1. Memory mapping: When the CPU accesses the address in this range, the address fetch packet in the corresponding address will be returned (other modes will return undefined data); the CPU cannot access the program RAM through the DMC; the user can determine the different starting addresses
of the program RAM by selecting different mapping modes (map0/map1). 2. Cache enable: (1) Initially, program instruction fetches at any address are considered cache misses;
first, the required instruction fetch packet is read in through the EMIF, and the instruction fetch packet is stored in the cache while being sent to the CPU. During this process, the CPU is suspended. (2) Subsequent accesses to cached addresses will cause cache hits, and the instruction fetch packet in the cache will be immediately sent to the CPU (3) When the program switches from memory mapping mode to cache enable mode, the cache area will be automatically flushed, which is also the only way to flush the cache.
3. Cache freeze: Keep the current state of the cache. The only difference from cache enable is that when a cache miss occurs, the instruction packet read in from the EMIF will not be stored in the cache at the same time, ensuring that the cached program will not be overwritten.
4. Cache bypass: The cache maintains its current state, ensuring that instructions can only be fetched from external storage space.
Previous article:Cortex-M3 exception interrupt and vector table definition
Next article:STM32 chip naming
- Popular Resources
- Popular amplifiers
Professor at Beihang University, dedicated to promoting microcontrollers and embedded systems for over 20 years.
- LED chemical incompatibility test to see which chemicals LEDs can be used with
- Application of ARM9 hardware coprocessor on WinCE embedded motherboard
- What are the key points for selecting rotor flowmeter?
- LM317 high power charger circuit
- A brief analysis of Embest's application and development of embedded medical devices
- Single-phase RC protection circuit
- stm32 PVD programmable voltage monitor
- Introduction and measurement of edge trigger and level trigger of 51 single chip microcomputer
- Improved design of Linux system software shell protection technology
- What to do if the ABB robot protection device stops
- Huawei's Strategic Department Director Gai Gang: The cumulative installed base of open source Euler operating system exceeds 10 million sets
- Download from the Internet--ARM Getting Started Notes
- Learn ARM development(22)
- Learn ARM development(21)
- Learn ARM development(20)
- Learn ARM development(19)
- Learn ARM development(14)
- Learn ARM development(15)
- Analysis of the application of several common contact parts in high-voltage connectors of new energy vehicles
- Wiring harness durability test and contact voltage drop test method
- Does 5G really consume more power?
- Let's talk about the vehicle electronic reverse connection protection circuit again
- Laboratory monitoring system based on Arduino and Gizwits
- EEWORLD University ---- Industrial Control PLC Series Courses
- [RISC-V MCU CH32V103 Review] ---Advanced Wiki---Brief Analysis of USB Disk Enumeration Code
- The Story of Fourier Transform
- [Evaluation of domestic FPGA Gaoyun GW1N-4 series development board] Unboxing + lighting
- Application of power amplifier in the study of electrokinetic transport-capture-release performance of Pb-contaminated municipal sludge
- parallel computing
- Have you ever experienced an unmanned supermarket using RF technology?