Note the following details of the code protection feature on Microchip devices:
•Microchip products meet the specification contained in their particular Microchip Data Sheet.
•Microchip believes that its family of products is one of the most secure families of its kind on the market today, when used in the
intended manner and under normal conditions.
•There are dishonest and possibly illegal methods used to breach the code protection feature. All of these methods, to our
knowledge, require using the Microchip products in a manner outside the operating specifications contained in Microchip’s Data
Sheets. Most likely, the person doing so is engaged in theft of intellectual property.
•Microchip is willing to work with the customer who is concerned about the integrity of their code.
•Neither Microchip nor any other semiconductor manufacturer can guarantee the security of their code. Code protection does not
mean that we are guaranteeing the product as “unbreakable.”
Code protection is constantly evolving. We at Microchip are committed to continuously improving the code protection features of our
products. Attempts to break Microchip’s code protection feature may be a violation of the Digit al Millennium Copyright Act. If suc h a c t s
allow unauthorized access to your software or other copyrighted work, you may have a right to sue for relief under that Act.
Information contained in this publication regarding device
applications and t he lik e is provided only for your convenience
and may be su perseded by upda t es . It is y our responsibility to
ensure that your application meets with your specifications.
MICROCHIP MAKES NO REPRESENTATIONS OR
WARRANTIES OF ANY KIND WHETHER EXPRESS OR
IMPLIED, WRITTEN OR ORAL, STATUTORY OR
OTHERWISE, RELATED TO THE INFORMATION,
INCLUDING BUT NOT LIMITED TO ITS CONDITION,
QUALITY, PERFORMANCE, MERCHANTABILITY OR
FITNESS FOR PURPOSE. Microchip disclaims all liability
arising from this information and its use. Use of Microchip
devices in life supp ort and/or safety ap plications is entir ely at
the buyer’s risk, and the buyer agrees to defend, indemnify and
hold harmless M icrochip from any and all dama ges, claims,
suits, or expenses re sulting from such use. No licens es are
conveyed, implicitly or otherwise, under any Microchip
intellectual property rights.
Trademarks
The Microchip name and logo, the Microchip logo, Accuron,
dsPIC, K
EELOQ, microID, MPLAB, PIC, PICmicro, PICSTART,
PRO MATE, PowerSmart, rfPIC and SmartShunt are
registered trademarks of Microchip Technology Incorporated
in the U.S.A. and other countries.
AmpLab, FilterLab, Migratable Memory, MXDEV, MXLAB,
SEEVAL, SmartSensor and The Embedded Control Solutions
Company are registered trademarks of Microchip Technology
Incorporated in the U.S.A.
Analog-for-the-Digital Age, Application Maestro, CodeGuard,
dsPICDEM, dsPICDEM.net, dsPICworks, ECAN,
ECONOMONITOR, FanSense, FlexROM, fuzzyLAB,
In-Circuit Serial Programming, ICSP, ICEPIC, Linear Active
Thermistor, Mindi, MiWi, MPASM, MPLIB, MPLINK, PICkit,
PICDEM, PICDEM.net, PICLAB, PICtail, PowerCal,
PowerInfo, PowerMate, PowerTool, REAL ICE, rfLAB,
rfPICDEM, Select Mode, Smart Serial, SmartT el, Total
Endurance, UNI/O, WiperLock and ZENA are trademarks of
Microchip Technology I ncorporat ed in the U.S.A. and other
countries.
SQTP is a service mark of Microchip Technology Incorporated
in the U.S.A.
All other trademarks mentioned herein are property of their
respective companies.
Microchip received ISO/TS-16949:2002 certification for its worldwide
headquarters, design and wafer fabrication facilities in Chandler and
Tempe, Arizona, Gresham, Oregon and Mountain View, California. The
Company’s quality system processes and procedures are for its PIC
8-bit MCUs, KEELOQ
microperipherals, nonvolatile memory and analog products. In addition,
Microchip’s quality system for the design and manufacture of
development systems is ISO 9001:2000 certified.
Note: This data sheet summarizes features of this g roup
of dsPIC30F devices and is not intended to be a complete
reference source. For more information on the CPU,
peripherals, register descriptions and general device
functionality, refer to the “dsPIC30F Family ReferenceManual” (DS70046). For more informat ion on the device
instruction set and programming, refer to the “dsPIC30F/33F Programmer’s Reference Manual” (DS70157).
