-bit result takes only three 25-MHz cycles. The EMACS instruction uses 16-bit operands and accumulates the result in a 32-bit memory location, taking only 12 25-MHz cycles per iteration, including accessing all operands from memory and storing the result to memory.
15
INDEX REGISTER X
15
INDEX REGISTER Y
15
SP
STACK POINTER
15
PC
PROGRAM COUNTER
S X H I N Z V C
CONDITION CODE REGISTER CARRY OVERFLOW ZERO NEGATIVE MASK (DISABLE) IRQ INTERRUPTS HALF-CARRY (USED IN BCD ARITHMETIC) MASK (DISABLE) XIRQ INTERRUPTS RESET OR XIRQ SET X, INSTRUCTIONS MAY CLEAR X BUT CANNOT SET X STOP DISABLE (IGNORE STOP OPCODES) RESET DEFAULT IS 1
STACK UPON ENTRY TO SERVICE ROUTINE IF SP WAS ODD BEFORE INTERRUPT SP +8 SP +6 SP +4 SP +2 SP SP 2 RTNLO YLO XLO A CCR RTNHI YHI XHI B SP +9 SP +7 SP +5 SP +3 SP +1 SP 1
STACK UPON ENTRY TO SERVICE ROUTINE IF SP WAS EVEN BEFORE INTERRUPT SP +9 SP +7 SP +5 SP +4 SP +1 SP 1 RTNHI YHI XHI B RTNLO YLO XLO A CCR SP +10 SP +8 SP +6 SP +4 SP +2 SP
Explanation of Italic Expressions in Source Form Column abc A or B or CCR abcdxys A or B or CCR or D or X or Y or SP. Some assemblers also allow T2 or T3. abd A or B or D abdxys A or B or D or X or Y or SP dxys D or X or Y or SP msk8 8-bit mask, some assemblers require # symbol before value opr8i 8-bit immediate value opr16i 16-bit immediate value opr8a 8-bit address used with direct address mode opr16a 16-bit address value oprx0_xysp Indexed addressing postbyte code: oprx3,xys Predecrement X or Y or SP by 1 . . . 8 oprx3,+xys Preincrement X or Y or SP by 1 . . . 8 oprx3,xys Postdecrement X or Y or SP by 1 . . . 8 oprx3,xys+ Postincrement X or Y or SP by 1 . . . 8 oprx5,xysp 5-bit constant offset from X or Y or SP or PC abd,xysp Accumulator A or B or D offset from X or Y or SP or PC oprx3 Any positive integer 1 . . . 8 for pre/post increment/decrement oprx5 Any integer in the range 16 . . . +15 oprx9 Any integer in the range 256 . . . +255 oprx16 Any integer in the range 32,768 . . . 65,535 page 8-bit value for PPAGE, some assemblers require # symbol before this value rel8 Label of branch destination within 128 to +127 locations rel9 Label of branch destination within 256 to +255 locations rel16 Any label within 64K memory space trapnum Any 8-bit integer in the range $30-$39 or $40-$FF xys X or Y or SP xysp X or Y or SP or PC Operators + Addition Subtraction + Logical AND Logical OR (inclusive) Continued on next page
Operators (continued) Logical exclusive OR M : Multiplication Division Negation. Ones complement (invert each bit of M) Concatenate Example: A : B means the 16-bit value formed by concatenating 8-bit accumulator A with 8-bit accumulator B. A is in the high-order position. Transfer Example: (A) M means the content of accumulator A is transferred to memory location M. Exchange Example: D X means exchange the contents of D with those of X.
Address Mode Notation INH Inherent; no operands in object code IMM Immediate; operand in object code DIR Direct; operand is the lower byte of an address from $0000 to $00FF EXT Operand is a 16-bit address REL Twos complement relative offset; for branch instructions IDX Indexed (no extension bytes); includes: 5-bit constant offset from X, Y, SP, or PC Pre/post increment/decrement by 1 . . . 8 Accumulator A, B, or D offset IDX1 9-bit signed offset from X, Y, SP, or PC; 1 extension byte IDX2 16-bit signed offset from X, Y, SP, or PC; 2 extension bytes [IDX2] Indexed-indirect; 16-bit offset from X, Y, SP, or PC [D, IDX] Indexed-indirect; accumulator D offset from X, Y, SP, or PC Machine Coding dd 8-bit direct address $0000 to $00FF. (High byte assumed to be $00). ee High-order byte of a 16-bit constant offset for indexed addressing. eb Exchange/Transfer post-byte. See Table A-5 on page 399. ff Low-order eight bits of a 9-bit signed constant offset for indexed addressing, or low-order byte of a 16-bit constant offset for indexed addressing. hh High-order byte of a 16-bit extended address. ii 8-bit immediate data value. jj High-order byte of a 16-bit immediate data value. kk Low-order byte of a 16-bit immediate data value. lb Loop primitive (DBNE) post-byte. See Table A-6 on page 400. ll Low-order byte of a 16-bit extended address. mm 8-bit immediate mask value for bit manipulation instructions. Set bits indicate bits to be affected. pg Program page (bank) number used in CALL instruction.
qq High-order byte of a 16-bit relative offset for long branches. tn Trap number $30$39 or $40$FF. rr Signed relative offset $80 (128) to $7F (+127). Offset relative to the byte following the relative offset byte, or low-order byte of a 16-bit relative offset for long branches. xb Indexed addressing post-byte. See Table A-3 on page 397 and Table A-4 on page 398. Access Detail Each code letter except (,), and comma equals one CPU cycle. Uppercase = 16-bit operation and lowercase = 8-bit operation. For complex sequences see the CPU12 Reference Manual (CPU12RM/AD) for more detailed information. f g I i n O Free cycle, CPU doesnt use bus Read PPAGE internally Read indirect pointer (indexed indirect) Read indirect PPAGE value (CALL indirect only) Write PPAGE internally Optional program word fetch (P) if instruction is misaligned and has an odd number of bytes of object code otherwise, appears as a free cycle (f); Page 2 prebyte treated as a separate 1-byte instruction Program word fetch (always an aligned-word read) 8-bit data read 16-bit data read 8-bit stack write 16-bit stack write 8-bit data write 16-bit data write 8-bit stack read 16-bit stack read 16-bit vector fetch (always an aligned-word read) 8-bit conditional read (or free cycle) 16-bit conditional read (or free cycle) 8-bit conditional write (or free cycle) Indicate a microcode loop Indicates where an interrupt could be honored Special Cases PPP/P Short branch, PPP if branch taken, P if not OPPP/OPO Long branch, OPPP if branch taken, OPO if not
P r R s S w W u U V t T x () ,
Condition Codes Columns Status bit not affected by operation. 0 Status bit cleared by operation. 1 Status bit set by operation. Status bit affected by operation. Status bit may be cleared or remain set, but is not set by operation. Status bit may be set or remain cleared, but is not cleared by operation. ? Status bit may be changed by operation but the final state is not defined. ! Status bit used for a special purpose.
M68HC12
SXHI
NZVC
OO PP1 PP1
ll ff ee ff ee ff
P rfP rOP rfP rPO frPP fIfrfP fIPrfP P rfP rOP rfP rPO frPP fIfrfP fIPrfP P rfP rOP rfP rPO frPP fIfrfP fIPrfP P rfP rOP rfP rPO frPP fIfrfP fIPrfP OP RfP ROP RfP RPO fRPP fIfRfP fIPRfP P rfP rOP rfP rPO frPP fIfrfP fIPrfP P rfP rOP rfP rPO frPP fIfrfP fIPrfP
ll ff ee ff ee ff
ll ff ee ff ee ff
ll ff ee ff ee ff kk ll ff ee ff ee ff
ll ff ee ff ee ff
ll ff ee ff ee ff
10 ii
Note 1. Due to internal CPU requirements, the program word fetch is performed twice to the same address during this instruction.
Operation
Addr. Mode EXT IDX IDX1 IDX2 [D,IDX] [IDX2] INH INH INH 78 68 68 68 68 68 48 58 59
M68HC12
rOPw rPw rPOw frPPw fIfrPw fIPrPw O O O
SXHI
NZVC
b0
Arithmetic Shift Right Accumulator A Arithmetic Shift Right Accumulator B Branch if Carry Clear (if C = 0) (M) (mm) M Clear Bit(s) in Memory
24 rr dd hh xb xb xb mm ll mm mm ff mm ee ff mm
rPwO rPwP rPwO rPwP frPwPO PPP/P1 PPP/P1 PPP/P1 VfPPP PPP/P1 PPP/P1 PPP/P1
Branch if Carry Set (if C = 1) Branch if Equal (if Z = 1) Branch if Greater Than or Equal (if N V = 0) (signed) Place CPU in Background Mode see CPU12 Reference Manual Branch if Greater Than (if Z + (N V) = 0) (signed) Branch if Higher (if C + Z = 0) (unsigned) Branch if Higher or Same (if C = 0) (unsigned) same function as BCC (A) (M) Logical AND A with Memory Does not change Accumulator or Memory
25 rr 27 rr 2C rr 00 2E rr 22 rr 24 rr
BITA #opr8i BITA opr8a BITA opr16a BITA oprx0_xysp BITA oprx9,xysp BITA oprx16,xysp BITA [D,xysp] BITA [oprx16,xysp] BITB #opr8i BITB opr8a BITB opr16a BITB oprx0_xysp BITB oprx9,xysp BITB oprx16,xysp BITB [D,xysp] BITB [oprx16,xysp] BLE rel8 BLO rel8
IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] REL REL
85 95 B5 A5 A5 A5 A5 A5 C5 D5 F5 E5 E5 E5 E5 E5
ii dd hh xb xb xb xb xb ii dd hh xb xb xb xb xb
ll ff ee ff ee ff
P rPf rPO rPf rPO frPP fIfrPf fIPrPf P rPf rPO rPf rPO frPP fIfrPf fIPrPf PPP/P1 PPP/P1
P rfP rOP rfP rPO frPP fIfrfP fIPrfP P rfP rOP rfP rPO frPP fIfrfP fIPrfP PPP/P1 PPP/P1
(B) (M) Logical AND B with Memory Does not change Accumulator or Memory
ll ff ee ff ee ff
Branch if Less Than or Equal (if Z + (N V) = 1) (signed) Branch if Lower (if C = 1) (unsigned) same function as BCS
2F rr 25 rr
Note 1. PPP/P indicates this instruction takes three cycles to refill the instruction queue if the branch is taken and one program fetch cycle if the branch is not taken.
M68HC12
PPP/P
1
SXHI
NZVC
PPP/P1 PPP/P1 PPP/P1 PPP/P1 PPP rPPP rfPPP rPPP rffPPP frPffPPP P rPPP rfPPP rPPP rffPPP frPffPPP rPOw rPPw rPOw rPwP frPwOP PPPS
PPP/P1 PPP rPPP rfPPP rPPP rfPPP PrfPPP P rPPP rfPPP rPPP rfPPP PrfPPP rPwO rPwP rPwO rPwP frPwPO SPPP
BRCLR opr8a, msk8, rel8 Branch if (M) (mm) = 0 BRCLR opr16a, msk8, rel8 (if All Selected Bit(s) Clear) BRCLR oprx0_xysp, msk8, rel8 BRCLR oprx9,xysp, msk8, rel8 BRCLR oprx16,xysp, msk8, rel8 BRN rel8 Branch Never (if 1 = 0) BRSET opr8, msk8, rel8 Branch if (M) (mm) = 0 BRSET opr16a, msk8, rel8 (if All Selected Bit(s) Set) BRSET oprx0_xysp, msk8, rel8 BRSET oprx9,xysp, msk8, rel8 BRSET oprx16,xysp, msk8, rel8 BSET opr8, msk8 BSET opr16a, msk8 BSET oprx0_xysp, msk8 BSET oprx9,xysp, msk8 BSET oprx16,xysp, msk8 BSR rel8 (M) + (mm) M Set Bit(s) in Memory
21 rr
(SP) 2 SP; RTNH:RTNL M(SP):M(SP+1) Subroutine address PC Branch to Subroutine Branch if Overflow Bit Clear (if V = 0) Branch if Overflow Bit Set (if V = 1) (SP) 2 SP; RTNH:RTNL M(SP):M(SP+1) (SP) 1 SP; (PPG) M(SP); pg PPAGE register; Program address PC Call subroutine in extended memory (Program may be located on another expansion memory page.) Indirect modes get program address and new pg value based on pointer.
