欢迎访问ic37.com |
会员登录 免费注册
发布采购

M29W640GT90NA6F 参数 Datasheet PDF下载

M29W640GT90NA6F图片预览
型号: M29W640GT90NA6F
PDF下载: 下载PDF文件 查看货源
内容描述: 64兆位(8MB X8或X16 4Mb的,页) 3V供应闪存 [64 Mbit (8Mb x8 or 4Mb x16, Page) 3V supply Flash memory]
分类和应用: 闪存存储内存集成电路光电二极管ISM频段
文件页数/大小: 90 页 / 1676 K
品牌: NUMONYX [ NUMONYX B.V ]
 浏览型号M29W640GT90NA6F的Datasheet PDF文件第77页浏览型号M29W640GT90NA6F的Datasheet PDF文件第78页浏览型号M29W640GT90NA6F的Datasheet PDF文件第79页浏览型号M29W640GT90NA6F的Datasheet PDF文件第80页浏览型号M29W640GT90NA6F的Datasheet PDF文件第82页浏览型号M29W640GT90NA6F的Datasheet PDF文件第83页浏览型号M29W640GT90NA6F的Datasheet PDF文件第84页浏览型号M29W640GT90NA6F的Datasheet PDF文件第85页  
M29W640GH, M29W640GL, M29W640GT, M29W640GB  
Block Protection  
Appendix D Block Protection  
Block protection can be used to prevent any operation from modifying the data stored in the  
memory. The blocks are protected in groups, refer to Appendix A: Block addresses, Table 28  
and Table 29 for details of the Protection Groups. Once protected, Program and Erase  
operations within the protected group fail to change the data.  
There are three techniques that can be used to control Block Protection, these are the  
Programmer technique, the In-System technique and Temporary Unprotection. Temporary  
Unprotection is controlled by the Reset/Block Temporary Unprotection pin, RP; this is  
described in the Signal Descriptions section.  
D.1  
Programmer Technique  
The Programmer technique uses high (V ) voltage levels on some of the bus pins. These  
ID  
cannot be achieved using a standard microprocessor bus, therefore the technique is  
recommended only for use in Programming Equipment.  
To protect a group of blocks follow the flowchart in Figure 25: Programmer Equipment Group  
Protect flowchart. To unprotect the whole chip it is necessary to protect all of the groups first,  
then all groups can be unprotected at the same time. To unprotect the chip follow Figure 26:  
Programmer Equipment Chip Unprotect flowchart. Table 37: Programmer technique bus  
operations, BYTE = V or V , gives a summary of each operation.  
IH  
IL  
The timing on these flowcharts is critical. Care should be taken to ensure that, where a  
pause is specified, it is followed as closely as possible. Do not abort the procedure before  
reaching the end. Chip Unprotect can take several seconds and a user message should be  
provided to show that the operation is progressing.  
D.2  
In-System Technique  
The In-System technique requires a high voltage level on the Reset/Blocks Temporary  
(1)  
Unprotect pin, RP . This can be achieved without violating the maximum ratings of the  
components on the microprocessor bus, therefore this technique is suitable for use after the  
memory has been fitted to the system.  
To protect a group of blocks follow the flowchart in Figure 27: In-System Equipment Group  
Protect flowchart. To unprotect the whole chip it is necessary to protect all of the groups first,  
then all the groups can be unprotected at the same time. To unprotect the chip follow  
Figure 28: In-System Equipment Chip Unprotect flowchart.  
The timing on these flowcharts is critical. Care should be taken to ensure that, where a  
pause is specified, it is followed as closely as possible. Do not allow the microprocessor to  
service interrupts that will upset the timing and do not abort the procedure before reaching  
the end. Chip Unprotect can take several seconds and a user message should be provided  
to show that the operation is progressing.  
Note:  
RP can be either at V or at V when using the In-System Technique to protect the  
IH ID  
Extended Block.  
81/90  
 复制成功!