High-Performance Modified RISC CPU:
• Modified Harvard architecture
• C compiler optimized instruction set architecture
• 83 base instructions with flexible addressing
modes
• 24-bit wide instructions, 16-bit wide data path
• 12 Kbytes on-chip Fla sh program space
• 512 bytes on-chip data RAM
• 16 x 16-bit working register array
• Up to 30 MIPS operation:
- Dual Internal RC
- 9.7 and 14.55 MHz (±1%) Industrial Temp
- 6.4 and 9.7 MHz (±1%) Extended Temp
- 32X PLL with 480 MHz VCO
- PLL inputs ±3%
- External EC clock 6.0 to 14.55 MHz
- HS Crystal mode 6.0 to 14.55 MHz
• 32 interrupt sources
• Three external interrupt sources
• 8 user-selectable priority levels for each interrupt
• 4 processor exceptions and software traps
DSP Engine Features:
• Modulo and Bit-Reversed modes
• Two 40-bit wide accumulators with optional
saturation logic
• 17-bit x 17-bit single-cycle hardw are frac tio nal /
integer multiplier
• Single-cycle Multiply-Accumulate (MAC)
operation
• 40-stage Barrel Shifte r
• Dual data fetch
Peripheral Features:
• High-current sink/source I/O pins: 25 mA/25 mA
• Three 16-bit timers/counters; optionally pair up
16-bit timers into 32-bit timer modules
• One 16-bit Capture input functions
• Two 16-bit Compare/PWM output functions
- Dual Compare mode available
• 3-wire SPI modules (supports 4 Frame modes)
2
•I
CTM module supports Multi-Master/Slave mode
and 7-bit/10-bit addressing
• UART Module:
- Supports RS-232, RS-485 and LIN 1.2
- Supports IrDA
- Auto wake-up on Start bit
- Auto-Baud Detect
- 4-level FIFO buffer
®
with on-chip hardware endec
Power Supply PWM Module Features:
• Four PWM generators with 8 outputs
• Each PWM generator h as ind ependent time base
and duty cycle
12.0 Power Supply PWM .................................................................................................................................................................107
13.0 Serial Peripheral Interface (SPI)............................................................................................................................................... 145
18.0 System Integration................................... .......................... ...................................................................................................... 197
19.0 Instruction Set Summary..........................................................................................................................................................219
20.0 Development Support............................................................................................................................................................... 227
It is our intention to provide our valued customers with the best documentation possible to ensure successful use of your Microchip
products. To this end, we will continue to improve our publications t o better suit your needs. Our publications will be refined and
enhanced as new volumes and updates are introduced.
If you have any questions or c omm ents regarding t his publication, p lease c ontact the M arket ing Co mmunications Department via
E-mail at docerrors@microchip.com or fax the Reader Response Form in the back of this data sheet to (480) 792-4150. We
welcome your feedback.
Most Current Data Sheet
To obtain the most up-to-date version of this data sheet, please register at our Worldwide Web site at:
http://www.microchip.com
You can determine the version of a data sheet by examining its literature number found on the bottom outside corner of any page.
The last character of the literature number is the version number, (e.g., DS30000A is version A of document DS30000).
Errata
An errata sheet, describing minor operational differences from the data sheet and recommended workarounds, may exist for current
devices. As device/documentation issues become known to us, we will publish an errata sheet. The errata will specify the revision
of silicon and revision of document to which it applies.
To determine if an errata sheet exists for a particular device, please check with one of the following:
• Microchip’s Worldwide Web site; http://www.microchip.com
• Your local Microchip sales office (see last page)
When contacting a sales office, please specify which device, revision of silicon and data sheet (include literature number) you are
using.
Customer Notification System
Register on our web site at www.microchip.com to receive the most current information on all of our products.
Note: This data sheet summarizes features of this g roup
of dsPIC30F devices and is not intended to be a complete
reference source. For more information on the CPU,
peripherals, register descriptions and general device
functionality, refer tyft877(i)-0.-1.3(rmat)ha8.9(2gy)6597 -10(on.67r8/( devici3i69(h)-00ript)Dn.3(ereDn.n21(rmat)ha8.9(2gy)63e1183(mic)31.880 e5004a9010)1251 1 Tf7iag)12dM6.1(r)3cs,,,,e
This document contains device specific information for
the dsPIC30F1010/202X SMPS devices. These devices
contain extensive Digital Signal Processor (DSP) functionality within a high-performance 16-bit mic rocontroller
(MCU) architecture, as reflected in the following block
diagrams. Figure 1-1 and Table 1-1 describe the
dsPIC30F1010 SMPS device, Figure 1-2 and Table1-2
describe the dsPIC30F2020 device and Figure 1-3 and
Table 1-3 describe the dsPIC30F2023 SMPS device.
Table 1-1 provides a brief description of device I/O
pinouts for the ds PIC30F1010 and the functions that
may be multiple xed to a port pin. Mul tiple functio ns may
exist on one port pin. When multiplexing occurs, the
peripheral module’s functional requirements may force
an override of the data direction of the port pin.
TABLE 1-1:PINOUT I/O DESCRIPTIONS FOR dsPIC30F1010
Pin Name
AN0-AN5IAnalogAnalog input channels.
DDPPPositive supply for analog module.
AV
AVSSPPGround reference for analog module.
CLKI
CLKO
EMUD
EMUC
EMUD1
EMUC1
EMUD2
EMUC2
Pin
Type
I
O
I/O
I/O
I/O
I/O
I/O
I/O
Buffer
Type
ST/CMOS—External clock source input. Always associated with OSC1 pin function.
Oscillator crystal output. Connects to crystal or resonator in Crystal
Oscillator mode. Opti onally fu nctions a s CLKO in RC and EC mode s. Always
associated with OSC2 pin function.
ST
ST
ST
ST
ST
ST
ICD Primary Communication Channel data input/output pin.
ICD Primary Communication Channel clock input/output pin.
ICD Secondary Communication Channel data input/output pin.
ICD Secondary Communication Channel clock input/output pin.
ICD Tertiary Communication Channel data input/output pin.
ICD Tertiary Communication Channel clock input/output pin.
RB0-RB7I/OSTPORTB is a bidirectional I/O port.
RA9I/OSTPORTA is a bidirectional I/O port.
RD0I/OSTPORTD is a bidirectional I/O port.
Legend: CMOS=CMOS compati ble input or output Analog =Analog input
ST=Schmitt Trigger input with CMOS levels O=Output
I=Input P=Power
I
I
I
I
I
I
O
O
O
O
I/PSTMaster Clear (Reset) input or programming voltage input. This pin is an
Oscillator cryst al outpu t. Conne cts t o crys tal or resonator in Crys tal O scillato r
mode. Optionally functions as CLKO in FRC and EC modes.
In-Circuit Serial Programming™ data input/outpu t pin.
In-Circuit Serial Programming clock input pin.
In-Circuit Serial Programming data input/output pin 1.
In-Circuit Serial Programming clock input pin 1.
In-Circuit Serial Programming data input/output pin 2.
In-Circuit Serial Programming clock input pin 2.
TABLE 1-1:PINOUT I/O DESCRIPTIONS FOR dsPIC30F1010 (CONTINUED)
Pin Name
RE0-RE7I/OSTPORTE is a bidirectional I/O port.
RF6, RF7, RF8
SCK1
SDI1
SDO1
SCL
SDA
T1CK
T2CK
U1RX
U1TX
U1ARX
U1ATX
CMP1A
CMP1B
CMP1C
CMP1D
CMP2A
CMP2B
CMP2C
CMP2D
CN0-CN7ISTInput Change notification inputs
DDP—Positive supply for logic and I/O pins.
V
VSSP—Ground reference for logic and I/O pins.
EXTREFIAnalogExternal reference to Comparator DAC
Legend: CMOS=CMOS compati ble input or output Analog =Analog input
ST=Schmitt Trigger input with CMOS levels O=Output
I=Input P=Power
Pin
Type
I/OSTPORTF is a bidirectional I/O port.
I/O
I
O
I/O
I/O
I
I
I
O
I
O
I
I
I
I
I
I
I
I
Buffer
Type
ST
ST
—
ST
ST
ST
ST
ST
—
ST
—
Analog
Analog
Analog
Analog
Analog
Analog
Analog
Analog
Description
Synchronous serial clock input/output for SPI #1.