07 rr
BVC rel8 BVS rel8 CALL opr16a, page CALL oprx0_xysp, page CALL oprx9,xysp, page CALL oprx16,xysp, page CALL [D,xysp] CALL [oprx16, xysp]
28 rr 29 rr 4A 4B 4B 4B 4B 4B hh xb xb xb xb xb ll pg pg ff pg ee ff pg ee ff
(A) (B) Compare 8-Bit Accumulators 0C Translates to ANDCC #$FE 0I Translates to ANDCC #$EF (enables I-bit interrupts) 0M Clear Memory Location
18 17 10 FE 10 EF
OO P P
OO P P
CLR opr16a CLR oprx0_xysp CLR oprx9,xysp CLR oprx16,xysp CLR [D,xysp] CLR [oprx16,xysp] CLRA CLRB CLV
0A 0B
79 69 69 69 69 69 87 C7
hh xb xb xb xb xb
ll ff ee ff ee ff
0100
10 FD
Note 1. PPP/P indicates this instruction takes three cycles to refill the instruction queue if the branch is taken and one program fetch cycle if the branch is not taken. CMPA #opr8i CMPA opr8a CMPA opr16a CMPA oprx0_xysp CMPA oprx9,xysp CMPA oprx16,xysp CMPA [D,xysp] CMPA [oprx16,xysp] IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] 81 91 B1 A1 A1 A1 A1 A1 ii dd hh xb xb xb xb xb
P rPf rPO rPf rPO frPP fIfrPf fIPrPf P rfP rOP rfP rPO frPP fIfrfP fIPrfP
ll ff ee ff ee ff
M68HC12
P rfP rOP rfP rPO frPP fIfrfP fIPrfP rOPw rPw rPOw frPPw fIfrPw fIPrPw O O OP RfP ROP RfP RPO fRPP fIfRfP fIPRfP OP RfP ROP RfP RPO fRPP fIfRfP fIPRfP OP RfP ROP RfP RPO fRPP fIfRfP fIPRfP OP RfP ROP RfP RPO fRPP fIfRfP fIPRfP OfO PPP
SXHI
NZVC
ll ff ee ff ee ff ll ff ee ff ee ff
01
(A) A (B) B
jj dd hh xb xb xb xb xb jj dd hh xb xb xb xb xb jj dd hh xb xb xb xb xb jj dd hh xb xb xb xb xb
kk ll ff ee ff ee ff kk ll ff ee ff ee ff kk ll ff ee ff ee ff kk ll ff ee ff ee ff
Adjust Sum to BCD Decimal Adjust Accumulator A (cntr) 1 cntr if (cntr) = 0, then Branch else Continue to next instruction Decrement Counter and Branch if = 0 (cntr = A, B, D, X, Y, or SP)
18 07 04 lb rr
(cntr) 1 cntr If (cntr) not = 0, then Branch; else Continue to next instruction Decrement Counter and Branch if 0 (cntr = A, B, D, X, Y, or SP)
REL (9-bit)
04 lb rr
PPP
M68HC12
rOPw rPw rPOw frPPw fIfrPw fIPrPw O O PP1 O O ffffffffffO OffffffffffO ORROfffRRfWWP
SXHI
NZVC
Decrement A Decrement B
1B 9F 09 03 11 18 14 18 12 hh ll
(X) $0001 X Decrement Index Register X (Y) $0001 Y Decrement Index Register Y (Y:D) (X) Y Remainder D 32 by 16 Bit 16 Bit Divide (unsigned) (Y:D) (X) Y Remainder D 32 by 16 Bit 16 Bit Divide (signed) (M(X):M(X+1)) (M(Y):M(Y+1)) + (M~M+3) M~M+3 16 by 16 Bit 32 Bit Multiply and Accumulate (signed)
EMAXD oprx0_xysp EMAXD oprx9,xysp EMAXD oprx16,xysp EMAXD [D,xysp] EMAXD [oprx16,xysp] EMAXM oprx0_xysp EMAXM oprx9,xysp EMAXM oprx16,xysp EMAXM [D,xysp] EMAXM [oprx16,xysp] EMIND oprx0_xysp EMIND oprx9,xysp EMIND oprx16,xysp EMIND [D,xysp] EMIND [oprx16,xysp] EMINM oprx0_xysp EMINM oprx9,xysp EMINM oprx16,xysp EMINM [D,xysp] EMINM [oprx16,xysp] EMUL EMULS
MAX((D), (M:M+1)) D MAX of 2 Unsigned 16-Bit Values N, Z, V and C status bits reflect result of internal compare ((D) (M:M+1)) MAX((D), (M:M+1)) M:M+1 MAX of 2 Unsigned 16-Bit Values N, Z, V and C status bits reflect result of internal compare ((D) (M:M+1)) MIN((D), (M:M+1)) D MIN of 2 Unsigned 16-Bit Values N, Z, V and C status bits reflect result of internal compare ((D) (M:M+1)) MIN((D), (M:M+1)) M:M+1 MIN of 2 Unsigned 16-Bit Values N, Z, V and C status bits reflect result of internal compare ((D) (M:M+1)) (D) (Y) Y:D 16 by 16 Bit Multiply (unsigned) (D) (Y) Y:D 16 by 16 Bit Multiply (signed) (A) (M) A Exclusive-OR A with Memory
IDX IDX1 IDX2 [D,IDX] [IDX2] IDX IDX1 IDX2 [D,IDX] [IDX2] IDX IDX1 IDX2 [D,IDX] [IDX2] IDX IDX1 IDX2 [D,IDX] [IDX2] INH INH
18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 13
1A 1A 1A 1A 1A 1E 1E 1E 1E 1E 1B 1B 1B 1B 1B 1F 1F 1F 1F 1F
xb xb ff xb ee ff xb xb ee ff xb xb ff xb ee ff xb xb ee ff xb xb ff xb ee ff xb xb ee ff xb xb ff xb ee ff xb xb ee ff
ORPf ORPO OfRPP OfIfRPf OfIPRPf ORPW ORPWO OfRPWP OfIfRPW OfIPRPW ORPf ORPO OfRPP OfIfRPf OfIPRPf ORPW ORPWO OfRPWP OfIfRPW OfIPRPW ffO OfO
ORfP ORPO OfRPP OfIfRfP OfIPRfP ORPW ORPWO OfRPWP OfIfRPW OfIPRPW ORfP ORPO OfRPP OfIfRfP OfIPRfP ORPW ORPWO OfRPWP OfIfRPW OfIPRPW ffO OfO
18 13
EORA #opr8i EORA opr8a EORA opr16a EORA oprx0_xysp EORA oprx9,xysp EORA oprx16,xysp EORA [D,xysp] EORA [oprx16,xysp]
88 98 B8 A8 A8 A8 A8 A8
ii dd hh xb xb xb xb xb
ll ff ee ff ee ff
Notes: 1. Due to internal CPU requirements, the program word fetch is performed twice to the same address during this instruction. 2. opr16a is an extended address specification. Both X and Y point to source operands. EORB #opr8i EORB opr8a EORB opr16a EORB oprx0_xysp EORB oprx9,xysp EORB oprx16,xysp EORB [D,xysp] EORB [oprx16,xysp] (B) (M) B Exclusive-OR B with Memory IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] C8 D8 F8 E8 E8 E8 E8 E8 ii dd hh xb xb xb xb xb
P rPf rPO rPf rPO frPP fIfrPf fIPrPf P rfP rOP rfP rPO frPP fIfrfP fIPrfP
ll ff ee ff ee ff
M68HC12
ORRffffffP
SXHI
NZVC ?
INH
B7 eb
18 11 04 lb rr
OffffffffffO PPP
REL (9-bit)
04 lb rr
PPP
(A) + $01 A (B) + $01 B (SP) + $0001 SP Translates to LEAS 1,SP (X) + $0001 X Increment Index Register X (Y) + $0001 Y Increment Index Register Y Routine address PC Jump
1B 81 08 02 06 05 05 05 05 05 17 16 15 15 15 15 15 hh xb xb xb xb xb dd hh xb xb xb xb xb ll ff ee ff ee ff
Note 1. Due to internal CPU requirements, the program word fetch is performed twice to the same address during this instruction. (SP) 2 SP; RTNH:RTNL M(SP):M(SP+1); Subroutine address PC Jump to Subroutine ll ff ee ff ee ff
SPPP SPPP PPPS PPPS fPPPS fIfPPPS fIfPPPS OPPP/OPO1 OPPP/OPO1 OPPP/OPO1 OPPP/OPO1 PPPS PPPS PPPS PPPS fPPPS fIfPPPS fIfPPPS OPPP/OPO1 OPPP/OPO1 OPPP/OPO1 OPPP/OPO1
Long Branch if Carry Clear (if C = 0) Long Branch if Carry Set (if C = 1) Long Branch if Equal (if Z = 1) Long Branch Greater Than or Equal (if N V = 0) (signed)
18 24 qq rr 18 25 qq rr 18 27 qq rr 18 2C qq rr
M68HC12
OPPP/OPO
1
SXHI
NZVC
OPPP/OPO1 OPPP/OPO1
OPPP/OPO1 OPPP/OPO1
REL REL
18 2F qq rr 18 25 qq rr
OPPP/OPO1 OPPP/OPO1
OPPP/OPO1 OPPP/OPO1
LBLS rel16 LBLT rel16 LBMI rel16 LBNE rel16 LBPL rel16 LBRA rel16 LBRN rel16 LBVC rel16 LBVS rel16 LDAA #opr8i LDAA opr8a LDAA opr16a LDAA oprx0_xysp LDAA oprx9,xysp LDAA oprx16,xysp LDAA [D,xysp] LDAA [oprx16,xysp] LDAB #opr8i LDAB opr8a LDAB opr16a LDAB oprx0_xysp LDAB oprx9,xysp LDAB oprx16,xysp LDAB [D,xysp] LDAB [oprx16,xysp] LDD #opr16i LDD opr8a LDD opr16a LDD oprx0_xysp LDD oprx9,xysp LDD oprx16,xysp LDD [D,xysp] LDD [oprx16,xysp] LDS #opr16i LDS opr8a LDS opr16a LDS oprx0_xysp LDS oprx9,xysp LDS oprx16,xysp LDS [D,xysp] LDS [oprx16,xysp] LDX #opr16i LDX opr8a LDX opr16a LDX oprx0_xysp LDX oprx9,xysp LDX oprx16,xysp LDX [D,xysp] LDX [oprx16,xysp]
REL REL REL REL REL REL REL REL REL IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2]
18 23 qq rr 18 2D qq rr 18 2B qq rr 18 26 qq rr 18 2A qq rr 18 20 qq rr 18 21 qq rr 18 28 qq rr 18 29 qq rr 86 96 B6 A6 A6 A6 A6 A6 C6 D6 F6 E6 E6 E6 E6 E6 CC DC FC EC EC EC EC EC CF DF FF EF EF EF EF EF CE DE FE EE EE EE EE EE ii dd hh xb xb xb xb xb ii dd hh xb xb xb xb xb jj dd hh xb xb xb xb xb jj dd hh xb xb xb xb xb jj dd hh xb xb xb xb xb
OPPP/OPO1 OPPP/OPO1 OPPP/OPO1 OPPP/OPO1 OPPP/OPO1 OPPP OPO OPPP/OPO1 OPPP/OPO1 P rPf rPO rPf rPO frPP fIfrPf fIPrPf P rPf rPO rPf rPO frPP fIfrPf fIPrPf PO RPf RPO RPf RPO fRPP fIfRPf fIPRPf
OPPP/OPO1 OPPP/OPO1 OPPP/OPO1 OPPP/OPO1 OPPP/OPO1 OPPP OPO OPPP/OPO1 OPPP/OPO1 P rfP rOP rfP rPO frPP fIfrfP fIPrfP P rfP rOP rfP rPO frPP fIfrfP fIPrfP OP RfP ROP RfP RPO fRPP fIfRfP fIPRfP
ll ff ee ff ee ff
ll ff ee ff ee ff kk ll ff ee ff ee ff kk ll ff ee ff ee ff kk ll ff ee ff ee ff
Note 1. OPPP/OPO indicates this instruction takes four cycles to refill the instruction queue if the branch is taken and three cycles if the branch is not taken. (M:M+1) SP Load Stack Pointer
PO RPf RPO RPf RPO fRPP fIfRPf fIPRPf PO RPf RPO RPf RPO fRPP fIfRPf fIPRPf OP RfP ROP RfP RPO fRPP fIfRfP fIPRfP OP RfP ROP RfP RPO fRPP fIfRfP fIPRfP
Addr. Mode IMM DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] IDX IDX1 IDX2 IDX IDX1 IDX2 IDX IDX1 IDX2 CD DD FD ED ED ED ED ED
M68HC12
OP RfP ROP RfP RPO fRPP fIfRfP fIPRfP PP1 PO PP PP1 PO PP PP1 PO PP rOPw rPw rPOw frPPw fIfrPw fIPrPw O O O
SXHI
NZVC 0
Effective Address SP Load Effective Address into SP Effective Address X Load Effective Address into X Effective Address Y Load Effective Address into Y
1B xb 1B xb ff 1B xb ee ff 1A xb 1A xb ff 1A xb ee ff 19 xb 19 xb ff 19 xb ee ff 78 68 68 68 68 68 48 58 59 hh xb xb xb xb xb ll ff ee ff ee ff
74 64 64 64 64 64 44 54 49
hh xb xb xb xb xb
ll ff ee ff ee ff
Note 1. Due to internal CPU requirements, the program word fetch is performed twice to the same address during this instruction.
