Motor de Búsqueda de Datasheet de Componentes Electrónicos |
|
SST89V58RD2-33-C-PI Datasheet(PDF) 37 Page - Silicon Storage Technology, Inc |
|
SST89V58RD2-33-C-PI Datasheet(HTML) 37 Page - Silicon Storage Technology, Inc |
37 / 91 page Preliminary Specifications FlashFlex51 MCU SST89E52RD2 / SST89E54RD2 / SST89E58RD2 / SST89E516RD2 SST89V52RD2 / SST89V54RD2 / SST89V58RD2 / SST89V516RD2 37 ©2004 Silicon Storage Technology, Inc. S71255-00-000 3/04 4.1.1 Product Identification The Read-ID command accesses the Signature Bytes that identify the device and the manufacturer as SST. External programmers primarily use these Signature Bytes in the selection of programming algorithms. The Read-ID com- mand is selected by the command code of 0H on P3[7:6] and P2[7:6]. See Figure 14-14 for timing waveforms. 4.1.2 Arming Command An arming command sequence must take place before any external host mode sequence command is recognized by the device. This prevents accidental triggering of exter- nal host mode commands due to noise or programmer error. The arming command is as follows: 1. PSEN# goes low while RST is high. This will get the machine in external host mode, re-configuring the pins, and turning on the on-chip oscillator. 2. A Read-ID command is issued, and after 1 ms the external host mode commands can be issued. After the above sequence, all other external host mode commands are enabled. Before the Read-ID command is received, all other external host mode commands received are ignored. 4.1.3 External Host Mode Commands The external host mode commands are Read-ID, Chip- Erase, Block-Erase, Sector-Erase, Byte-Program, Byte- Verify, Prog-SB1, Prog-SB2, Prog-SB3, Prog-SC0, Prog- SC1, Select-Block0, Select-Block1. See Table 4-1 for all signal logic assignments, Figure 4-1 for I/O pin assign- ments, and Table 14-11 for the timing parameters. The criti- cal timing for all Erase and Program commands is generated by an on-chip flash memory controller. The high- to-low transition of the PROG# signal initiates the Erase or Program commands, which are synchronized internally. The Read commands are asynchronous reads, indepen- dent of the PROG# signal level. A detailed description of the external host mode com- mands follows. The Select-Block0 command enables Block 0 to be pro- grammed in external host mode. Once this command is executed, all subsequent external host Commands will be directed at Block 0. See Figure 14-15 for timing waveforms. The Select-Block1 command enables Block 1 (8 KByte Block) to be programmed. Once this command is exe- cuted, all subsequent external host Commands that are directed to the address range below 2000H will be directed at Block 1. The Select-Block1 command only affects the lowest 8 KByte of the program address space. For addresses greater than or equal to 2000H, Block 0 is accessed by default. Upon entering external host mode, Block 1 is selected by default. The Chip-Erase, Block-Erase, and Sector-Erase com- mands are used for erasing all or part of the memory array. Erased data bytes in the memory array will be erased to FFH. Memory locations that are to be programmed must be in the erased state prior to programming. The Chip-Erase command erases all bytes in both memory blocks, regardless of any previous Select-Block0 or Select- Block1 commands. Chip-Erase ignores the Security Lock status and will erase the Security Lock, returning the device to its Unlocked state. The Chip-Erase command will also erase the SC0 bit. Upon completion of the Chip-Erase command, Block 1 will be the selected block. See Figure 14-16 for timing waveforms. The Block-Erase command erases all bytes in the selected memory blocks. This command will not be executed if the security lock is enabled. The selection of the memory block to be erased is determined by the prior execution Select- Block0 or Select-Block1 command. See Figure 14-18 for the timing waveforms. The Sector-Erase command erases all of the bytes in a sector. The sector size for the flash memory is 128 Bytes. This command will not be executed if the Security lock is enabled. See Figure 14-19 for timing waveforms. The Byte-Program command is used for programming new data into the memory array. Programming will not take place if any security locks are enabled. See Figure 14-20 for timing waveforms. The Byte-Verify command allows the user to verify that the device correctly performed an Erase or Program com- mand. This command will be disabled if any security locks are enabled. See Figure 14-23 for timing waveforms. TABLE 4-3: PRODUCT IDENTIFICATION Address Data Manufacturer’s ID 30H BFH Device ID SST89E52RD2 31H 9CH SST89V52RD2 31H 9DH SST89E54RD2 31H 9EH SST89V54RD2 31H 9FH SST89E58RD2 31H 9BH SST89V58RD2 31H 9AH SST89E516RD2 31H 92H SST89V516RD2 31H 93H T4-3.0 1255 |
Número de pieza similar - SST89V58RD2-33-C-PI |
|
Descripción similar - SST89V58RD2-33-C-PI |
|
|
Enlace URL |
Política de Privacidad |
ALLDATASHEET.ES |
¿ALLDATASHEET es útil para Ud.? [ DONATE ] |
Todo acerca de Alldatasheet | Publicidad | Contáctenos | Política de Privacidad | Intercambio de Enlaces | Lista de Fabricantes All Rights Reserved©Alldatasheet.com |
Russian : Alldatasheetru.com | Korean : Alldatasheet.co.kr | Spanish : Alldatasheet.es | French : Alldatasheet.fr | Italian : Alldatasheetit.com Portuguese : Alldatasheetpt.com | Polish : Alldatasheet.pl | Vietnamese : Alldatasheet.vn Indian : Alldatasheet.in | Mexican : Alldatasheet.com.mx | British : Alldatasheet.co.uk | New Zealand : Alldatasheet.co.nz |
Family Site : ic2ic.com |
icmetro.com |