SlideShare a Scribd company logo
1 of 18
Stack & Subroutines
                      Company
                        LOGO
The stack
   The stack is a group of memory location in the
    R/W memory that is used for temporary storage
    of binary information during the execution of a
    program
   The stack is a LIFO structure.
     – Last In First Out.
   The starting location of the stack is defined by
    loading a 16 bit address into the stack pointer
    that spaced is reserved, usually at the top of
    the memory map.


www.themeart.com                                       2
The stack
   The stack normally grows backwards into
    memory.
   The stack can be initialized anywhere in the
    user memory map , but stack is initialized at the
    highest memory location so that there will not
    be any interface with the program.
   In 8085 microprocessor system the beginning of
    the stack is defined in the program by using the
    instruction
    LXI SP,16 bit.
   The LXI SP,a 16 bit state that load the 16 bit
    address into the stack pointer register.
www.themeart.com                                        3
Information is stored and retrieved
          from the stack
•The 8085 provide two instruction PUSH & POP for storing infor
mation on the stack and retrieving it back.

•Information in the register pairs stored on the stack in reverse
order by using the instruction PUSH.

• Information retrieved from the stack by using the instruction
POP.

•PUSH & POP both instruction works with register pairs only.
•The storage and retrieval of the content of registers on the
stack fallows the LIFO(Last-In-First-Out) sequence.

•Information in the stack location may not be destroyed until
new information is stored in that memory location
www.themeart.com                                                    4
The PUSH Instruction

2000 LXI SP,2099H    Load the stack pointer register with the addre
                     ss 2099.
2003 LXI H ,42F2H    Loads data in the HL register pair.

2006 PUSH H          The content of the HL register pair pushed int
                     o stack.
2007 DELAY COUNTER
200F
2010 POP H           Saved data in stack pointer register to HL regi
                     ster pair.




 www.themeart.com                                                      5
PUSH H
   The stack pointer is decremented by one to 2098 H
    , and the contents of the h register are copied to
    memory location 2098H.                         8085 Register
                                                                      F
                                               A
   The stack pointer register is again        B                      C
                                                                      E
                                               D
     decremented by one to 2097H,and H 42                    F2       L
                                              SP        2097
     the contents of the L register are                Memory
    copied to memory location 2097H.
   The contents of the register pair                    F2     2097
                                                         42     2098
     HL are not destroyed ; however                       X     2099

     HL is made available for delay
     counter.                        Contents on the stack &in the register
                                          after the PUSH instruction
www.themeart.com                                                              6
POP H
   The contents of the top of the stack location shown by
    the stack pointer are copied in the L register and the
    stack pointer register is incremented by one to 2098
    H.                                             8085 Register

   The contents of the top of the stack A    B
                                                                       F
                                                                       C
     (now it is 2098H) are copied in the D                             E
                                              H    42         F2       L
     H register,and the stack pointer is SP            2099

     incremented by one.                              MEMORY
   The contents of memory location
                                                          F2       2097
    2097H and 2098 are not destroyed                      42      2098
    until some other data bytes are                       X       2099

    stored in these location. Contentsafterthe stack and in the registers
                                       on
                                            the POP instruction
www.themeart.com                                                            7
Operation of the stack
   During pushing, the stack operates in a “decrement
    then store” style.
    The stack pointer is decremented first, then the
    information is placed on the stack.
    During poping, the stack operates in a “use then
    increment” style.
    The information is retrieved from the top of the
    stack and then the pointer is incremented.
    The SP pointer always points to “the top of the
      stack’’.


www.themeart.com                                         8
PUSH PSW Register Pair
     PUSH PSW (1 Byte Instruction)          A        Flag
      Decrement SP
      Copy the contents of
                                         12           80
       register A to the memory
       location pointed to by SP
     Decrement SP
     Copy the contents of
      Flag register to the memory     FFFB
                                      FFFC
       location pointed to by SP
                                      FFFD       80
                                      FFFE       12
                                      FFFF


www.themeart.com                                             9
Pop PSW Register Pair
     POP PSW (1 Byte Instruction)    A   FLAG
     Copy the contents of the       12    80
      memory location pointed to
      by the SP to Flag register
     Increment SP
     Copy the contents of the
                                   FFFB
      memory location pointed to   FFFC
      by the SP to register A      FFFD   80
                                   FFFE   12
     Increment SP                 FFFF


www.themeart.com                                 10
Subroutines
     A subroutine is group of instruction written sepa
      rately from the main program to perform a func
      tion that occurs repeatedly in the main program
      .
     When a main program calls a subroutine the pro
      gram execution is transferred to the subroutine
      after the completion of the subroutine ,the prog
      ram execution returns to the main program.
     The microprocessor uses the stack to store the r
      eturn address of the subroutine.