OrPw OrPwO OfrPwP OfIfrPw OfIPrPw RRfOw OrPw OrPwO OfrPwP OfIfrPw OfIPrPw RRfOw
????
M68HC12
OrfP OrPO OfrPP OfIfrfP OfIPrfP OrPw OrPwO OfrPwP OfIfrPw OfIPrPw OPwP OPwO OrPwPO OPrPw OrPwP OrPwO OPWPO OPPW ORPWPO OPRPW ORPWP ORPWO ffO rOPw rPw rPOw frPPw fIfrPw fIPrPw O O
SXHI
NZVC
MOVB #opr8, opr16a1 (M1) M2 MOVB #opr8i, oprx0_xysp1 Memory to Memory Byte-Move (8-Bit) 1 MOVB opr16a, opr16a 1 MOVB opr16a, oprx0_xysp MOVB oprx0_xysp, opr16a1 MOVB oprx0_xysp, oprx0_xysp1 MOVW #oprx16, opr16a1 (M:M+11) M:M+12 MOVW #opr16i, oprx0_xysp1 Memory to Memory Word-Move (16-Bit) 1 MOVW opr16a, opr16a 1 MOVW opr16a, oprx0_xysp MOVW oprx0_xysp, opr16a1 MOVW oprx0_xysp, oprx0_xysp1 MUL NEG opr16a NEG oprx0_xysp NEG oprx9,xysp NEG oprx16,xysp NEG [D,xysp] NEG [oprx16,xysp] NEGA NEGB NOP ORAA #opr8i ORAA opr8a ORAA opr16a ORAA oprx0_xysp ORAA oprx9,xysp ORAA oprx16,xysp ORAA [D,xysp] ORAA [oprx16,xysp] ORAB #opr8i ORAB opr8a ORAB opr16a ORAB oprx0_xysp ORAB oprx9,xysp ORAB oprx16,xysp ORAB [D,xysp] ORAB [oprx16,xysp] ORCC #opr8i PSHA PSHB PSHC PSHD PSHX PSHY (A) (B) A:B 8 by 8 Unsigned Multiply 0 (M) M equivalent to (M) + 1 M Twos Complement Negate
0B ii hh ll 08 xb ii 0C hh ll hh ll 09 xb hh ll 0D xb hh ll 0A xb xb 03 jj kk hh ll 00 xb jj kk 04 hh ll hh ll 01 xb hh ll 05 xb hh ll 02 xb xb
0 (A) A equivalent to (A) + 1 A Negate Accumulator A 0 (B) B equivalent to (B) + 1 B Negate Accumulator B No Operation (A) + (M) A Logical OR A with Memory
ll ff ee ff ee ff
Note 1. The first operand in the source code statement specifies the source for the move. (B) + (M) B Logical OR B with Memory
P rPf rPO rPf rPO frPP fIfrPf fIPrPf P Os Os Os OS OS OS P rfP rOP rfP rPO frPP fIfrfP fIPrfP
ll ff ee ff ee ff
(CCR) + M CCR Logical OR CCR with Memory (SP) 1 SP; (A) M(SP) Push Accumulator A onto Stack (SP) 1 SP; (B) M(SP) Push Accumulator B onto Stack (SP) 1 SP; (CCR) M(SP) Push CCR onto Stack (SP) 2 SP; (A:B) M(SP):M(SP+1) Push D Accumulator onto Stack (SP) 2 SP; (XH:XL) M(SP):M(SP+1) Push Index Register X onto Stack (SP) 2 SP; (YH:YL) M(SP):M(SP+1) Push Index Register Y onto Stack
14 ii 36 37 39 3B 34 35
P Os Os Os OS OS OS
M68HC12
ufO ufO
SXHI
NZVC
???
18 3A
Special
18 3B
ORf(t,Tx)O
ORf(t,Tx)O
??!
(loop to read weight if enabled) (r,RfRf) (r,RfRf) (exit + re-entry replaces comma above if interrupted) ffff + ORf(t, fff + ORf(t,
b0
hh xb xb xb xb xb
ll ff ee ff ee ff
Rotate A Right through Carry Rotate B Right through Carry (M(SP)) PPAGE; (SP) + 1 SP; (M(SP):M(SP+1)) PCH:PCL; (SP) + 2 SP Return from Call (M(SP)) CCR; (SP) + 1 SP (M(SP):M(SP+1)) B:A; (SP) + 2 SP (M(SP):M(SP+1)) XH:XL; (SP) + 4 SP (M(SP):M(SP+1)) PCH:PCL; (SP) 2 SP (M(SP):M(SP+1)) YH:YL; (SP) + 4 SP Return from Interrupt (M(SP):M(SP+1)) PCH:PCL; (SP) + 2 SP Return from Subroutine
RTI
INH
0B
uUUUUPPP
uUUUUPPP uUUUUfVfPPP
RTS
INH
3D
UfPPP
UfPPP
M68HC12
OO P rfP rOP rfP rPO frPP fIfrfP fIPrfP P rfP rOP rfP rPO frPP fIfrfP fIPrfP P P P P
SXHI
NZVC
ll ff ee ff ee ff
ll ff ee ff ee ff
1C Translates to ORCC #$01 1 I; (inhibit I interrupts) Translates to ORCC #$10 1V Translates to ORCC #$02 $00:(r1) r2 if r1, bit 7 is 0 or $FF:(r1) r2 if r1, bit 7 is 1 Sign Extend 8-bit r1 to 16-bit r2 r1 may be A, B, or CCR r2 may be D, X, Y, or SP Alternate mnemonic for TFR r1, r2
14 01 14 10 14 02 B7 eb
1 1
STAA opr8a STAA opr16a STAA oprx0_xysp STAA oprx9,xysp STAA oprx16,xysp STAA [D,xysp] STAA [oprx16,xysp] STAB opr8a STAB opr16a STAB oprx0_xysp STAB oprx9,xysp STAB oprx16,xysp STAB [D,xysp] STAB [oprx16,xysp] STD opr8a STD opr16a STD oprx0_xysp STD oprx9,xysp STD oprx16,xysp STD [D,xysp] STD [oprx16,xysp] STOP
DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] DIR EXT IDX IDX1 IDX2 [D,IDX] [IDX2] INH
5A 7A 6A 6A 6A 6A 6A 5B 7B 6B 6B 6B 6B 6B 5C 7C 6C 6C 6C 6C 6C
dd hh xb xb xb xb xb dd hh xb xb xb xb xb dd hh xb xb xb xb xb
ll ff ee ff ee ff ll ff ee ff ee ff ll ff ee ff ee ff
Pw PwO Pw PwO PwP PIfw PIPw Pw PwO Pw PwO PwP PIfw PIPw PW PWO PW PWO PWP PIfW PIPW (entering STOP) OOSSSSsf (exiting STOP) fVfPPP (continue) ff
Pw wOP Pw PwO PwP PIfPw PIPPw Pw wOP Pw PwO PwP PIfPw PIPPw PW WOP PW PWO PWP PIfPW PIPPW
(SP) 2 SP; RTNH:RTNL M(SP):M(SP+1); (SP) 2 SP; (YH:YL) M(SP):M(SP+1); (SP) 2 SP; (XH:XL) M(SP):M(SP+1); (SP) 2 SP; (B:A) M(SP):M(SP+1); (SP) 1 SP; (CCR) M(SP); STOP All Clocks Registers stacked to allow quicker recovery by interrupt. If S control bit = 1, the STOP instruction is disabled and acts like a two-cycle NOP.
18 3E
OOSSSfSs
fVfPPP
OO
OO
M68HC12
PW WOP PW PWO PWP PIfPW PIPPW PW WOP PW PWO PWP PIfPW PIPPW PW WOP PW PWO PWP PIfPW PIPPW P rfP rOP rfP rPO frPP fIfrfP fIPrfP P rfP rOP rfP rPO frPP fIfrfP fIPrfP OP RfP ROP RfP RPO fRPP fIfRfP fIPRfP VSPSSPSsP*
SXHI
NZVC 0
ll ff ee ff ee ff
ll ff ee ff ee ff kk ll ff ee ff ee ff
(SP) 2 SP; RTNH:RTNL M(SP):M(SP+1); (SP) 2 SP; (YH:YL) M(SP):M(SP+1); (SP) 2 SP; (XH:XL) M(SP):M(SP+1); (SP) 2 SP; (B:A) M(SP):M(SP+1); (SP) 1 SP; (CCR) M(SP) 1 I; (SWI Vector) PC Software Interrupt (A) B Transfer A to B (A) CCR Translates to TFR A , CCR (B) A Transfer B to A If (cntr) = 0, then Branch; else Continue to next instruction Test Counter and Branch if Zero (cntr = A, B, D, X,Y, or SP)
1 111
*The CPU also uses the SWI microcode sequence for hardware interrupts and unimplemented opcode traps. Reset uses the VfPPP variation of this sequence. TAB TAP TBA TBEQ abdxys,rel9 INH INH INH REL (9-bit) 18 0E B7 02 18 0F 04 lb rr
OO P OO PPP (branch) PPO (no branch) OO
P OO PPP
M68HC12
OrrffffP
SXHI
NZVC ?
REL (9-bit)
04 lb rr
PPP
INH
B7 eb
or
INH INH
B7 20 18 tn tn = $30$39 or $40$FF
P OVSPSSPSsP
P OfVSPSSPSsP
00
(A) 0 (B) 0
(SP) X Translates to TFR SP,X (SP) Y Translates to TFR SP,Y (X) SP Translates to TFR X,SP (Y) SP Translates to TFR Y,SP (SP) 2 SP; RTNH:RTNL M(SP):M(SP+1); (SP) 2 SP; (YH:YL) M(SP):M(SP+1); (SP) 2 SP; (XH:XL) M(SP):M(SP+1); (SP) 2 SP; (B:A) M(SP):M(SP+1); (SP) 1 SP; (CCR) M(SP); WAIT for interrupt
B7 75 B7 76 B7 57 B7 67 3E
or 1 or 11
SXHI ?
NZVC ???
i=1
Si Fi Y:D
and
i=1
Fi X
Calculate Sum of Products and Sum of Weights for Weighted Average Calculation Initialize B, X, and Y before WAV. B specifies number of elements. X points at first element in Si list. Y points at first element in Fi list. All Si and Fi elements are 8-bits. If interrupted, six extra bytes of stack used for intermediate values wavr pseudoinstruction see WAV Resume executing an interrupted WAV instruction (recover intermediate results from stack rather than initializing them to zero) (D) (X) Translates to EXG D, X (D) (Y) Translates to EXG D, Y INH INH B7 C5 B7 C6
P P
Special
3C
UUUrr,ffff (frr,ffff)O
UUUrrfffff (frr,fffff)O
???