SPI #1 Data In.
SPI #1 Data Out.
Synchronous serial clock input/output for I2C™.
Synchronous serial data input/output for I
Comparator 1 Channel A
Comparator 1 Channel B
Comparator 1 Channel C
Comparator 1 Channel D
Comparator 2 Channel A
Comparator 2 Channel B
Comparator 2 Channel C
Comparator 2 Channel D
Can be software programmed for internal weak pull-ups on all inputs.
Table 1-2 provides a brief description of device I/O
pinouts for the ds PIC30F2020 and the functions that
may be multiple xed to a port pin. Mul tiple functio ns may
exist on one port pin. When multiplexing occurs, the
peripheral module’s functional requirements may force
an override of the data direction of the port pin.
TABLE 1-2:PINOUT I/O DESCRIPTIONS FOR dsPIC30F2020
Legend: CMOS=CMOS compatible input or output Analog=Analog input
ST=Schmitt Trigger input with CMOS levels O=Output
I=Input P=Power
Pin
Type
I
O
I/O
I/O
I/O
I/O
I/O
I/O
I
I
I
I
I
I
O
O
O
O
O
O
O
O
I/PSTMaster Clear (Reset) input or programming voltage input. This pin is an
O
I
I
I/O
I/O
I
I/O
I
I/O
I
Buffer
Type
ST/CMOS—External clock source input. Always associated with OSC1 pin function.
Oscillator crystal output. Connects to crystal or resonator in Crystal
Oscillator mode. Opti onally fu nctions a s CLKO in RC an d EC modes. Al ways
associated with OSC2 pin function.
ST
ST
ST
ST
ST
ST
ST
ST
ST
ST
ST
ST
—
—
—
—
—
—
—
—
—Compare outputs.
CMOS—Oscillator crystal input.
ST
ST
ST
ST
ST
ST
ICD Primary Communication Channel data input/output pin.
ICD Primary Communication Channel clock input/output pin.
ICD Secondary Communication Channel data input/output pin.
ICD Secondary Communication Channel clock input/output pin.
ICD Tertiary Communication Channel data input/output pin.
ICD Tertiary Communication Channel clock input/output pin.
Oscillator cryst al outpu t. Conne cts t o crys tal or resonator in Crys tal O scillato r
mode. Optionally functions as CLKO in FRC and EC modes.
In-Circuit Serial Programming™ data input/outpu t pin.
In-Circuit Serial Programming clock input pin.
In-Circuit Serial Programming data input/output pin 1.
In-Circuit Serial Programming clock input pin 1.
In-Circuit Serial Programming data input/output pin 2.
In-Circuit Serial Programming clock input pin 2.
TABLE 1-2:PINOUT I/O DESCRIPTIONS FOR dsPIC30F2020 (CONTINUED)
Pin Name
RB0-RB7I/OSTPORTB is a bidirectional I/O port.
RA9I/OSTPORTA is a bidirectional I/O port.
RD0I/OSTPORTD is a bidirectional I/O port.
RE0-RE7I/OSTPORTE is a bidirectional I/O port.
RF6, RF7, RF8
SCK1
V
VSSP—Ground reference for logic and I/O pins.
EXTREFIAnalogExternal reference to Comparator DAC
Legend: CMOS=CMOS compatible input or output Analog=Analog input
ST=Schmitt Trigger input with CMOS levels O=Output
I=Input P=Power
Pin
Type
I/OSTPORTF is a bidirectional I/O port.
I/O
I
O
I/O
I/O
I
I
I
O
I
O
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Buffer
Type
ST
ST
—
ST
ST
ST
ST
ST
—
ST
O
Analog
Analog
Analog
Analog
Analog
Analog
Analog
Analog
Analog
Analog
Analog
Analog
Analog
Analog
Description
Synchronous serial clock input/output for SPI #1.
SPI #1 Data In.
SPI #1 Data Out.
Synchronous serial clock input/output for I2C™.
Synchronous serial data input/output for I
Comparator 1 Channel A
Comparator 1 Channel B
Comparator 1 Channel C
Comparator 1 Channel D
Comparator 2 Channel A
Comparator 2 Channel B
Comparator 2 Channel C
Comparator 2 Channel D
Comparator 3 Channel A
Comparator 3 Channel B
Comparator 3 Channel C
Comparator 3 Channel D
Comparator 4 Channel A
Comparator 4 Channel B
Can be software programmed for internal weak pull-ups on all inputs.
Table 1-3 provides a brief description of device I/O
pinouts for the ds PIC30F2023 and the functions that
may be multiple xed to a port pin. Mul tiple functio ns may
exist on one port pin. When multiplexing occurs, the
peripheral module’s functional requirements may force
an override of the data direction of the port pin.
TABLE 1-3:PINOUT I/O DESCRIPTIONS FOR dsPIC30F2023
Legend: CMOS=CMOS compatible input or output Analog=Analog input
ST=Schmitt Trigger input with CMOS levels O=Output
I=Input P=Power
Pin
Type
I
O
I/O
I/O
I/O
I/O
I/O
I/O
I
I
I
I
I
I
I
I
I
O
O
O
O
O
O
O
O
O
I
I/PSTMaster Clear (Reset) input or programming voltage input. This pin is an
O
I
I
I/O
Buffer
Type
ST/CMOS—External clock source input. Always associated with OSC1 pin function.
Oscillator crystal output. Connects to crystal or resonator in Crystal
Oscillator mode. Opti onally fun ctions a s CLKO in RC and EC mode s. Always
associated with OSC2 pin function.
ST
ST
ST
ST
ST
ST
ST
ST
ST
ST
ST
ST
ST
ST
ST
—
—
—
—
—
—
—
—
—
ST
—
ST
CMOS—Oscillator crystal input.
ICD Primary Communication Channel data input/output pin.
ICD Primary Communication Channel clock input/output pin.
ICD Secondary Communication Channel data input/output pin.
ICD Secondary Communication Channel clock input/output pin.
ICD Tertiary Communication Channel data input/output pin.
ICD Tertiary Communication Channel clock input/output pin.
TABLE 1-3:PINOUT I/O DESCRIPTIONS FOR dsPIC30F2023 (CONTINUED)
Pin Name
PGD
PGC
PGD1
PGC1
PGD2
PGC2
RA8-RA11I/OSTPORTA is a bidirectional I/O port.
RB0-RB11I/OSTPORTB is a bidirectional I/O port.
RD0,RD1I/OSTPORTD is a bidirectional I/O port.
RE0-RE7I/OSTPORTE is a bidirectional I/O port.
RF2, RF3,
RF6-RF8, RF14,
RF15
RG2, RG3I/OSTPORTG is a bidirectional I/O port.
SCK1
V
EXTREFIAnalogExternal reference to Comparator DAC
Legend: CMOS=CMOS compatible input or output Analog=Analog input
ST=Schmitt Trigger input with CMOS levels O=Output
I=Input P=Power
Pin
Type
I/O
I
I/O
I
I/O
I
I/OSTPORTF is a bidirectional I/O port.
I/O
I
O
I
I/O
I/O
I
I
I
O
I
O
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Buffer
Type
ST
ST
ST
ST
ST
ST
ST
ST
—
ST
ST
ST
ST
ST
ST
—
ST
—
Analog
Analog
Analog
Analog
Analog
Analog
Analog
Analog
Analog
Analog
Analog
Analog
Analog
Analog
Analog
Analog
Description
In-Circuit Serial Programming™ data input/outpu t pin.
In-Circuit Serial Programming clock input pin.
In-Circuit Serial Programming data input/output pin 1.
In-Circuit Serial Programming clock input pin 1.
In-Circuit Serial Programming data input/output pin 2.
In-Circuit Serial Programming clock input pin 2.
Synchronous serial clock input/output for SPI #1.
SPI #1 Data In.
SPI #1 Data Out.
SPI #1 Slave Synchronization.
2
Synchronous serial clock input/output for I
Synchronous serial data input/output for I
Comparator 1 Channel A
Comparator 1 Channel B
Comparator 1 Channel C
Comparator 1 Channel D
Comparator 2 Channel A
Comparator 2 Channel B
Comparator 2 Channel C
Comparator 2 Channel D
Comparator 3 Channel A
Comparator 3 Channel B
Comparator 3 Channel C
Comparator 3 Channel D
Comparator 4 Channel A
Comparator 4 Channel B
Comparator 4 Channel C
Comparator 4 Channel D
Can be software programmed for internal weak pull-ups on all inputs.
