Debug-microprocessor, Assembly Language

Assignment Help:

Using DEBUG

DEBUG.COM is a DOS efficacy that facilitates the trouble-shooting and debugging of assembly language programs. In particular case of personal computers, all of the resources, processor and memory resource management functions are carried out by the operating systems. Therefore, users have very little control on the computer hardware at lower levels. The DEBUG efficacy enables you to have the control of these resources up to some extent. In the easier, rather then, basic words, the DEBUG enable you to use the personal computer as a low level microprocessor kit.

375_debug1.jpg

The DEBUG command at DOS prompt invokes this facility. A '_' (dash) display signals the successful invoke  operation of DEBUG, further that is used as DEBUG  prompt for debugging  commands. Following command line, DEBUG prompt and the DEBUG command character display describe the DEBUG command entry procedure, as in  given Figure.

A valid command is accepted by using the enter key. The list of typically used valid commands of DEBUG is given in Table namely DUBEG command along with their respective syntax.

The program DEBUG can be used either to debug a source program or to view the results of execution of an .EXE file with the help of the .LST file and the above commands.  The .LST file indicates the offset address allotments for result variables of a program in the   specific segment. After the execution of the program is completed the offset address of the result variables can be observed by using the d command. The results available in the registers may be view by using the r command. So the DEBUG offers a reasonably good platform for trouble-shooting executing and observing the results of the assembly language programs. Here one should remember that the DEBUG is able to only trouble-shoot the .EXE files.

1645_debug2.jpg


Related Discussions:- Debug-microprocessor

External hardware-interrupts-microprocessor, External Hardware-Interrupts ...

External Hardware-Interrupts External hardware-interrupts are generated by controllers of external devices or coprocessors and are connected to the processor pin for Non Mask a

StrNCpyAsm, ;StrNCpyAsm - copy zero terminated string2 to zero terminated s...

;StrNCpyAsm - copy zero terminated string2 to zero terminated string1, ; but copy no more than count (parameter) characters ; or the length of string2, whi

8086 minimum mode system and timing-microprocessor, 8086 Minimum mode Syst...

8086 Minimum mode System and Timing In a minimum mode 8086 system, the microprocessor 8086 is operated in minimum mode by strapping its MN/MX pin to logic 1.All the control si

Program to average ten 16-bit values, Write a MC68HC12 assembly language pr...

Write a MC68HC12 assembly language program to average ten 16-bit values that are stored starting at address $1100. Place the two-byte result at $1110. Use indexed addressing. Us

Linking a program-microprocessor, Linking a program The DOS linking pro...

Linking a program The DOS linking program LINK.EXE links the different object modules of function library routines and source program to produce an integrated executable code o

Project, Any small project which can implement on any software. No need any...

Any small project which can implement on any software. No need any external hardware approach.

Code, 1. Assembly code for the flow chart we did in the class about the sim...

1. Assembly code for the flow chart we did in the class about the simple I/O interface driver 2. Enhanced driver (flow chart and its assembly code) to cater for interruptions in th

Rics/cisc architecture-microprocessor, RICS/CISC Architecture An essent...

RICS/CISC Architecture An essential aspect of computer architecture is the design of the instruction set for the processor.  The instruction set selected for a specific compute

Implemented with an arm assembly language program, The problem to be solved...

The problem to be solved and implemented with an ARM assembly language program You are asked to do some image processing on an image composed of characters shaped in For exa

Cryptography, Write a program that allows a user to encrypt/decrypt a mess...

Write a program that allows a user to encrypt/decrypt a message using a shift cipher. The user should specify the key and the message. Your program should be able to handle messa

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd