GMS90 Series
Oct. 2000 Ver 3.1a 47
EPROM CHARACTERISTICS
The GMS97C5X, 97L5X are programmed by using a modified Quick-Pulse ProgrammingTMalgorithm. It differs from older methods in the value used for V
PP
(programming supply voltage) and in the width and number
of the ALE/PROG
pulses. The GMS97C5X, 97L5X contains two signature bytes that can be read and used by
an EPROM programming system to identify the device. The signature bytes identify the device as an manufactured by HME. Table 11 showsthe logic levels for reading the signature byte, and for programmingthe program
memory, the encryption table, and the security bits. The circuit configuration and waveforms for quick-pulse
programming are shown in Figure 12 and Figure 13. Figure 14 show the circuit configuration for normal program memory verification.
Reading the Signature Bytes :
The GMS97X51/52 signature bytes in locations 030
H
and 031H, the GMS97X54/56/58 signature bytes in loca-
tions 05E
H
and 07CH. To read these bytes follow the procedure for EPROM verify, except that P3.6 and P3.7
need to be pulled to a logic low.
The values are:
Quick-pulse programming
The set u p for microcont rol ler quick-pulse programming is shown in Figure 13. Note that the GMS97C5X,
97L5X is running with a 4 to 6MHz oscillator. The reason the oscillator needs to be running is that the device
is executing internal address and program data transfers.
The address of the EPROM location to be programmed is applied to ports 1 and 2, as shown in Figure 12. The
code byte to be programmed into that location is applied to port 0, RST, PSEN
andpinsofport2and3inTable
11 are held at the "Program Code Data" levels indicated in Table 11. The ALE/PROG
is pulsed low 25 times(10
times for 97X54/56/58) as shown Figure 13.
To program the encryption table, repeat the 25 pulses (10 pulses for 97X54/56/58) programming sequence for
addresses 0 through 1F
H
(3FHfor 97X54/56/58), using the "Program Encryption Table" levels. Do not forget
that after the encryption table is programmed, verification cycles will produce only encrypted data.
To program the security bits, repeat the 25 pulses (10 pulses for 97X54/56/58) programming sequence using the
"Pgm Security Bit" levels after one security bit is programmed, further programming of the code memory and
Device Location Contents Remarks
GMS97X51 30
H
31
H
E0
H
73
H
Manufacturer ID
Device ID
GMS97X52 30
H
31
H
E0
H
71
H
Manufacturer ID
Device ID
GMS97X54 5E
H
7C
H
E0
H
54
H
Manufacturer ID
Device ID
GMS97X56 5E
H
7C
H
E0
H
56
H
Manufacturer ID
Device ID
GMS97X58 5E
H
7C
H
E0
H
58
H
Manufacturer ID
Device ID