www.themeart.com                                          11
Subroutines
   The 8085 has two instructions for dealing
    with subroutines.
   – The CALL instruction is used to redirect
    program execution to the subroutine.
   – The RET instruction is used to return to t
    he main program at the end of the subro
    utine .




www.themeart.com                                  12
The CALL instruction
   CALL ,16 bit
   Call subroutine in conditionally located at
    the memory address specified by the 16
    bit operand.
   This instruction places the address of the
    next instruction on the stack and transfer
    the program execution to the subroutine
    address.


www.themeart.com                                  13
The RET instruction
   Return unconditionally from the subrouti
    ne.
   This instruction locates the return addre
    ss on the top of the stack and transfers t
    he program execution back to the calling
    program.




www.themeart.com                                 14
General characteristics of CALL
       & RTE instruction
  1. The CALL instructions are 3-byte instruc
     tion; the second byte specifies the low
     order byte ,and the third byte specifies
     the high order byte of the subroutine
     address.
  2. The return instruction are 1-byte instruc
     tions.
  3. A CALL instruction must be used in
     conjunction with a return instruction in
     the subroutine .
www.themeart.com                                 15
Necessary steps to implement
          a subroutine

   The stack pointer register must be initiali
    zed ,preferably at the highest memory lo
    cation of the R/W memory.
   The call instruction should be used in the
    main program accompanied by the RET i
    nstruction in the subroutine.




www.themeart.com                                  16
Conditional CALL and RTE Instructions
      The 8085 supports conditional CALL and co
       nditional RTE instructions.
      – The same conditions used with conditional
       JUMP instructions can be used.
      – CC, call subroutine if Carry flag is set.
      – CNC, call subroutine if Carry flag is not set
      – RC, return from subroutine if Carry flag is
       set
      – RNC, return from subroutine if Carry flag
         is not set.
www.themeart.com                                        17
www.themeart.com   18

More Related Content

What's hot

8085 interrupts
8085 interrupts8085 interrupts
8085 interrupts
Ram Babu
 

What's hot (20)

Stack in 8085 microprocessor
Stack in 8085 microprocessorStack in 8085 microprocessor
Stack in 8085 microprocessor
 
8051 MICROCONTROLLER
8051 MICROCONTROLLER 8051 MICROCONTROLLER
8051 MICROCONTROLLER
 
Presentation on 8086 Microprocessor
Presentation  on   8086 MicroprocessorPresentation  on   8086 Microprocessor
Presentation on 8086 Microprocessor
 
Designing of 8 BIT Arithmetic and Logical Unit and implementing on Xilinx Ver...
Designing of 8 BIT Arithmetic and Logical Unit and implementing on Xilinx Ver...Designing of 8 BIT Arithmetic and Logical Unit and implementing on Xilinx Ver...
Designing of 8 BIT Arithmetic and Logical Unit and implementing on Xilinx Ver...
 
Instruction set of 8085 microprocessor
Instruction set of 8085 microprocessorInstruction set of 8085 microprocessor
Instruction set of 8085 microprocessor
 
Interfacing of io device to 8085
Interfacing of io device to 8085Interfacing of io device to 8085
Interfacing of io device to 8085
 
8051,chapter1,architecture and peripherals
8051,chapter1,architecture and peripherals8051,chapter1,architecture and peripherals
8051,chapter1,architecture and peripherals
 
8085 microprocessor Architecture and Pin description
8085 microprocessor Architecture and Pin description 8085 microprocessor Architecture and Pin description
8085 microprocessor Architecture and Pin description
 
Interrupt
InterruptInterrupt
Interrupt
 
Assembly Language Programming Of 8085
Assembly Language Programming Of 8085Assembly Language Programming Of 8085
Assembly Language Programming Of 8085
 
8085 interrupts
8085 interrupts8085 interrupts
8085 interrupts
 
8051 experiments1
8051 experiments18051 experiments1
8051 experiments1
 
8051 Inturrpt
8051 Inturrpt8051 Inturrpt
8051 Inturrpt
 
8051 Microcontroller Tutorial and Architecture with Applications
8051 Microcontroller Tutorial and Architecture with Applications8051 Microcontroller Tutorial and Architecture with Applications
8051 Microcontroller Tutorial and Architecture with Applications
 