(exit + re-entry replaces comma above if interrupted) SSS + UUUrr, SSSf + UUUrr P P
XGDX XGDY
BGND MEM
IH 02
PULX
2 IH 1 31
NEGA
1 IH 3 41
NEGB
1 IH 1 51
NEG COM INC DEC LSR ROL ROR ASR ASL CLR STAA STAB STD STY STX STS
NEG COM INC DEC LSR ROL ROR ASR ASL CLR STAA STAB STD STY STX STS
SUBA
3 IM 4 81
SUBA
2 DI 1 91
SUBA CMPA SBCA SUBD ANDA BITA LDAA NOP EORA ADCA ORAA ADDA CPD CPY CPX CPS
SUBA CMPA SBCA SUBD ANDA BITA LDAA TFR/EXG EORA ADCA ORAA ADDA CPD CPY CPX CPS
SUBB
3 IM 3 C1
SUBB
2 DI 1 D1
SUBB CMPB SBCB ADDD ANDB BITB LDAB TST EORB ADCB ORAB ADDB LDD LDY LDX LDS
SUBB CMPB SBCB ADDD ANDB BITB LDAB TST EORB ADCB ORAB ADDB LDD LDY LDX LDS
2 RL 11 21 1 RL 1 22 1 RL 3 23 1 RL 1 24 2 RL 4-7 25
2-4 EX 3-6 71 2-4 EX 3-6 72 2-4 EX 3-6 73 2-4 EX 3-6 74 2-4 EX 3-6 75 2-4 EX 3-6 76 2-4 EX 3-6 77 2-4 EX 3-6 78 2-4 EX 2-4 79 2-4 EX 2-4 7A 2-4 EX 2-4 7B 2-4 EX 2-4 7C 2-4 EX 2-4 7D 2-4 EX 2-4 7E 2-4 EX 2-4 7F 2-4 EX
2-4 EX 3-6 B1 2-4 EX 3-6 B2 2-4 EX 3-6 B3 2-4 EX 3-6 B4 2-4 EX 3-6 B5 2-4 EX 3-6 B6 2-4 EX 1 B7 1 IH 3-6 B8 2-4 EX 3-6 B9 2-4 EX 3-6 BA 2-4 EX 3-6 BB 2-4 EX 3-6 BC 2-4 EX 3-6 BD 2-4 EX 3-6 BE 2-4 EX 3-6 BF 2-4 EX
2-4 EX 3-6 F1 2-4 EX 3-6 F2 2-4 EX 3-6 F3 2-4 EX 3-6 F4 2-4 EX 3-6 F5 2-4 EX 3-6 F6 2-4 EX 3-6 F7 2-4 EX 3-6 F8 2-4 EX 3-6 F9 2-4 EX 3-6 FA 2-4 EX 3-6 FB 2-4 EX 3-6 FC 2-4 EX 3-6 FD 2-4 EX 3-6 FE 2-4 EX 3-6 FF 2-4 EX
PULY PULA
COMA
1 IH 3 42
COMB
1 IH 1 52
CMPA
3 IM 4 82
CMPA
2 DI 1 92
CMPB
3 IM 3 C2
CMPB
2 DI 1 D2
2 IH 3/1 32 2 IH 3/1 33
INY
IH 03
INCA
1 IH 3 43
INCB
1 IH 1 53
SBCA
3 IM 4 83
SBCA
2 DI 2 93
SBCB
3 IM 3 C3
SBCB
2 DI 2 D3
DEY
IH 04
EMUL
1 IH 3 14
DECA
1 IH 2 44
DECB
1 IH 1 54
SUBD
3 IM 4 84
SUBD
3 DI 1 94
ADDD
3 IM 3 C4
ADDD
3 DI 1 D4
loop
RL 05 ID 06 EX 07
2 IH 3/1 34 2 IH 3/1 35 2 IH 3/1 36 2 IH 3/1 37 2 IH 3/1 38 2 IH 3/1 39 2 IH 3/1 3A 2 IH 3/1 3B 2 IH 3/1 3C 2 SP 3/1 3D
LSRA
1 IH 2 45
LSRB
1 IH 1 55
ANDA
3 IM 4 85
ANDA
2 DI 1 95
ANDB
3 IM 3 C5
ANDB
2 DI 1 D5
3 IM 3-6 15 2-4 ID 3 16
ROLA
1 IH 2 46
ROLB
1 IH 1 56
BITA
3 IM 4 86
BITA
2 DI 1 96
BITB
3 IM 3 C6
BITB
2 DI 1 D6
2-4 RL 4 26
RORA
1 IH 2 47
RORB
1 IH 1 57
LDAA
3 IM 4 87
LDAA
2 DI 1 97
LDAB
3 IM 1 C7
LDAB
2 DI 1 D7
JSR Page 2
1 1 19
ASRA
1 IH 3 48
ASRB
1 IH 1 58
CLRA
3 IH 4 88
TSTA
1 IH 1 98
CLRB EORB
TSTB
1 IH 1 D8
2 IH 3 C8 3 IM 3 C9
INX
IH 09
ASLA
1 IH 2 49
ASLB
1 IH 1 59
EORA
3 IM 3 89
EORA
2 DI 1 99
EORB
2 DI 1 D9
DEX
IH 0A
LEAY
1 ID 7 1A 1 ID 8 1B
LSRD
1 IH 3 4A
ADCA
3 IM 3 8A
ADCA
2 DI 1 9A
ADCB
3 IM 3 CA
ADCB
2 DI 1 DA
1 IH 7 5A
RTC
IH 0B
LEAX LEAS
ORAA
3 IM 3 8B
ORAA
2 DI 1 9B
ORAB
3 IM 3 CB
ORAB
2 DI 1 DB
1 EX 4 DI 2 4B 7-10 5B 1 ID +5 4C 2-5 DI 4 5C
RTI
IH 0C ID 0D ID 0E ID 0F ID
ADDA
3 IM 3 8C
ADDA
2 DI 2 9C
ADDB
3 IM 3 CC
ADDB
2 DI 2 DC
wavr RTS
CPD
3 IM 3 8D
CPD
3 DI 2 9D
LDD
3 IM 3 CD
LDD
3 DI 2 DD
BLT
4 RL 5 2E 5 RL 5 2F 5 RL
BCLR BRSET
1 DI 9 4F 1 DI
STY
3 DI 4 5E
CPY
3 IM 3 8E
CPY
3 DI 2 9E
LDY
3 IM 3 CE
LDY
3 DI 2 DE
2 IH 3/1 3E 2 IH 3/1 3F
1 DI 7 4E
BGT BLE
2 IH
WAI SWI
STX STS
CPX
3 IM 3 8F
CPX
3 DI 2 9F
LDX
3 IM 3 CF
LDX
3 DI 2 DF
4 DI 4 5F 4 DI
BRCLR
CPS
3 IM 3 DI
CPS
LDS
3 IM 3 DI
LDS
BGND
IH
396
MOVW
IM-ID 01
IDIV
5 IH 5 11
LBRA
2 RL 12 21
TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP REV REVW WAV TBL STOP ETBL
4 ID
TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP
TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP
TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP
TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP
TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP
TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP
TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP
TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP
TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP
TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP
TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP
TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP TRAP
MOVW
EX-ID 02
FDIV
LBRN
MOVW
IM-EX 04
EMULS
6 IH 6 14 6 IH 5 15 5 IH 2 16
2 RL 12 24 2 RL 12 25 2 RL 2 26 2 RL 2 27 2 RL 4-7 28 3-5 RL 4-7 29 3-5 RL 4-7 2A 3-5 RL 4-7 2B 3-5 RL 4-7 2C 3-5 RL D4-7 2D 3-5 RL 4-7 2E 3-5 RL 4-7 2F 3-5 RL
MOVW
EX-EX 05
MOVW
ID-EX 06
ABA
IH 07
LBNE LBEQ LBVC LBVS LBPL LBMI LBGE LBLT LBGT LBLE
DAA
IH 08
CBA
2 IH 4 18 4 ID 5 19 5 ID 5 1A 4 ID 4 1B 5 ID 6 1C 6 ID 5 1D 5 ID 2 1E 2 ID 2 1F 2 ID
MOVB
IM-ID 09
MOVB
EX-ID 0A
MOVB
ID-ID 0B
MOVB
IM-EX 0C
MOVB
EX-EX 0D
MOVB
ID-EX 0E
TAB
IH 0F
TBA
IH
* The opcode $04 (on sheet 1 of 2) corresponds to one of the loop primitive instructions DBEQ, DBNE, IBEQ, IBNE, TBEQ, or TBNE. Refer to instruction summary for more information. Refer to instruction summary for different HC12 cycle count. Page 2: When the CPU encounters a page 2 opcode ($18 on page 1 of the opcode map), it treats the next byte of object code as a page 2 instruction opcode.
#,REG
type
111rr0zs
rr1pnnnn
111rr1aa
111rr011 111rr111
[n,r] [D,r]
1
BA BB B CCR
2
CCR A CCR B CCR CCR
3
TMP3L A TMP3L B TMP3L CCR TMP3 TMP2 TMP3 D TMP3 X TMP3 Y TMP3 SP
4
BA BB B CCR D TMP2 DD DX DY D SP
5
XL A XL B XL CCR X TMP2 XD XX XY X SP
6
YL A YL B YL CCR Y TMP2 YD YX YY Y SP
7
SPL A SPL B SPL CCR SP TMP2 SP D SP X SP Y SP SP
sex:A TMP2 sex:B TMP2 sex:CCR TMP2 sex:A D SEX A,D sex:A X SEX A,X sex:A Y SEX A,Y sex:A SP SEX A,SP sex:B D SEX B,D sex:B X SEX B,X sex:B Y SEX B,Y sex:B SP SEX B,SP sex:CCR D SEX CCR,D sex:CCR X SEX CCR,X sex:CCR Y SEX CCR,Y sex:CCR SP SEX CCR,SP
EXCHANGES LS 0 1 2 3 4 5 6 7 MS 8
AA AB A CCR
9
BA BB B CCR
A
CCR A CCR B CCR CCR
B
TMP3L A $00:A TMP3 TMP3L B $FF:B TMP3
C
BA AB BB $FF A
D
XL A $00:A X XL B $FF:B X
E
YL A $00:A Y YL B $FF:B Y
F
SPL A $00:A SP SPL B $FF:B SP
TMP3L CCR B CCR XL CCR YL CCR SPL CCR $FF:CCR TMP3 $FF:CCR D $FF:CCR X $FF:CCR Y $FF:CCR SP TMP3 TMP2 TMP3 D TMP3 X TMP3 Y TMP3 SP D TMP2 DD DX DY D SP X TMP2 XD XX XY X SP Y TMP2 YD YX YY Y SP SP TMP2 SP D SP X SP Y SP SP
$00:A TMP2 $00:B TMP2 $00:CCR TMP2 TMP2L A TMP2L B TMP2L CCR $00:CCR D $00:A D $00:B D B CCR $00:A X XL A $00:A Y YL A $00:A SP SPL A $00:B X XL B $00:B Y YL B $00:B SP SPL B $00:CCR X XL CCR $00:CCR Y YL CCR $00:CCR SP SPL CCR
DBEQ
(+) 01
DBEQ
() B 11
DBNE
(+) B 21
DBNE
() B 31
TBEQ
(+) B 41
TBEQ
() B 51
TBNE
(+) B 61
TBNE
() B 71 B 81
IBEQ
(+) B 91
IBEQ
()
IBNE
(+) B A1
IBNE IBNE
DBEQ
(+) 02 03 04
DBEQ
() 12 13 D 14
DBNE
(+) 22 23 D 24
DBNE
() 32 33 D 34
TBEQ
(+) 42 43 D 44
TBEQ
() 52 53 D 54
TBNE
(+) 62 63 D 64
TBNE
() 72 73 D 74 D 84 83 82
IBEQ
(+) 92 93
IBEQ
()
IBNE
(+) A2
DBEQ
(+) 05
DBEQ
() X 15
DBNE
(+) X 25
DBNE
() X 35
TBEQ
(+) X 45
TBEQ
() X 55
TBNE
(+) X 65
TBNE
() X 75 X 85
IBEQ
(+) X 95
IBEQ
()
IBNE
(+) X A5
DBEQ
(+) 06
DBEQ
() Y 16
DBNE
(+) Y 26
DBNE
() Y 36
TBEQ
(+) Y 46
TBEQ
() Y 56
TBNE
(+) Y 66
TBNE
() Y 76 Y 86
IBEQ
(+) Y 96
IBEQ
()
IBNE
(+) Y A6
DBEQ
(+) 07 (+)
DBEQ
()
DBNE
(+)
DBNE
()
TBEQ
(+)
TBEQ
()
TBNE
(+)
TBNE
() SP 87 ()
IBEQ
(+) SP 97
IBEQ
()
IBNE
(+)
SP 17 ()
SP 27 (+)
SP 37 ()
SP 47 (+)
SP 57 ()
SP 67 (+)
SP 77
SP A7
DBEQ
DBEQ
DBNE
DBNE
TBEQ
TBEQ
TBNE
TBNE
IBEQ
(+)
IBEQ
()
IBNE
_BEQ
branch condition
sign of 9-bit relative branch offset (lower eight bits are an extension byte following postbyte)
` grave
a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~ DEL delete
quote
# $ % &
apost.