Note: This data sheet summarizes features of this g roup
of dsPIC30F devices and is not intended to be a complete
reference source. For more information on the CPU,
peripherals, register descriptions and general device
functionality, refer to the “dsPIC30F Family ReferenceManual” (DS70046). For more information on t he device
instruction set and programming, refer to the “dsPIC 30F/33F Programmer’s Reference Manual” (DS70157).
2.1Core Overview
The core has a 24-bit instruction word. The Program
Counter (PC) is 23 bits wide with the Least Significant
bit (LSb) always clear (see Section 3.1 “ProgramAddress Space ”), and the Most Significant bit (MSb)
is ignored during no rmal program exec ution, exce pt for
certain specialized instructions. Thus, the PC can
address up to 4M instruction words of user program
space. An instruction prefetch mechanism is used to
help maintain throughput. Program loop constructs,
free from loop count management overhead, are supported usin g the DO and REPEAT instructions, both of
which are interruptible at any point.
The working register array consists of 16x16-bit registers, each of which can act as data, address or offset
registers. One working register (W15) operates as a
software Stack Pointer for interrupts and calls.
The data space is 64 Kbytes (32K words) and is split
into two blocks, referred to as X and Y data memory.
Each block has its own independent Address Generation Unit (AGU). Most instructions operate solely
through the X memory AGU, which provides the
appearance of a single unified data space. The
Multiply-Accu mulate (MAC) class of dual s ource DSP
instructions operate through both the X and Y AGUs,
splitting the data address space into two parts (see
Section 3.2 “Data Address Space”). The X and Y
data space boundary is device-specific and cannot be
altered by the user . Each dat a word consis ts of 2 bytes,
and most instruct ions can address data eith er as words
or bytes.
There are two methods of accessing data stored in
program memory:
• The upper 32 Kbytes of data space memory can be
mapped into the lower half (user space) of program
space at any 16K program word boundary, defined
by the 8-bit Program Space Visibility Page
(PSVPAG) register. This lets any instruction access
program space as if it were data space, with a limitation that the access requires an additional cycle.
Moreover, only the lower 16 bits of each instruction
word can be accessed using this method.
• Linear indirect access of 32K word pages within
program space is als o possibl e using any work ing
register, via table read and write instructio ns.
Table read and write instructions can be used to
access all 24 bits of an instruction word.
Overhead-free circular buffers (modulo addressing)
are supported in both X and Y address spaces. This is
primarily intended to remove the loop overhead for
DSP algorithms.
The X AGU also supports Bit-Reversed Addressing
mode on destination effective addresses, to greatly
simplify input or output data reordering for radix-2 FFT
algorithms. Refer to Secti on 4.0 “Address GeneratorUnits” for details on modulo and Bit-Reversed
Addressing.
The core supports In here nt (n o op era nd), Relative, Literal, Memory Direct, Register Direct, Register Indirect,
Register Offset and Literal Offset Addressing modes.
Instructions are a ssociated w ith pred efined Addr essing
modes, depending upon their functional requirements.
For most i ns tru c ti o ns , the c or e i s c apa bl e of e xe c ut i ng
a data (or program data) memory read, a working register (data) read, a data memory write and a program
(instruction) memory read per instruction cycle. As a
result, 3-operand instructions are supported, allowing
C = A + B operations to be executed in a single cycle.
A DSP engine has been included to significantly
enhance the core arithmetic capability and throughput.
It features a high-speed 17-bit by 17-bit multiplier, a
40-bit ALU, two 40-bit saturating accumulators and a
40-bit bidirectional b arre l s hi fter. Data in the accum ul ator or any wor kin g regi ste r can be sh ifted up to 15 bi ts
right or 16 bits left in a single cycle. The DSP instructions operate seamles sly with all other in struct ion s and
have been desi gned for o ptimal re al-time p erformanc e.
The MAC class of instructions can concurrently fetch
two data operands from memory, while multiplying two
W registers. To enable this concurrent fetching of data
operands, the data space has been split for these
instructions and linear for all others. This has been
achieved in a transparent and flexible manner, by
dedicating certain working registers to each address
space for the MAC class of instructions.