8051 addressing modes
8051 addressing modes8051 addressing modes
8051 addressing modes
 
8051 io interface
8051 io interface8051 io interface
8051 io interface
 
Embedded C programming based on 8051 microcontroller
Embedded C programming based on 8051 microcontrollerEmbedded C programming based on 8051 microcontroller
Embedded C programming based on 8051 microcontroller
 
Memory Organization
Memory OrganizationMemory Organization
Memory Organization
 
Instruction set
Instruction setInstruction set
Instruction set
 
8086 modes
8086 modes8086 modes
8086 modes
 

Similar to Stack in microprocessor 8085(presantation)

Instructionset8085
Instructionset8085Instructionset8085
Instructionset8085
Fawad Pathan
 
Basic programming of 8085
Basic programming of 8085 Basic programming of 8085
Basic programming of 8085
vijaydeepakg
 

Similar to Stack in microprocessor 8085(presantation) (20)

Stack and subroutine
Stack and subroutineStack and subroutine
Stack and subroutine
 
Stacks & subroutines 1
Stacks & subroutines 1Stacks & subroutines 1
Stacks & subroutines 1
 
B sc e 5.2 mp unit 2 soft ware(alp)
B sc e 5.2 mp unit 2 soft ware(alp)B sc e 5.2 mp unit 2 soft ware(alp)
B sc e 5.2 mp unit 2 soft ware(alp)
 
Lecture 05 NOP and Stack Group of Instructions
Lecture 05 NOP and Stack Group of InstructionsLecture 05 NOP and Stack Group of Instructions
Lecture 05 NOP and Stack Group of Instructions
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
Stack and subroutine
Stack and subroutineStack and subroutine
Stack and subroutine
 
Microprocessor and Microcontroller lec4
Microprocessor and Microcontroller lec4Microprocessor and Microcontroller lec4
Microprocessor and Microcontroller lec4
 
03 addr mode & instructions
03 addr mode & instructions03 addr mode & instructions
03 addr mode & instructions
 
Embedded C programming session10
Embedded C programming  session10Embedded C programming  session10
Embedded C programming session10
 
Stacks & Subroutines.ppt.pptx
Stacks & Subroutines.ppt.pptxStacks & Subroutines.ppt.pptx
Stacks & Subroutines.ppt.pptx
 
C programming session10
C programming  session10C programming  session10
C programming session10
 
Lec04
Lec04Lec04
Lec04
 
Lec04
Lec04Lec04
Lec04
 
Instructionset8085
Instructionset8085Instructionset8085
Instructionset8085
 
Basic programming of 8085
Basic programming of 8085 Basic programming of 8085
Basic programming of 8085
 
8085 instruction set
8085 instruction set8085 instruction set
8085 instruction set
 
8085 is details
8085 is details8085 is details
8085 is details
 
UNIT II.pptx
UNIT II.pptxUNIT II.pptx
UNIT II.pptx
 
8051 Programming (1).pptx
8051 Programming (1).pptx8051 Programming (1).pptx
8051 Programming (1).pptx
 
4. Instruction Set Of MP 8085.pptx
4. Instruction Set Of MP 8085.pptx4. Instruction Set Of MP 8085.pptx
4. Instruction Set Of MP 8085.pptx
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Stack in microprocessor 8085(presantation)

