Google-Apps
Hauptmenü

Post a Comment On: Ken Shirriff's blog

"Reverse-engineering the flag circuits in the 8085 processor"

4 Comments -

1 – 4 of 4
Anonymous Anonymous said...

Cool. Didn't know anybody cared about 8085's anymore. I started my career writing firmware in assembly language for scientific instruments based on 8085. We only had 8K ROM on the low end systems, but I was able to shoehorn enough code to run the display and touchpanel input, control the sensors and data acquisition, and provide RS232 and parallel I/O, etc. I think I still have some of my old tricks, including some pretty good math subroutines, even a log approximation I used to generate the logarithmic display.

July 18, 2013 at 4:42 PM

Anonymous Anonymous said...

Please remember to tag this article with 8085. I love your other 8085 articles (esp. the ALU one) and I'd love to be able to see them all by just bookmarking the 8085 label.

July 19, 2013 at 7:29 AM

Blogger Unknown said...

This is fantastic. I love to see this level of analysis and reverse engineering!

July 21, 2013 at 9:46 PM

Blogger Unknown said...

There are 7 flags out of which only 5 are accessible :

b7 b6 b5 b4 b3 b2 b1 b0
S Z - AC - P - CY

then my question is that among the flags b4 to b7 can the value be A hex.(ie 10 in decimal, bcoz the flag b5 is always 0 and in number 10 b5 should be set to 1)....

By the way, my flag register has a value of A6.

August 4, 2014 at 8:35 PM

You can use some HTML tags, such as <b>, <i>, <a>

Comment moderation has been enabled. All comments must be approved by the blog author.

You will be asked to sign in after submitting your comment.
Please prove you're not a robot