The core does not support a multi-stage instruction
pipeline. However, a single stage instruction prefetch
mechanism is used, which accesses and partially
decodes instructions a cycle ahead of execution, in
order to maximize available execution time. Most
instructions execute in a single cycle, with certain
exceptions.
The core features a vectored exception processing
structure for traps and interrupts, with 62 independent
vectors. The exceptions consist of up to 8 traps (of
which 4 are reserved ) an d 54 int errup ts. Each interrupt
is prioritized based on a us er-assigned priori ty between
1 and 7 (1 being the lowest priority and 7 being the
highest) in conjunction with a predetermined ‘natural
order’. Traps have fi xed prio rities, ranging from 8 to 15.
The programmer’s model is shown in Figure 2-1 and
consists of 16x16-bit working registers (W0 through
W15), 2x40-bit accumulators (ACCA and ACCB),
STATUS register (SR), Data Table Page register
(TBLPAG), Program Space Visibility Page register
(PSVPAG), DO and REPEAT registers (DOSTART,
DOEND, DCOUNT and RCOUNT), and Program
Counter (PC). The working registers can act as data,
address or offset registers. All registers are memory
mapped. W0 acts as the W register for file register
addressing.
Some of these registers have a shadow register associated with each of them, as shown in Figure 2-1. The
shadow register is used as a temp orary holding reg ister
and can transfer it s con ten ts to or from its host register
upon the occurrence of an event. None of the shadow
registers are accessible directly. The following rules
apply for transfer of registers into and out of shadows.
• PUSH.S and POP.S
W0, W1, W2, W3, SR (DC, N, OV, Z and C bits
only) are transferred.
• DO instruction
DOSTART, DOEND, DCOUNT shadows are
pushed on loop start, and popped on loop end.
When a byte operation is performed on a working register , only th e Least Significan t Byte (LSB) of th e targ et
register is affected. However, a benefit of memory
mapped working registers is that both the Least and
Most Significant Bytes (MSBs) can be manipulated
through byte wide data memory space accesses.
2.2.1SOFTWARE STACK POINTER/
FRAME POINTER
The dsPIC® DSC devices contain a software stack.
W15 is the dedicated software Stack Pointer (SP), and
will be automatically modified by exception processing
and subroutine ca lls and return s. However , W15 can be
referenced by any instruction in the same manner as all
other W registers. This simplifies the reading, writing
and manipulation of the Stack Pointer (e.g., creating
stack frames).
Note:In order to protect against misaligned
stack accesses , W15<0> is always clear.
W15 is initialized to 0x0800 during a Reset. The user
may reprogram the SP during initialization to any
location within data space.
W14 has been dedicated as a Stack Frame Pointer as
defined by the LNK and ULNK instructions. However,
W14 can be referenced by any instruction in the same
manner as all other W registers.
2.2.2STATUS REGISTER
The dsPIC D SC core has a 16-b it STATUS Registe r
(SR), the LSB of which is referred to as the SR Low
Byte (SRL) and the MSB as the SR High Byte (SRH).
See Figure 2-1 for SR layout.
SRL contains all the MCU ALU operation status flags
(including the Z bit), as wel l as the CPU Inter rupt Pri ority Level S t atus bits, IPL<2:0>, and the REPEAT active
Status bit, RA. During exception processing, SRL is
concatenated with the MSB of the PC to form a
complete word value, which is then stacked.
The upper byte of the STATUS register contains the
DSP Adder/Subtracter status bits, the DO Loop Active
bit (DA) and the Digit Carry (DC) Status bit.
2.2.3PROGRAM COUNTER
The Program Counter is 23 bi ts wide. Bit 0 is a lways
clear. Therefore, the PC can address up to 4M
instruction words.
The dsPIC DSC devices feature a 16/16-bit signed
fractional divide ope rati on , as w ell as 32/16-bit and 16/
16-bit signed an d unsigned intege r divide operati ons, in
the form of single instruction iterative divides. The
following instructions and data sizes are supported:
1.DIVF – 16/16 signed fractional divide
2.DIV.sd – 32/16 signed divide
3.DIV.ud – 32/16 unsigned divide
4.DIV.sw – 16/16 signed divide
5.DIV.uw – 16/16 unsigned divide
The 16/16 divides are similar to the 32/16 (same number
of iterations), but the dividend is either zero-extended or
sign-extended during the first iteration.
