欢迎访问ic37.com |
会员登录 免费注册
发布采购

AM29DL320GT70WDFN 参数 Datasheet PDF下载

AM29DL320GT70WDFN图片预览
型号: AM29DL320GT70WDFN
PDF下载: 下载PDF文件 查看货源
内容描述: 对于涉及TSOP封装的新设计, S29JL032H将取代Am29DL320G ,是厂家推荐的迁移路径。 [For new designs involving TSOP packages, S29JL032H supercedes Am29DL320G and is the factory-recommended migration path.]
分类和应用: 闪存内存集成电路
文件页数/大小: 58 页 / 1241 K
品牌: SPANSION [ SPANSION ]
 浏览型号AM29DL320GT70WDFN的Datasheet PDF文件第15页浏览型号AM29DL320GT70WDFN的Datasheet PDF文件第16页浏览型号AM29DL320GT70WDFN的Datasheet PDF文件第17页浏览型号AM29DL320GT70WDFN的Datasheet PDF文件第18页浏览型号AM29DL320GT70WDFN的Datasheet PDF文件第20页浏览型号AM29DL320GT70WDFN的Datasheet PDF文件第21页浏览型号AM29DL320GT70WDFN的Datasheet PDF文件第22页浏览型号AM29DL320GT70WDFN的Datasheet PDF文件第23页  
Table 8. Bottom Boot Sector/Sector Block  
Addresses for Protection/Unprotection  
Sector/Sector Block Protection and  
Unprotection  
(Note: For the following discussion, the term “sector”  
applies to both sectors and sector blocks. A sector  
block consists of two or more adjacent sectors that are  
protected or unprotected at the same time (see Tables  
2 and 4).  
Sector/Sector Block  
Sector  
A20–A12  
Size  
SA70  
111111XXX  
64 Kbytes  
111110XXX,  
111101XXX,  
111100XXX  
SA69-SA67  
192 (3x64) Kbytes  
The hardware sector protection feature disables both  
program and erase operations in any sector. The hard-  
ware sector unprotection feature re-enables both pro-  
gram and erase operations in previously protected  
sectors. Sector protection/unprotection can be imple-  
mented via two methods.  
SA66-SA63  
SA62-SA59  
SA58-SA55  
SA54-SA51  
SA50-SA47  
SA46-SA43  
SA42-SA39  
SA38-SA35  
SA34-SA31  
SA30-SA27  
SA26-SA23  
SA22–SA19  
SA18-SA15  
SA14-SA11  
1110XXXXX  
1101XXXXX  
1100XXXXX  
1011XXXXX  
1010XXXXX  
1001XXXXX  
1000XXXXX  
0111XXXXX  
0110XXXXX  
0101XXXXX  
0100XXXXX  
0011XXXXX  
0010XXXXX  
0001XXXXX  
256 (4x64) Kbytes  
256 (4x64) Kbytes  
256 (4x64) Kbytes  
256 (4x64) Kbytes  
256 (4x64) Kbytes  
256 (4x64) Kbytes  
256 (4x64) Kbytes  
256 (4x64) Kbytes  
256 (4x64) Kbytes  
256 (4x64) Kbytes  
256 (4x64) Kbytes  
256 (4x64) Kbytes  
256 (4x64) Kbytes  
256 (4x64) Kbytes  
Table 7. Top Boot Sector/Sector Block Addresses  
for Protection/Unprotection  
Sector/  
Sector  
A20–A12  
Sector Block Size  
SA0  
000000XXX  
64 Kbytes  
000001XXX,  
000010XXX  
000011XXX  
SA1-SA3  
192 (3x64) Kbytes  
SA4-SA7  
SA8-SA11  
0001XXXXX  
0010XXXXX  
0011XXXXX  
0100XXXXX  
0101XXXXX  
0110XXXXX  
0111XXXXX  
1000XXXXX  
1001XXXXX  
1010XXXXX  
1011XXXXX  
1100XXXXX  
1101XXXXX  
1110XXXXX  
256 (4x64) Kbytes  
256 (4x64) Kbytes  
256 (4x64) Kbytes  
256 (4x64) Kbytes  
256 (4x64) Kbytes  
256 (4x64) Kbytes  
256 (4x64) Kbytes  
256 (4x64) Kbytes  
256 (4x64) Kbytes  
256 (4x64) Kbytes  
256 (4x64) Kbytes  
256 (4x64) Kbytes  
256 (4x64) Kbytes  
256 (4x64) Kbytes  
000011XXX,  
000010XXX,  
000001XXX  
SA10-SA8  
192 (3x64) Kbytes  
SA12-SA15  
SA16-SA19  
SA20-SA23  
SA24-SA27  
SA28-SA31  
SA32-SA35  
SA36-SA39  
SA40-SA43  
SA44-SA47  
SA48-SA51  
SA52-SA55  
SA56-SA59  
SA7  
SA6  
SA5  
SA4  
SA3  
SA2  
SA1  
SA0  
000000111  
000000110  
000000101  
000000100  
000000011  
000000010  
000000001  
000000000  
8 Kbytes  
8 Kbytes  
8 Kbytes  
8 Kbytes  
8 Kbytes  
8 Kbytes  
8 Kbytes  
8 Kbytes  
The primary method requires VID on the RESET# pin  
only, and can be implemented either in-system or via  
programming equipment. Figure 2 shows the algo-  
rithms and Figure 26 shows the timing diagram. This  
method uses standard microprocessor bus cycle tim-  
ing. For sector unprotect, all unprotected sectors must  
first be protected prior to the first sector unprotect  
write cycle.  
111100XXX,  
111101XXX,  
111110XXX  
SA60-SA62  
192 (3x64) Kbytes  
SA63  
SA64  
SA65  
SA66  
SA67  
SA68  
SA69  
SA70  
111111000  
111111001  
111111010  
111111011  
111111100  
111111101  
111111110  
111111111  
8 Kbytes  
8 Kbytes  
8 Kbytes  
8 Kbytes  
8 Kbytes  
8 Kbytes  
8 Kbytes  
8 Kbytes  
The sector unprotect algorithm unprotects all sectors  
in parallel. All previously protected sectors must be in-  
dividually re-protected. To change data in protected  
sectors efficiently, the temporary sector unprotect  
function is available. See “Temporary Sector Unpro-  
tect”.  
September 27, 2004  
Am29DL320G  
17