
W78E51
Publication Release Date: October 1997
- 7 -
Revision A3
Lock Bit
This bit is used to protect the customer data in the W78E51. It may be turned on after the
programmer finish the programming and verify sequence. Once this bit is set to logic 0, no flash data
can be accessed again.
MOVC Execute
This bit is used to restrict the accessible region of the MOVC instruction. It can prevent the program
to be downloaded using this instruction if the program needs to jump outside to get
this bit is set to logic 0, a MOVC instruction in external program memory space will be able to access
code in the external memory, but it will not be able to access code in the internal memory. A MOVC
instruction in internal program memory space will always be able to access code in both internal and
external memory. If this bit is logic 1, there are no restriction on the MOVC instruction.
data. When
Flash Operations
Under the normal operation, the W78E51 is functionally compatible with the W78C51. During the
flash operation mode, the flash EEPROM can be programmed and verified. Until the code inside the
flash EEPROM is confirmed OK, the code can be protected. The flash EEPROM and those
operations on it are described as below.
The W78E51 has several operations on the flash mode. All these operations are configured by the
pins RST, ALE, PSEN, A9CTRL (P3.0), A13CTRL (P3.1), A14CTRL (P3.2), OECTRL (P3.3), CE
(P3.6), OE (P3.7), A0 (P1.0) and V
PP
(EA ). Moreover, the A15 to A0 (P2.7 to P2.0, P1.7 to P1.0)
and the D7 to D0 (P0.7 to P0.0) serve as the address and data bus respectively for these operations.
Read Operation
This operation is supported for customer to read their code and the Option bits. The data will not be
valid if the Lock bit is programmed to low.
Program Operation
This operation is used to program the data to flash EEPROM and the Option bits. Program operation
is done when the V
PP
is reach to V
CP
(12V) level, CE set to low, and OE set to high.
Program Verify Operation
All the programming data must be checked after program operation.
This operation should be performed after each byte is programmed and it will ensure a substantial
program margin.
OPERATIONS
P3.0
(A9
CTRL)
V
IL
V
IL
V
IL
P3.1
(A13
CTRL)
V
IL
V
IL
V
IL
P3.2
(A14
CTRL)
V
IL
V
IL
V
IL
P3.3
(OE
CTRL)
V
IL
V
IL
V
IL
P3.6
(CE)
P3.7
(OE)
EA
(V
PP
)
P2, P1
(A15
A0)
P0
(D7
D0)
NOTES
Read
Program
Program Verify
V
IL
V
IL
V
IH
V
IL
V
IH
V
IL
V
IH
V
CP
V
CP
Address
Address
Address
Data Out
Data In
Data Out
1, 2
1, 2
3
Notes:
1. All these operations happen in RST = V
IH
, ALE = V
IL
and PSEN = V
IH
.
2. V
CP
= 12V, V
EP
= 14.5V, V
IH
= V
DD
, V
IL
= Vss.
3. The program verify operation is following behind the program operaion.