( ) * + , comma
- dash . period
/ 0 1 2 3 4 5 6 7 8 9 : ; < = > ?
4th Hex Digit Hex Decimal 0 0 1 4,096 2 8,192 3 12,288 4 5 6 7 8 9 A B C D E F 16,384 20,480 24,576 28,672 32,768 36,864 40,960 45,056 49,152 53,248 57,344 61,440
3rd Hex Digit Hex Decimal 0 0 1 256 2 512 3 768 4 5 6 7 8 9 A B C D E F 1,024 1,280 1,536 1,792 2,048 2,304 2,560 2,816 3,072 3,328 3,484 3,840
2nd Hex Digit Hex Decimal 0 0 1 16 2 32 3 48 4 5 6 7 8 9 A B C D E F 64 80 96 112 128 144 160 176 192 208 224 240
ABX ABY
DES INS
TFR A,CCR TFR CCR,A TFR S,X TFR S,Y TFR X,S TFR Y,S EXG D,X EXG D,Y
All of the translations produce the same amount of or slightly more object code than the original M68HC11 instructions. However, there are offsetting savings in other instructions. Y-indexed instructions in particular assemble into one byte less object code than the same M68HC11 instruction. The CPU12 has a 2-page opcode map, rather than the 4-page M68HC11 map. This is largely due to redesign of the indexed addressing modes. Most of pages 2, 3, and 4 of the M68HC11 opcode map are required because Y-indexed instructions use different opcodes than X-indexed instructions. Approximately two-thirds of the M68HC11 page 1 opcodes are unchanged in CPU12, and some M68HC11 opcodes have been moved to page 1 of the CPU12 opcode map. Object code for each of the moved instructions is one byte smaller than object code for the equivalent M68HC11 instruction. Table B-2 shows instructions that assemble to one byte less object code on the CPU12.
INST n,Y
PSHY PULY LDY STY CPY CPY n,Y LDY n,Y STY n,Y CPD
For values of n less than 16 (the majority of cases); were on page 3, now are on page 1 Was on page 2, 3, or 4, now on page 1. In the case of indexed with offset greater than 15, CPU12 and M68HC11 object code are the same size.
Instruction set changes offset each other to a certain extent. Programming style also affects the rate at which instructions appear. As a test, the BUFFALO monitor, an 8-Kbyte M68HC11 assembly code program, was reassembled for the CPU12. The resulting object code is six bytes smaller than the M68HC11 code. It is fair to conclude that M68HC11 code can be reassembled with very little change in size. The relative size of code for M68HC11 vs. code for CPU12 has also been tested by rewriting several smaller programs from scratch. In these cases, the CPU12 code is typically about 30 percent smaller. These savings are mostly due to improved indexed addressing. It seems useful to mention the results of size comparisons done on C programs. A C program compiled for the CPU12 is about 30 percent smaller than the same program compiled for the M68HC11. The savings are largely due to better indexing.
B.5.1 Bus Structures The CPU12 is a 16-bit processor with 16-bit data paths. Typical HCS12 and M68HC12 devices have internal and external 16-bit data paths, but some derivatives incorporate operating modes that allow for an 8-bit data bus, so that a system can be built with low-cost 8-bit program memory. HCS12 and M68HC12 MCUs include an on-chip integration module that manages the external bus interface. When the CPU makes a 16-bit access to a resource that is served by an 8-bit bus, the integration module performs two 8-bit accesses, freezes the CPU clocks for part of the sequence, and assembles the data into a 16-bit word. As far as the CPU is concerned, there is no difference between this access and a 16-bit access to an internal resource via the 16-bit data bus. This is similar to the way an M68HC11 can stretch clock cycles to accommodate slow peripherals.
B.5.2 Instruction Queue The CPU12 has a 2-word instruction queue and a 16-bit holding buffer, which sometimes acts as a third word for queueing program information. All program information is fetched from memory as aligned 16-bit words, even though there is no requirement for instructions to begin or end on even word boundaries. There is no penalty for misaligned instructions. If a program begins on an odd boundary (if the reset vector is an odd address), program information is fetched to fill the instruction queue, beginning with the aligned word at the next address below the misaligned reset vector. The instruction queue logic starts execution with the opcode in the low-order half of this word. The instruction queue causes three bytes of program information (starting with the instruction opcode) to be directly available to the CPU at the beginning of every instruction. As it executes, each instruction performs enough additional program fetches to refill the space it took up in the queue. Alignment information is maintained by the logic in the instruction queue. The CPU provides signals that tell the queue logic when to advance a word of program information and when to toggle the alignment status. The CPU is not aware of instruction alignment. The queue logic includes a multiplexer that sorts out the information in the queue to present the opcode and the next two bytes of information as CPU inputs. The multiplexer determines whether the opcode is in the even or odd half of the word at the head of the queue. Alignment status is also available to the ALU for address calculations. The execution sequence for all instructions is independent of the alignment of the instruction. The only situation where alignment can affect the number of cycles an instruction takes occurs in devices that have a narrow (8-bit) external data bus and is related to optional program fetch cycles (O type cycles). O cycles are always performed, but serve different purposes determined by instruction size and alignment. Each instruction includes one program fetch cycle for every two bytes of object code. Instructions with an odd number of bytes can use an O cycle to fetch an extra word of object code. If the queue is aligned at the start of an instruction with an odd byte count, the last byte of object code shares a queue word with the opcode of the next instruction. Since this word holds part of the next instruction, the queue cannot advance after the odd byte executes because the first byte of the next instruction would be lost. In this case, the O cycle appears as a free cycle since the queue is not ready to accept the next word of program information. If this same instruction had
S12CPUV2 Reference Manual, Rev. 4.0 408 Freescale Semiconductor
been misaligned, the queue would be ready to advance and the O cycle would be used to perform a program word fetch. In a single-chip system or in a system with the program in 16-bit memory, both the free cycle and the program fetch cycle take one bus cycle. In a system with the program in an external 8-bit memory, the O cycle takes one bus cycle when it appears as a free cycle, but it takes two bus cycles when used to perform a program fetch. In this case, the on-chip integration module freezes the CPU clocks long enough to perform the cycle as two smaller accesses. The CPU handles only 16-bit data, and is not aware that the 16-bit program access is split into two 8-bit accesses. To allow development systems to track events in the CPU12 instruction queue, two status signals (IPIPE[1:0]) provide information about data movement in the queue and about the start of instruction execution. A development system can use this information along with address and data information to externally reconstruct the queue. This representation of the queue can also track both the data and address buses. B.5.3 Stack Function Both the M68HC11 and the CPU12 stack nine bytes for interrupts. Since this is an odd number of bytes, there is no practical way to ensure that the stack will stay aligned. To ensure that instructions take a fixed number of cycles regardless of stack alignment, the internal RAM in M68HC12 MCUs is designed to allow single cycle 16-bit accesses to misaligned addresses. As long as the stack is located in this special RAM, stacking and unstacking operations take the same amount of execution time, regardless of stack alignment. If the stack is located in an external 16-bit RAM, a PSHX instruction can take two or three cycles depending on the alignment of the stack. This extra access time is transparent to the CPU because the integration module freezes the CPU clocks while it performs the extra 8-bit bus cycle required for a misaligned stack operation. The CPU12 has a last-used stack rather than a next-available stack like the M68HC11 CPU. That is, the stack pointer points to the last 16-bit stack address used, rather than to the address of the next available stack location. This generally has very little effect, because it is very unusual to access stacked information using absolute addressing. The change allows a 16-bit word of data to be removed from the stack without changing the value of the SP twice. To illustrate, consider the operation of a PULX instruction. With the next-available M68HC11 stack, if the SP = $01F0 when execution begins,
S12CPUV2 Reference Manual, Rev. 4.0 Freescale Semiconductor 409
the sequence of operations is: SP = SP + 1; load X from $01F1:01F2; SP = SP + 1; and the SP ends up at $01F2. With the last-used CPU12 stack, if the SP = $01F0 when execution begins, the sequence is: load X from $01F0:01F1; SP = SP + 2; and the SP again ends up at $01F2. The second sequence requires one less stack pointer adjustment. The stack pointer change also affects operation of the TSX and TXS instructions. In the M68HC11, TSX increments the SP by one during the transfer. This adjustment causes the X index to point to the last stack location used. The TXS instruction operates similarly, except that it decrements the SP by one during the transfer. CPU12 TSX and TXS instructions are ordinary transfers the CPU12 stack requires no adjustment. For ordinary use of the stack, such as pushes, pulls, and even manipulations involving TSX and TXS, there are no differences in the way the M68HC11 and the CPU12 stacks look to a programmer. However, the stack change can affect a program algorithm in two subtle ways. The LDS #$xxxx instruction is normally used to initialize the stack pointer at the start of a program. In the M68HC11, the address specified in the LDS instruction is the first stack location used. In the CPU12, however, the first stack location used is one address lower than the address specified in the LDS instruction. Since the stack builds downward, M68HC11 programs reassembled for the CPU12 operate normally, but the program stack is one physical address lower in memory. In very uncommon situations, such as test programs used to verify CPU operation, a program could initialize the SP, stack data, and then read the stack via an extended mode read (it is normally improper to read stack data from an absolute extended address). To make an M68HC11 source program that contains such a sequence work on the CPU12, change either the initial LDS #$xxxx or the absolute extended address used to read the stack.
The M68HC11 has one variation of indexed addressing that works from X or Y as the reference pointer. For X indexed addressing, an 8-bit unsigned offset in the instruction is added to the index pointer to arrive at the address of the operand for the instruction. A load accumulator instruction assembles into two bytes of object code, the opcode and a 1-byte offset. Using Y as the reference, the same instruction assembles into three bytes (a page prebyte, the opcode, and a 1-byte offset.) Analysis of M68HC11 source code indicates that the offset is most frequently zero and seldom greater than four. The CPU12 indexed addressing scheme uses a postbyte plus 0, 1, or 2 extension bytes after the instruction opcode. These bytes specify which index register is used, determine whether an accumulator is used as the offset, implement automatic pre/post increment/decrement of indices, and allow a choice of 5-, 9-, or 16-bit signed offsets. This approach eliminates the differences between X and Y register use and dramatically enhances indexed addressing capabilities. Major improvements that result from this new approach are: Stack pointer can be used as an index register in all indexed operations (very important for C compilers) Program counter can be used as index register in all but auto inc/dec modes Accumulator offsets allowed using A, B, or D accumulators Automatic pre- or post- increment or decrement by 8 to +8 5-bit, 9-bit, or 16-bit signed constant offsets (M68HC11 only supported positive unsigned 8-bit offsets) 16-bit offset indexed-indirect and accumulator D offset indexed-indirect
The change completely eliminates pages three and four of the M68HC11 opcode map and eliminates almost all instructions from page two of the opcode map. For offsets of 0 to +15 from the X index register, the object code is the same size as it was for the M68HC11. For offsets of 0 to +15 from the Y index register, the object code is one byte smaller than it was for the M68HC11. Table A-3 and Table A-4 summarize CPU12 indexed addressing mode capabilities. Table A-6 shows how the postbyte is encoded.
B.6.1 Constant Offset Indexing The CPU12 offers three variations of constant offset indexing to optimize the efficiency of object code generation. The most common constant offset is 0. Offsets of 1, 2, 3, 4 are used fairly often, but with less frequency than 0. The 5-bit constant offset variation covers the most frequent indexing requirements by including the offset in the postbyte. This reduces a load accumulator indexed instruction to two bytes of object code, and matches the object code size of the smallest M68HC11 indexed instructions, which can only use X as the index register. The CPU12 can use X, Y, SP, or PC as the index reference with no additional object code size cost. The signed 9-bit constant offset indexing mode covers the same positive range as the M68HC11 8-bit unsigned offset. The size was increased to nine bits with the sign bit (ninth bit) included in the postbyte, and the remaining 8 bits of the offset in a single extension byte. The 16-bit constant offset indexing mode allows indexed access to the entire normal 64-Kbyte address space. Since the address consists of 16 bits, the 16-bit offset can be regarded as a signed (32,768 to +32,767) or unsigned (0 to 65,535) value. In 16-bit constant offset mode, the offset is supplied in two extension bytes after the opcode and postbyte.