  • 1. Stack & Subroutines Company LOGO
  • 2. The stack  The stack is a group of memory location in the R/W memory that is used for temporary storage of binary information during the execution of a program  The stack is a LIFO structure. – Last In First Out.  The starting location of the stack is defined by loading a 16 bit address into the stack pointer that spaced is reserved, usually at the top of the memory map. www.themeart.com 2
  • 3. The stack  The stack normally grows backwards into memory.  The stack can be initialized anywhere in the user memory map , but stack is initialized at the highest memory location so that there will not be any interface with the program.  In 8085 microprocessor system the beginning of the stack is defined in the program by using the instruction  LXI SP,16 bit.  The LXI SP,a 16 bit state that load the 16 bit address into the stack pointer register. www.themeart.com 3
  • 4. Information is stored and retrieved from the stack •The 8085 provide two instruction PUSH & POP for storing infor mation on the stack and retrieving it back. •Information in the register pairs stored on the stack in reverse order by using the instruction PUSH. • Information retrieved from the stack by using the instruction POP. •PUSH & POP both instruction works with register pairs only. •The storage and retrieval of the content of registers on the stack fallows the LIFO(Last-In-First-Out) sequence. •Information in the stack location may not be destroyed until new information is stored in that memory location www.themeart.com 4
  • 5. The PUSH Instruction 2000 LXI SP,2099H Load the stack pointer register with the addre ss 2099. 2003 LXI H ,42F2H Loads data in the HL register pair. 2006 PUSH H The content of the HL register pair pushed int o stack. 2007 DELAY COUNTER 200F 2010 POP H Saved data in stack pointer register to HL regi ster pair. www.themeart.com 5
  • 6. PUSH H  The stack pointer is decremented by one to 2098 H , and the contents of the h register are copied to memory location 2098H. 8085 Register F A  The stack pointer register is again B C E D decremented by one to 2097H,and H 42 F2 L SP 2097 the contents of the L register are Memory copied to memory location 2097H.  The contents of the register pair F2 2097 42 2098 HL are not destroyed ; however X 2099 HL is made available for delay counter. Contents on the stack &in the register after the PUSH instruction www.themeart.com 6
  • 7. POP H  The contents of the top of the stack location shown by the stack pointer are copied in the L register and the stack pointer register is incremented by one to 2098 H. 8085 Register  The contents of the top of the stack A B F C (now it is 2098H) are copied in the D E H 42 F2 L H register,and the stack pointer is SP 2099 incremented by one. MEMORY  The contents of memory location F2 2097 2097H and 2098 are not destroyed 42 2098 until some other data bytes are X 2099 stored in these location. Contentsafterthe stack and in the registers on the POP instruction www.themeart.com 7
  • 8. Operation of the stack  During pushing, the stack operates in a “decrement then store” style.  The stack pointer is decremented first, then the information is placed on the stack.  During poping, the stack operates in a “use then increment” style.  The information is retrieved from the top of the stack and then the pointer is incremented.  The SP pointer always points to “the top of the stack’’. www.themeart.com 8
  • 9. PUSH PSW Register Pair  PUSH PSW (1 Byte Instruction) A Flag  Decrement SP  Copy the contents of 12 80 register A to the memory location pointed to by SP  Decrement SP  Copy the contents of Flag register to the memory FFFB FFFC location pointed to by SP FFFD 80 FFFE 12 FFFF www.themeart.com 9
  • 10. Pop PSW Register Pair  POP PSW (1 Byte Instruction) A FLAG  Copy the contents of the 12 80 memory location pointed to by the SP to Flag register  Increment SP  Copy the contents of the FFFB memory location pointed to FFFC by the SP to register A FFFD 80 FFFE 12  Increment SP FFFF www.themeart.com 10
  • 11. Subroutines  A subroutine is group of instruction written sepa rately from the main program to perform a func tion that occurs repeatedly in the main program .  When a main program calls a subroutine the pro gram execution is transferred to the subroutine after the completion of the subroutine ,the prog ram execution returns to the main program.  The microprocessor uses the stack to store the r eturn address of the subroutine. www.themeart.com 11
  • 12. Subroutines  The 8085 has two instructions for dealing with subroutines. – The CALL instruction is used to redirect program execution to the subroutine. – The RET instruction is used to return to t he main program at the end of the subro utine . www.themeart.com 12
  • 13. The CALL instruction  CALL ,16 bit  Call subroutine in conditionally located at the memory address specified by the 16 bit operand.  This instruction places the address of the next instruction on the stack and transfer the program execution to the subroutine address. www.themeart.com 13
  • 14. The RET instruction  Return unconditionally from the subrouti ne.  This instruction locates the return addre ss on the top of the stack and transfers t he program execution back to the calling program. www.themeart.com 14
  • 15. General characteristics of CALL & RTE instruction 1. The CALL instructions are 3-byte instruc tion; the second byte specifies the low order byte ,and the third byte specifies the high order byte of the subroutine address. 2. The return instruction are 1-byte instruc tions. 3. A CALL instruction must be used in conjunction with a return instruction in the subroutine . www.themeart.com 15
  • 16. Necessary steps to implement a subroutine  The stack pointer register must be initiali zed ,preferably at the highest memory lo cation of the R/W memory.  The call instruction should be used in the main program accompanied by the RET i nstruction in the subroutine. www.themeart.com 16
  • 17. Conditional CALL and RTE Instructions  The 8085 supports conditional CALL and co nditional RTE instructions. – The same conditions used with conditional JUMP instructions can be used. – CC, call subroutine if Carry flag is set. – CNC, call subroutine if Carry flag is not set – RC, return from subroutine if Carry flag is set – RNC, return from subroutine if Carry flag is not set. www.themeart.com 17