欢迎访问ic37.com |
会员登录 免费注册
发布采购

M29W320EB70N6E 参数 Datasheet PDF下载

M29W320EB70N6E图片预览
型号: M29W320EB70N6E
PDF下载: 下载PDF文件 查看货源
内容描述: 32兆位(4MB X8或X16的2Mb ,引导块) 3V供应闪存 [32 Mbit (4Mb x8 or 2Mb x16, Boot Block) 3V Supply Flash Memory]
分类和应用: 闪存存储内存集成电路光电二极管
文件页数/大小: 46 页 / 887 K
品牌: STMICROELECTRONICS [ ST ]
 浏览型号M29W320EB70N6E的Datasheet PDF文件第36页浏览型号M29W320EB70N6E的Datasheet PDF文件第37页浏览型号M29W320EB70N6E的Datasheet PDF文件第38页浏览型号M29W320EB70N6E的Datasheet PDF文件第39页浏览型号M29W320EB70N6E的Datasheet PDF文件第41页浏览型号M29W320EB70N6E的Datasheet PDF文件第42页浏览型号M29W320EB70N6E的Datasheet PDF文件第43页浏览型号M29W320EB70N6E的Datasheet PDF文件第44页  
M29W320ET, M29W320EB  
APPENDIX D. BLOCK PROTECTION  
Block protection can be used to prevent any oper-  
ation from modifying the data stored in the memo-  
ry. The blocks are protected in groups, refer to  
APPENDIX A., Table 20. and Table 21. for details  
of the Protection Groups. Once protected, Pro-  
gram and Erase operations within the protected  
group fail to change the data.  
There are three techniques that can be used to  
control Block Protection, these are the Program-  
mer technique, the In-System technique and Tem-  
porary Unprotection. Temporary Unprotection is  
controlled by the Reset/Block Temporary Unpro-  
tection pin, RP; this is described in the Signal De-  
scriptions section.  
specified, it is followed as closely as possible. Do  
not abort the procedure before reaching the end.  
Chip Unprotect can take several seconds and a  
user message should be provided to show that the  
operation is progressing.  
In-System Technique  
The In-System technique requires a high voltage  
level on the Reset/Blocks Temporary Unprotect  
pin, RP(1). This can be achieved without violating  
the maximum ratings of the components on the mi-  
croprocessor bus, therefore this technique is suit-  
able for use after the memory has been fitted to  
the system.  
To protect a group of blocks follow the flowchart in  
Figure 22., In-System Equipment Group Protect  
Flowchart. To unprotect the whole chip it is neces-  
sary to protect all of the groups first, then all the  
groups can be unprotected at the same time. To  
unprotect the chip follow Figure 23., In-System  
Equipment Chip Unprotect Flowchart.  
Programmer Technique  
The Programmer technique uses high (VID) volt-  
age levels on some of the bus pins. These cannot  
be achieved using a standard microprocessor bus,  
therefore the technique is recommended only for  
use in Programming Equipment.  
To protect a group of blocks follow the flowchart in  
Figure 20., Programmer Equipment Block Protect  
Flowchart. To unprotect the whole chip it is neces-  
sary to protect all of the groups first, then all  
groups can be unprotected at the same time. To  
unprotect the chip follow Figure 21., Programmer  
Equipment Chip Unprotect Flowchart. Table  
29., Programmer Technique Bus Operations,  
BYTE = VIH or VIL, gives a summary of each oper-  
ation.  
The timing on these flowcharts is critical. Care  
should be taken to ensure that, where a pause is  
specified, it is followed as closely as possible. Do  
not allow the microprocessor to service interrupts  
that will upset the timing and do not abort the pro-  
cedure before reaching the end. Chip Unprotect  
can take several seconds and a user message  
should be provided to show that the operation is  
progressing.  
Note: 1. RP can be either at V or at V when using the In-Sys-  
IH  
ID  
tem Technique to protect the Extended Block.  
The timing on these flowcharts is critical. Care  
should be taken to ensure that, where a pause is  
Table 29. Programmer Technique Bus Operations, BYTE = VIH or VIL  
Address Inputs  
Data Inputs/Outputs  
DQ15A–1, DQ14-DQ0  
Operation  
E
G
W
A0-A20  
Block (Group)  
A9 = V , A12-A20 Block Address  
ID  
V
V
V
V
Pulse  
Pulse  
X
X
IL  
ID  
IL  
(1)  
Others = X  
Protect  
A9 = V , A12 = V , A15 = V  
ID  
IH  
IH  
V
V
ID  
Chip Unprotect  
ID  
IL  
Others = X  
A0 = V , A1 = V , A6 = V , A9 = V ,  
IL  
IH  
IL  
ID  
Block (Group)  
Protection Verify  
Pass = XX01h  
Retry = XX00h  
V
V
V
V
A12-A20 Block Address  
Others = X  
IL  
IL  
IL  
IL  
IH  
IH  
A0 = V , A1 = V , A6 = V , A9 = V ,  
IL  
IH  
IH  
ID  
Block (Group)  
Unprotection Verify  
Retry = XX01h  
Pass = XX00h  
V
V
A12-A20 Block Address  
Others = X  
Note: 1. Block Protection Groups are shown in APPENDIX A., Table 20. and Table 21.  
40/46  
 复制成功!