B.6.2 Auto-Increment Indexing The CPU12 provides greatly enhanced auto increment and decrement modes of indexed addressing. In the CPU12, the index modification may be specified for before the index is used (pre-), or after the index is used (post-), and the index can be incremented or decremented by any amount from one to eight, independent of the size of the operand that was accessed. X, Y, and SP can be used as the index reference, but this mode does not allow PC to be the index reference (this would interfere with proper program execution). This addressing mode can be used to implement a software stack structure or to manipulate data structures in lists or tables, rather than manipulating bytes or words of data. Anywhere an M68HC11 program has an increment or decrement index register operation near an indexed mode instruction, the increment or decrement operation can be combined with the indexed instruction with no cost in object code size, as shown in the following code comparison.
18 A6 00 18 08 18 08 LDAA 0,Y INY INY
A6
71
LDAA
2,Y+
The M68HC11 object code requires seven bytes, while the CPU12 requires only two bytes to accomplish the same functions. Three bytes of M68HC11 code were due to the page prebyte for each Y-related instruction ($18). CPU12 post-increment indexing capability allowed the two INY instructions to be absorbed into the LDAA indexed instruction. The replacement code is not identical to the original 3-instruction sequence because the Z condition code bit is affected by the M68HC11 INY instructions, while the Z bit in the CPU12 would be determined by the value loaded into A.
B.6.3 Accumulator Offset Indexing This indexed addressing variation allows the programmer to use either an 8-bit accumulator (A or B) or the 16-bit D accumulator as the offset for indexed addressing. This allows for a program-generated offset, which is more difficult to achieve in the M68HC11. The following code compares the M68HC11 and CPU12 operations.
C6 05 CE 10 00 3A A6 00 5A 26 F7 LDAB #$5 LOOP LDX #$1000 ABX LDAA 0,X | DECB BNE LOOP [2] [3] C6 05 [3] CE 10 00 [4] A6 E5 [2] 04 31 FB [3]
The CPU12 object code is only one byte smaller, but the LDX # instruction is outside the loop. It is not necessary to reload the base address in the index register on each pass through the loop because the LDAA B,X instruction does not alter the index register. This reduces the loop execution time from 15 cycles to six cycles. This reduction, combined with the 25-MHz bus speed of the HCS12 (M68HC12) Family, can have significant effects.
B.6.4 Indirect Indexing The CPU12 allows some forms of indexed indirect addressing where the instruction points to a location in memory where the address of the operand is stored. This is an extra level of indirection compared to ordinary indexed addressing. The two forms of indexed indirect addressing are 16-bit constant offset indexed indirect and D accumulator indexed indirect. The reference index register can be X, Y, SP, or PC as in other CPU12 indexed addressing modes. PC-relative indirect addressing is one of the more common uses of indexed indirect addressing. The indirect variations of indexed addressing help in the implementation of pointers. D accumulator indexed indirect addressing can be used to implement a runtime computed GOTO function. Indirect addressing is also useful in high-level language compilers. For instance, PC-relative indirect indexing can be used to efficiently implement some C case statements.
B.7.1 Reduced Cycle Counts No M68HC11 instruction takes less than two cycles, but the CPU12 has more than 50 opcodes that take only one cycle. Some of the reduction comes from the instruction queue, which ensures that several program bytes are available at the start of each instruction. Other cycle reductions occur because the CPU12 can fetch 16 bits of information at a time, rather than eight bits at a time.
B.7.2 Fast Math The CPU12 has some of the fastest math ever designed into a Freescale general-purpose MCU. Much of the speed is due to a 20-bit ALU that can perform two smaller operations simultaneously. The ALU can also perform two operations in a single bus cycle in certain cases. Table B-3 compares the speed of CPU12 and M68HC11 math instructions. The CPU12 requires fewer cycles to perform an operation, and the cycle time is considerably faster than that of the M68HC11.
The IDIVS instruction is included specifically for C compilers, where word-sized operands are divided to produce a word-sized result (unlike the 32 16 = 16 EDIV). The EMUL and EMULS instructions place the result in registers so a C compiler can choose to use only 16 bits of the 32-bit result.
B.7.3 Code Size Reduction CPU12 assembly language programs written from scratch tend to be 30 percent smaller than equivalent programs written for the M68HC11. This figure has been independently qualified by Freescale programmers and an independent C compiler vendor. The major contributors to the reduction appear to be improved indexed addressing and the universal transfer/exchange instruction. In some specialized areas, the reduction is much greater. A fuzzy logic inference kernel requires about 250 bytes in the M68HC11, and the same program for the CPU12 requires about 50 bytes. The CPU12 fuzzy logic
instructions replace whole subroutines in the M68HC11 version. Table lookup instructions also greatly reduce code space. Other CPU12 code space reductions are more subtle. Memory-to- memory moves are one example. The CPU12 move instruction requires almost as many bytes as an equivalent sequence of M68HC11 instructions, but the move operations themselves do not require the use of an accumulator. This means that the accumulator often need not be saved and restored, which saves instructions. Arithmetic operations on index pointers are another example. The M68HC11 usually requires that the content of the index register be moved into accumulator D, where calculations are performed, then back to the index register before indexing can take place. In the CPU12, the LEAS, LEAX, and LEAY instructions perform arithmetic operations directly on the index pointers. The pre-/post-increment/decrement variations of indexed addressing also allow index modification to be incorporated into an existing indexed instruction rather than performing the index modification as a separate operation. Transfer and exchange operations often allow register contents to be temporarily saved in another register rather than having to save the contents in memory. Some CPU12 instructions such as MIN and MAX combine the actions of several M68HC11 instructions into a single operation.
B.8.1 Memory-to-Memory Moves The CPU12 has both 8- and 16-bit variations of memory-to-memory move instructions. The source address can be specified with immediate, extended, or indexed addressing modes. The destination address can be specified by extended or indexed addressing mode. The indexed addressing mode for move instructions is limited to modes that require no extension bytes (9- and 16-bit constant offsets are not allowed), and indirect indexing is not allowed for moves. This leaves 5-bit signed constant offsets, accumulator offsets, and the automatic increment/decrement modes. The following simple loop is a block move routine capable of moving up to 256 words of information from one memory area to another.
LOOP DBNE MOVW 2,X+ , 2,Y+ B,LOOP ;move a word and update pointers ;repeat B times
The move immediate to extended is a convenient way to initialize a register without using an accumulator or affecting condition codes.
B.8.2 Universal Transfer and Exchange The M68HC11 has only eight transfer instructions and two exchange instructions. The CPU12 has a universal transfer/exchange instruction that can be used to transfer or exchange data between any two CPU registers. The operation is obvious when the two registers are the same size, but some of the other combinations provide very useful results. For example when an 8-bit register is transferred to a 16-bit register, a sign-extend operation is performed. Other combinations can be used to perform a zero-extend operation. These instructions are used often in CPU12 assembly language programs. Transfers can be used to make extra copies of data in another register, and exchanges can be used to temporarily save data during a call to a routine that expects data in a specific register. This is sometimes faster and produces more compact object code than saving data to memory with pushes or stores.
B.8.3 Loop Construct The CPU12 instruction set includes a new family of six loop primitive instructions. These instructions decrement, increment, or test a loop count in a CPU register and then branch based on a zero or non-zero test result. The CPU registers that can be used for the loop count are A, B, D, X, Y, or
S12CPUV2 Reference Manual, Rev. 4.0 420 Freescale Semiconductor
SP. The branch range is a 9-bit signed value (512 to +511) which gives these instructions twice the range of a short branch instruction.
B.8.4 Long Branches All of the branch instructions from the M68HC11 are also available with 16-bit offsets which allows them to reach any location in the 64-Kbyte address space.
B.8.5 Minimum and Maximum Instructions Control programs often need to restrict data values within upper and lower limits. The CPU12 facilitates this function with 8- and 16-bit versions of MIN and MAX instructions. Each of these instructions has a version that stores the result in either the accumulator or in memory. For example, in a fuzzy logic inference program, rule evaluation consists of a series of MIN and MAX operations. The min operation is used to determine the smallest rule input (the running result is held in an accumulator), and the max operation is used to store the largest rule truth value (in an accumulator) or the previous fuzzy output value (in a RAM location) to the fuzzy output in RAM. The following code demonstrates how MIN and MAX instructions can be used to evaluate a rule with four inputs and two outputs.
LDY LDX LDAA MINA MINA MINA MINA MAXM MAXM #OUT1 #IN1 #$FF 1,X+ 1,X+ 1,X+ 1,X+ 1,Y+ 1,Y+ ;Point at first output ;Point at first input value ;start with largest 8-bit number in A ;A=MIN(A,IN1) ;A=MIN(A,IN2) ;A=MIN(A,IN3) ;A=MIN(A,IN4) so A holds smallest input ;OUT1=MAX(A,OUT1) and A is unchanged ;OUT1=MAX(A,OUT2) A still has min input
Before this sequence is executed, the fuzzy outputs must be cleared to zeros (not shown). M68HC11 MIN or MAX operations are performed by executing a compare followed by a conditional branch around a load or store operation.
These instructions can also be used to limit a data value prior to using it as an input to a table lookup or other routine. Suppose a table is valid for input values between $20 and $7F. An arbitrary input value can be tested against these limits and be replaced by the largest legal value if it is too big, or the smallest legal value if too small using the following two CPU12 instructions.
HILIMIT FCB LOWLIMIT FCB MINA MAXA $7F $20 HILIMIT,PCR LOWLIMIT,PCR ;comparison value needs to be in mem ;so it can be referenced via indexed ;A=MIN(A,$7F) ;A=MAX(A,$20) ;A now within the legal range $20 to $7F
The ,PCR notation is also new for the CPU12. This notation indicates the programmer wants an appropriate offset from the PC reference to the memory location (HILIMIT or LOWLIMIT in this example), and then to assemble this instruction into a PC-relative indexed MIN or MAX instruction. B.8.6 Fuzzy Logic Support The CPU12 includes four instructions (MEM, REV, REVW, and WAV) specifically designed to support fuzzy logic programs. These instructions have a very small impact on the size of the CPU and even less impact on the cost of a complete MCU. At the same time, these instructions dramatically reduce the object code size and execution time for a fuzzy logic inference program. A kernel written for the M68HC11 required about 250 bytes and executed in about 750 milliseconds. The CPU12 kernel uses about 50 bytes and executes in about 16 microseconds (in a 25-MHz HCS12). B.8.7 Table Lookup and Interpolation The CPU12 instruction set includes two instructions (TBL and ETBL) for lookup and interpolation of compressed tables. Consecutive table values are assumed to be the x coordinates of the endpoints of a line segment. The TBL instruction uses 8-bit table entries (y-values) and returns an 8-bit result. The ETBL instruction uses 16-bit table entries (y-values) and returns a 16-bit result. An indexed addressing mode is used to identify the effective address of the data point at the beginning of the line segment, and the data value for the end point of the line segment is the next consecutive memory location (byte for TBL and word for ETBL). In both cases, the B accumulator represents the ratio of (the x-distance from the beginning of the line segment to the lookup point) to (the x-distance from the beginning of the line segment to the end of the line segment). B is treated as an 8-bit binary fraction with radix
S12CPUV2 Reference Manual, Rev. 4.0 422 Freescale Semiconductor
point left of the MSB, so each line segment is effectively divided into 256 pieces. During execution of the TBL or ETBL instruction, the difference between the end point y-value and the beginning point y-value (a signed byte for TBL or a signed word for ETBL) is multiplied by the B accumulator to get an intermediate delta-y term. The result is the y-value of the beginning point, plus this signed intermediate delta-y value.
B.8.8 Extended Bit Manipulation The M68HC11 CPU allows only direct or indexed addressing. This typically causes the programmer to dedicate an index register to point at some memory area such as the on-chip registers. The CPU12 allows all bit manipulation instructions to work with direct, extended, or indexed addressing modes.
B.8.9 Push and Pull D and CCR The CPU12 includes instructions to push and pull the D accumulator and the CCR. It is interesting to note that the order in which 8-bit accumulators A and B are stacked for interrupts is the opposite of what would be expected for the upper and lower bytes of the 16-bit D accumulator. The order used originated in the M6800, an 8-bit microprocessor developed long before anyone thought 16-bit single-chip devices would be made. The interrupt stacking order for accumulators A and B is retained for code compatibility.
B.8.10 Compare SP This instruction was added to the CPU12 instruction set to improve orthogonality and high-level language support. One of the most important requirements for C high-level language support is the ability to do arithmetic on the stack pointer for such things as allocating local variable space on the stack. The LEAS 5,SP instruction is an example of how the compiler could easily allocate five bytes on the stack for local variables. LDX 5,SP+ loads X with the value on the bottom of the stack and deallocates five bytes from the stack in a single operation that takes only two bytes of object code.
B.8.11 Support for Memory Expansion Bank switching is a common method of expanding memory beyond the 64-Kbyte limit of a CPU with a 64-Kbyte address space, but there are some known difficulties associated with bank switching. One problem is that interrupts cannot take place during the bank switching operation. This increases worst case interrupt latency and requires extra programming space and execution time. Some HCS12 and M68HC12 variants include a built-in bank switching scheme that eliminates many of the problems associated with external switching logic. The CPU12 includes CALL and return-from-call (RTC) instructions that manage the interface to the bank-switching system. These instructions are analogous to the JSR and RTS instructions, except that the bank page number is saved and restored automatically during execution. Since the page change operation is part of an uninterruptable instruction, many of the difficulties associated with bank switching are eliminated. On HCS12 and M68HC12 derivatives with expanded memory capability, bank numbers are specified by on-chip control registers. Since the addresses of these control registers may not be the same in all derivatives, the CPU12 has a dedicated control line to the on-chip integration module that indicates when a memory-expansion register is being read or written. This allows the CPU to access the PPAGE register without knowing the register address. The indexed indirect versions of the CALL instruction access the address of the called routine and the destination page value indirectly. For other addressing mode variations of the CALL instruction, the destination page value is provided as immediate data in the instruction object code. CALL and RTC execute correctly in the normal 64-Kbyte address space, thus providing for portable code.
The CPU12 has special sign extension instructions to allow easy type-casting from smaller data types to larger ones, such as from char to integer. This sign extension is automatically performed when an 8-bit value is transferred to a 16-bit register.
C.3.1 Register Pushes and Pulls The M68HC11 has push and pull instructions for A, B, X, and Y, but requires separate 8-bit pushes and pulls of accumulators A and B to stack or unstack the 16-bit D accumulator (the concatenated combination of A:B). The PSHD and PULD instructions allow directly stacking the D accumulator in the expected 16-bit order. Adding PSHC and PULC improved orthogonality by completing the set of stacking instructions so that any of the CPU registers can be pushed or pulled. These instructions are also useful for preserving the CCR value during a function call subroutine.
C.3.2 Allocating and Deallocating Stack Space The LEAS instruction can be used to allocate or deallocate space on the stack for temporary variables:
LEAS LEAS 10,S 10,S ;Allocate space for 5 16-bit integers ;Deallocate space for 5 16-bit ints
The (de)allocation can even be combined with a register push or pull as in this example:
LDX 8,S+ ;Load return value and deallocate
X is loaded with the 16-bit integer value at the top of the stack, and the stack pointer is adjusted up by eight to deallocate space for eight bytes worth of temporary storage. Post-increment indexed addressing is used in this example, but all four combinations of pre/post increment/decrement are available (offsets from 8 to +8 inclusive, from X, Y, or SP). This form of indexing can often be used to get an index (or stack pointer) adjustment for free during an indexed operation (the instruction requires no more code space or cycles than a zero-offset indexed instruction).
C.3.3 Frame Pointer In the C language, it is common to have a frame pointer in addition to the CPU stack pointer. The frame is an area of memory within the system stack which is used for parameters and local storage of variables used within a function subroutine. The following is a description of how a frame pointer can be set up and used. First, parameters (typically values in CPU registers) are pushed onto the system stack prior to using a JSR or CALL to get to the function subroutine. At the beginning of the called subroutine, the frame pointer of the calling program is pushed onto the stack. Typically, an index register, such as X, is used as the frame pointer, so a PSHX instruction would save the frame pointer from the calling program. Next, the called subroutine establishes a new frame pointer by executing a TFR S,X. Space is allocated for local variables by executing an LEAS n,S, where n is the number of bytes needed for local variables. Notice that parameters are at positive offsets from the frame pointer while locals are at negative offsets. In the M68HC11, the indexed addressing mode uses only positive offsets, so the frame pointer always points to the lowest address of any parameter or local. After the function subroutine finishes, calculations are required to restore the stack pointer to the
S12CPUV2 Reference Manual, Rev. 4.0 Freescale Semiconductor 427
mid-frame position between the locals and the parameters before returning to the calling program. The CPU12 only requires execution of TFR X,S to deallocate the local storage and return. The concept of a frame pointer is supported in the CPU12 through a combination of improved indexed addressing, universal transfer/exchange, and the LEA instruction. These instructions work together to achieve more efficient handling of frame pointers. It is important to consider the complete instruction set as a complex system with subtle interrelationships rather than simply examining individual instructions when trying to improve an instruction set. Adding or removing a single instruction can have unexpected consequences.
much less efficient because extra steps are required to prepare inputs to the EDIVS, and because EDIVS uses the Y index register. EDIVS uses a 32-bit signed numerator and the C compiler would typically want to use a 16-bit value (the size of an integer data type). The 16-bit C value would need to be sign-extended into the upper 16 bits of the 32-bit EDIVS numerator before the divide operation. Operand size is also a potential problem in the extended multiply operations but the difficulty can be minimized by putting the results in CPU registers. Having higher precision math instructions is not necessarily a requirement for supporting high-level language because these functions can be performed as library functions. However, if an application requires these functions, the code is much more efficient if the MCU can use native instructions instead of relatively large, slow routines.
C.8 Pointers
The CPU12 supports pointers by allowing direct arithmetic operations on the 16-bit index registers (LEAS, LEAX, and LEAY instructions) and by allowing indexed indirect addressing modes.
Index
A
ABA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 Abbreviations for system resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 ABX instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 ABY instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 Access details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9499, 379 Accumulator offset indexed addressing mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Accumulator offset indexed indirect addressing mode . . . . . . . . . . . . . . . . . . . . . . 40 Accumulators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21, 35 B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21, 35 D . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21, 35 ADCA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 ADCB instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 ADDA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 ADDB instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 ADDD instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 Addition instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 ADDR mnemonic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Addressing modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Direct . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Extended . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Immediate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Indexed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22, 34 Inherent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Relative . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 ANDA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 ANDB instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 ANDCC instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 Arithmetic shift . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 ASL instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 ASLA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 ASLB instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 ASLD instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
S12CPUV2 Reference Manual, Rev. 4.0 Freescale Semiconductor 433
ASR instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 ASRA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 ASRB instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Asserted . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Auto increment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
B
Background debug mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 Instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86, 123 Base index register . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3741 BCC instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 BCD instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60, 161 BCLR instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 BCS instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 BEQ instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 BGE instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 BGND instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86, 123 BGT instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124 BHI instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 BHS instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 Binary-coded decimal instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60, 161 Bit manipulation instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65, 119, 140, 423, 425 Mask operand . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43, 119, 137, 139, 140 Multiple addressing modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Bit test instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65, 76, 127, 128, 137, 139 BITA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 BITB instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 Bit-condition branches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76, 137, 139 BLE instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 BLO instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 BLS instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 BLT instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 BMI instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 BNE instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 Boolean logic instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 AND . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108, 109, 110 Complement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154, 155, 156 Exclusive OR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179, 180 Inclusive OR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243, 244, 245 Negate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239, 240, 241 BPL instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 BRA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 Branch instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33, 5153, 73, 429 Bit-condition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .53, 76, 137, 139
S12CPUV2 Reference Manual, Rev. 4.0 434 Freescale Semiconductor
Long . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52, 53, 75, 421 Loop primitive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53, 77, 400 Offset values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74, 75, 76, 77 Offsets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Short . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52, 53, 74 Signed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7375 Simple . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7375 Subroutine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78, 141 Summary of complementary branches . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118, 196 Taken/not-taken cases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52, 99 Unary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7375 Unsigned . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7375 Branch offset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3334 BRCLR instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 BRN instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 BRSET instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 BSET instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140 BSR instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50, 141 Bus cycles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Bus structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407 BVC instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 BVS instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 Byte moves . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58, 236 Byte order in memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Byte-sized instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
C
C . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 C status bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26, 66, 118, 120 CALL instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44??, 50, 78, 144, 424, 430 Case statements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429 CBA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 CCR (see Condition codes register) Changes in execution flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4953 CLC instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 Clear instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Clear memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 Cleared . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 CLI instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147 Clock monitor reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314 CLR instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 CLRA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 CLRB instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 CLV instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
S12CPUV2 Reference Manual, Rev. 4.0 Freescale Semiconductor 435
CMPA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 CMPB instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 Code size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416 COM instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 COMA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 COMB instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156 Compare instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 Complement instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Computer operating properly (COP) watchdog . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314 Condition codes instructions . . . . . . . . . . . 84, 110, 245, 248, 254, 291, 297, 405, 423 Condition codes register . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21, 2327 C status bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26, 66, 118, 120 H status bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25, 161 I mask bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25, 110, 147, 276, 306, 313, 315 Manipulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84, 110, 245, 276 N status bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 S control bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24, 282 V status bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 X mask bit . . . . . . . . . . . . . . . . . . . . 25, 182, 254, 270, 282, 291, 296, 306, 313, 315 Z status bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26, 121, 134 Conditional 16-bit read cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98, 379 Conditional 8-bit read cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98, 379 Conditional 8-bit write cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98, 379 Conserving power . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85, 282, 306 Constant indirect indexed addressing mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 Constant offset indexed addressing mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37, 38 COP reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314 CPD instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 CPS instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 CPX instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 CPY instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160 Cycle code letters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95, 379 Cycle counts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415 Cycle-by-cycle operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94, 379
D
DAA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 DATA mnemonic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Data types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27, 425 DBEQ instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162, 400 DBNE instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163, 400 DEC instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 DECA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 DECB instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
S12CPUV2 Reference Manual, Rev. 4.0 436 Freescale Semiconductor
Decrement instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Defuzzification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344, 364368 DES instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 DEX instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 DEY instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 Direct addressing mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Division instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64, 428 16-bit fractional . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 16-bit integer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186, 187 32-bit extended . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170, 171 Double accumulator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21, 22
E
EDIV instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 EDIVS instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 Effective address . . . . . . . . . . . . . . . . . . . . . . . 29, 35, 83, 220, 221, 222, 417, 426428 EMACS instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71, 172 EMAXD instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 EMAXM instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174, 338 EMIND instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175, 338 EMINM instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 EMUL instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 EMULS instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 Enabling maskable interrupts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25, 147 EORA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179 EORB instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 ETBL instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72, 181, 338 Even bytes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Exceptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50, 311 Interrupts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315 Maskable interrupts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315, 317 Non-maskable interrupts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315 Priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312 Processing flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318 Resets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311, 313314 Software interrupts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79, 289, 318 Unimplemented opcode trap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311, 313, 317 Vectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311, 318 Exchange instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57, 182, 417, 420 Postbyte encoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399 Execution cycles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Execution time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 EXG instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182 Expanded memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44, 50, 424, 430
S12CPUV2 Reference Manual, Rev. 4.0 Freescale Semiconductor 437
Bank switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44, 78, 144, 269 Page registers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Subroutines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78, 430 Extended addressing mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Extended division . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Extension byte . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 External interrupts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317 External queue reconstruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323 HCS12 queue reconstruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328 HCS12 reconstruction algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330 HCS12 timing detail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324 M68HC12 queue reconstruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331 M68HC12 reconstruction algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332 M68HC12 timing detail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325 External reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
F
Fast math . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415 f-cycle (free cycle) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95, 379 FDIV instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64, 183 Fractional division . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64, 183 Frame pointer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427, 428 Free cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95, 379 Fuzzy logic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337374 Antecedents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342, 372 Consequents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342, 372 Custom programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369 Defuzzification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .68, 344, 364367 Fuzzification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67, 340, 369 Inference kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339, 345 Inputs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372 Instructions . . . . . . . . . . . . . . . . . . . . 67, 68, 233, 258262, 307, 337, 347367, 422 Interrupts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361, 365368 Knowledge base . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340, 342, 372 Membership functions . . . . . . . . . . . . . . . . . . 67, 233, 338, 340, 347352, 369371 Outputs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68, 372 Rule evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67, 258262, 342, 353363, 372 Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340, 342, 372 Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339 Tabular membership functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72, 369 Weighted average . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68, 307, 337, 344, 364367
G
g-cycle (read PPAGE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95, 379 General purpose accumulators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Global interrupt mask . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26, 313
H
H status bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25, 161 Highest priority interrupt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313 High-level language . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425431 Addressing modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425, 427, 429 Condition codes register . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429 Expanded memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430 Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425 Loop primitives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428 Stack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426, 427
I
I mask bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25, 110, 147, 276, 313 IBEQ instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184, 400 IBNE instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185, 400 I-cycle (16-bit read indirect) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95, 379 i-cycle (8-bit read indirect) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95, 379 IDIV instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186 IDIVS instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187, 428 Immediate addressing mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 INC instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 INCA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 INCB instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190 Increment instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Index calculation instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83, 417 Index manipulation instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Index registers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21, 81, 83, 427 PC (as an index register) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23, 36, 37, 94 SP (as an index register) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22, 36, 37, 94 X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22, 36, 94 Y . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22, 36, 94 Indexed addressing modes . . . . . . . . . . . . . . . . . . . . . . . . . . 22, 3443, 397, 410414 16-bit constant indirect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 16-bit constant offset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 5-bit constant offset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 9-bit constant offset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Accumulator direct . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
S12CPUV2 Reference Manual, Rev. 4.0 Freescale Semiconductor 439
Accumulator offset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Auto increment/decrement indexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Base index register . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3741 Extension byte . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Limitations for BIT and MOV instructions . . . . . . . . . 119, 137, 139, 140, 236, 237 Postbyte . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Postbyte encoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34, 397 Inference kernel, fuzzy logic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345 Inherent addressing mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 INS instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 Instruction pipe, see Instruction queue Instruction queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28, 47, 323, 408 Buffer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Data movement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Debugging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323 Reconstruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323334 Stages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48, 323 Status registers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329, 332 Status signals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48, 324333 Instruction set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55, 87, 381 Integer division . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64, 186187 Interrupt instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Interrupts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315319 Enabling and disabling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25, 147, 276, 315 External . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317 I mask bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25, 147, 276, 316 Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79, 80, 147, 270, 276, 289, 298 Low-power stop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85, 282 Maskable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25, 315 Non-maskable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25, 311313, 315 Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316 Return . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25, 26, 80, 270, 317 Service routines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316 Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79, 289, 318 Stacking order . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316, 376 Vectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311, 317, 318 Wait instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85, 306 X mask bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25, 282, 306, 316 INX instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 INY instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
J
JMP instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53, 194 JSR instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50, 195
S12CPUV2 Reference Manual, Rev. 4.0 440 Freescale Semiconductor
K
Knowledge base . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
L
Label . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 LBCC instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 LBCS instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 LBEQ instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198 LBGE instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199 LBGT instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200 LBHI instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 LBHS instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202 LBLE instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 LBLO instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 LBLS instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 LBLT instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 LBMI instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 LBNE instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 LBPL instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 LBRA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210 LBRN instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 LBVC instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212 LBVS instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213 LDAA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214 LDAB instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 LDD instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216 LDS instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 LDX instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218 LDY instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 LEAS instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220, 427, 429 Least significant byte . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Least significant word . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 LEAX instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221, 429 LEAY instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222, 429 Legal label . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Literal expression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Load instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Logic level one . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Logic level zero . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Loop primitive instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .53, 77, 400, 420, 428 Offset values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
S12CPUV2 Reference Manual, Rev. 4.0 Freescale Semiconductor 441
Postbyte encoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400 Low-power stop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85, 282 LSL instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66, 223 LSLA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224 LSLB instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225 LSLD instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226 LSR instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 LSRA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228 LSRB instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229 LSRD instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
M
M68HC11 compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29, 403424 M68HC11 instruction mnemonics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404 Maskable interrupts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25, 315 MAXA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 Maximum instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70, 421 16-bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173, 174 8-bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231, 232 MAXM instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232, 338 MEM instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67, 233, 337, 347352 Membership functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340, 347352 Memory and addressing symbols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 MINA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234, 338 Minimum instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70, 421 16-bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175, 176 8-bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234, 235 MINM instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 Misaligned instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 Mnemonic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Most significant byte . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Most significant word . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 MOVB instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 Move instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58, 236, 237, 417, 420 Destination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Multiple addressing modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 PC relative addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Reference index register . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 MOVW instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237 MUL instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 Multiple addressing modes Bit manipulation instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Move instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
S12CPUV2 Reference Manual, Rev. 4.0 442 Freescale Semiconductor
Multiplication instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 16-bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177, 178 8-bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 Multiply and accumulate instructions . . . . . . . . . . . . . . . . . . . . . . . . .71, 172, 307, 373
N
N status bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 n-cycle (write PPAGE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96, 379 NEG instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239 NEGA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240 Negate instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Negated . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Negative integers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 NEGB instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241 Non-maskable interrupts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25, 313, 315 NOP instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86, 242 Notation Branch taken/not taken . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99, 379 Changes in CCR bits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Cycle-by-cycle operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 Memory and addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Object code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 Operators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18, 377 Source forms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 System resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Null operation instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86, 242 Numeric range of branch offsets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34, 7477
O
Object code notation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 O-cycle (optional program word fetch) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52, 96, 379 Odd bytes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Offset Branch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3334 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3438 Opcode map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395396 Operators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18, 377 Optional cycles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52, 96, 379 ORAA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243 ORAB instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244 ORCC instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245 Orthogonality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
P
Page 2 prebyte . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52, 96, 396 P-cycle (program word fetch) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96, 379 Pipeline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Pointer calculation instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .83, 220, 221, 222 Pointers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429 Postbyte encoding Exchange instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182, 399 Indexed addressing instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Indexed addressing modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36, 397 Loop primitive instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400 Transfer instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278, 296, 399 Post-decrement indexed addressing mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Post-increment indexed addressing mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Power conservation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85, 282, 306 Power-on reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314 Prebyte . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52, 96, 396 Pre-decrement indexed addressing mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Pre-increment indexed addressing mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Priority, exception . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312 Program counter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21, 23, 35, 123 Program word access cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96, 379 Programming model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15, 21, 407 Pseudo-non-maskable interrupt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313 PSHA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246 PSHB instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247 PSHC instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248 PSHD instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249, 426 PSHX instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250 PSHY instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251 PULA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252 PULB instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253 PULC instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254, 426 PULD instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255, 426 Pull instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430 PULX instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 PULY instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257 Push instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
Q
Queue reconstruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323 HCS12 queue reconstruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328 HCS12 reconstruction algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
S12CPUV2 Reference Manual, Rev. 4.0 444 Freescale Semiconductor
HCS12 timing detail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324 M68HC12 queue reconstruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331 M68HC12 reconstruction algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332 M68HC12 timing detail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
R
R-cycle (16-bit data read) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97, 379 r-cycle (8-bit data read) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97, 379 Read 16-bit data cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97, 379 Read 8-bit data cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97, 379 Read indirect pointer cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95, 379 Read indirect PPAGE value cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95, 379 Read PPAGE cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95, 379 Register designators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Relative addressing mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Relative offset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Resets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311, 313 Clock monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314 COP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314 External . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314 Power-on . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314 Return from call . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269 Return from interrupt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270 Return from subroutine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271 REV instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . 67, 258259, 337, 342, 353358, 372 REVW instruction . . . . . . . . . . . . . . . . . . . . . . . . . 67, 260262, 337, 342, 359363, 372 ROL instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263 ROLA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264 ROLB instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265 ROR instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 RORA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267 RORB instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268 Rotate instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 RTC instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44, 50, 78, 269, 424, 430 RTI instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26, 80, 270, 317 RTS instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51, 271
S
S control bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24, 282 SBA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272 SBCA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273 SBCB instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274 S-cycle (16-bit stack write) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97, 379
S12CPUV2 Reference Manual, Rev. 4.0 Freescale Semiconductor 445
s-cycle (8-bit stack write) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97, 379 SEC instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275 SEI instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276 Service routine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311 Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Setting memory bits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140 SEV instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277 SEX instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57, 278 Shift instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 Arithmetic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 Sign extension instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57, 278, 426 Signed branches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7375 Signed integers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Signed multiplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Simple branches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7375 Software interrupts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289 Source code compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15, 404 Source form notation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 STAA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279 STAB instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280 Stack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22, 409, 410 Stack 16-bit data cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97, 379 Stack 8-bit data cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97, 379 Stack operation instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Stack pointer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21, 22, 35, 426 Compatibility with HC11 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409410 Initialization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22, 410 Manipulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Stacking order . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316, 376 Stack pointer instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82, 423, 426 Standard CPU12 address space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 STD instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281 STOP continue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282 STOP disable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24, 282 STOP instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24, 85, 282 Store instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 STS instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283 STX instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284 STY instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285 SUBA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286 SUBB instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287 SUBD instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288 Subroutine instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 Subroutines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50, 430 Expanded memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50, 78, 144, 269, 430
S12CPUV2 Reference Manual, Rev. 4.0 446 Freescale Semiconductor
Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78, 141, 144, 195, 430 Return . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269, 271 Subtraction instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 SWI instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79, 289, 318 Switch statements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429 Symbols and notation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16, 377
T
TAB instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290 Table interpolation instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .72, 181, 294, 422 Tabular membership functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369371 TAP instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291 TBA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292 TBEQ instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293, 400 TBL instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .72, 294, 338, 369370 TBNE instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295, 400 T-cycle (16-bit conditional read) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98, 379 t-cycle (8-bit conditional read) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98, 379 Termination of interrupt service routines . . . . . . . . . . . . . . . . . . . . . . . . . . 80, 270, 317 Termination of subroutines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269, 271 Test instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 TFR instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296 TPA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297 Transfer instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57, 417, 420 Postbyte encoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399 TRAP instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .79, 298, 317, 396 TST instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299 TSTA instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300 TSTB instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301 TSX instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302 TSY instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303 Twos-complement form . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 TXS instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304 Types of instructions Addition and Subtraction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Background and null . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 Binary-coded decimal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 Bit test and manipulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 Boolean logic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Branch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Clear, complement, and negate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Compare and test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 Condition code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Decrement and increment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
S12CPUV2 Reference Manual, Rev. 4.0 Freescale Semiconductor 447
Fuzzy logic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 Index manipulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Interrupt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Jump and subroutine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 Load and store . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Loop primitives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 Maximum and minimum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 Move . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Multiplication and division . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Multiply and accumulate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 Pointer and index calculation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 Shift and rotate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 Sign extension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Stacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Stop and wait . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 Table interpolation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 Transfer and exchange . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 TYS instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
U
U-cycle (16-bit stack read) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98, 379 u-cycle (8-bit stack read) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97, 379 Unary branches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7375 Unimplemented opcode trap . . . . . . . . . . . . . . . . . . . . . . . . . . . .79, 298, 311, 313, 396 Unsigned branches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7375 Unsigned multiplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Unstack 16-bit data cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98, 379 Unstack 8-bit data cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97, 379 Unweighted rule evaluation . . . . . . . . . . . . . . . . . . . . . . . 258259, 342, 353358, 372
V
V status bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26, 84 V-cycle (vector fetch) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98, 379 Vector fetch cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98, 379 Vectors, exception . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311, 318
W
WAI instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85, 306 Wait instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85, 306 Watchdog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314 WAV instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68, 307, 337, 344, 364368
S12CPUV2 Reference Manual, Rev. 4.0 448 Freescale Semiconductor
HCS12 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366 M68HC12 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367 wavr pseudo-instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365368 HCS12 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366 M68HC12 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367 W-cycle (16-bit data write) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97, 379 w-cycle (8-bit data write) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97, 379 Weighted average . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307 Weighted rule evaluation . . . . . . . . . . . . . . . . . 260262, 342, 353355, 359363, 372 Word moves . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58, 237 Write 16-bit data cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97, 379 Write 8-bit data cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97, 379 Write PPAGE cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96, 379
X
X mask bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25, 182, 254, 270, 282, 291, 296, 306 x-cycle (8-bit conditional write) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98, 379 XGDX instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308 XGDY instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
Z
Z status bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26, 121, 134 Zero-page addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
<size-12>S12CPUV2