The divide instructions must be executed within a
REPEAT loop. Any other form of exec ution (e.g. a serie s
of discrete divide instruc tions) w ill not function c orrectly
because the instruction flow depends on RCOUNT.
The divide instru ction does not automat icall y set up the
RCOUNT value, and it must, therefore, be explicitly
and correctly specified in the REPEAT instruction, as
shown in Table 2-1 (REPEAT will execute the target
instruction {operand value + 1} times). The REPEAT
loop count must be set up for 18 iterati ons of the DIV/DIVF instruction. Thus, a complete divide operation
requires 19 cycles.
Note:The Divide flow is interruptible. However,
the user needs to save the context as
appropriate.
TABLE 2-1:DIVIDE INSTRUCTIONS
InstructionFunction
DIVFSigned fractional divide: Wm/Wn → W0; Rem → W1
DIV.sdSigned divide: (Wm + 1:Wm)/Wn → W0; Rem → W1
DIV.udUnsigned divide: (Wm + 1:Wm)/Wn → W0; Rem → W1
DIV.swSigned divide: Wm / Wn → W0; Rem → W1
DIV.uwUnsigned divide: Wm / Wn → W0; Rem → W1
The DSP engine consists of a high speed 17-bit x
17-bit multiplier , a barrel s hifter , and a 40-bit adde r/subtracter (with two target accumulators, round and
saturation logic).
The DSP engine also has the capability to perform inherent accumulator-to-accumulator operations, which
require no additional data. These instructions are ADD,SUB and NEG.
The DSP engine has various options selected through
various bits in the CPU Core Configuration Register
(CORCON), as listed below:
1.Fractional or integer DSP multiply (IF).
2.Signed or unsigned DSP multiply (US).
3.Conventional or convergent rounding (RND).
4.Automatic saturation on/off for ACCA (SATA).
5.Automatic saturation on/off for ACCB (SATB).
6.Automatic saturation on/off for writes to data
memory (SATDW).
A block diagram of the DSP engine is shown in
Figure 2-2.
TABLE 2-2:DSP INSTRUCTION SUMMARY
InstructionAlgebraic OperationACC WB?
CLRA = 0Yes
EDA = (x – y)
EDACA = A + (x – y)
MACA = A + (x * y)Yes
MACA = A + x
MOVSACNo change in AYes
MPYA = x * yNo
MPY.NA = – x * yNo
MSCA = A – x * yYes
The 17x17-bit multiplier is capable of signed or
unsigned operati on and can mul tiplex i ts ou tput usi ng a
scaler to support either 1.31 fractional (Q31) or 32-bit
integer results. Unsigned operands are zero-extended
into the 17th bit of the multiplier input value. Signed
operands are sign-exten ded into the 17th bit of the mu ltiplier input value. The output of t he 17x17-bit multip lier/
scaler is a 33-bit value, which is sign-extended to 40
bits. Intege r data is inherently rep resented as a signed
two’s complement value, where the MSB is defined as
a sign bit. Generally speaking, the range of an N-bit
two’s complement integer is -2
bit integer, the data range is -32768 (0x8000) to 32767
(0x7FFF), including 0. For a 32-bit integer, the data
range is -2,147,483,648 (0x8000 0000) to
2,147,483,645 (0x7FFF FFFF).
When the multiplier is configured for fractional multiplication, the data is represented as a two’s complement
fraction, where the M SB is defined as a sign b it and the
radix point is impl ied to lie just after the sign b it (QX format). The range of an N-bit two’s complement fraction
with this implied radix point is -1.0 to (1-2
16-bit fraction, the Q15 data range is -1.0 (0x8000) to
0.999969482 (0x7FFF), including 0, and has a precision of 3.01518x1 0
tiply operation generates a 1.31 product, which has a
precision of 4.65661x10
The same multiplier is used to support the MCU multiply instructions, which include integer 16-bit signed,
unsigned and mixed sign multiplies.
The MUL instruction may be directed to use byte or
word sized operands. By te opera nds wil l direct a 16-bit
result, and word operands will direct a 32-bit result to
the specified register(s) in the W array.
-5
. In Fractional mode, a 16x16 mu l-
-10
N-1
N-1
to 2
– 1. For a 16-
1-N
). For a
.
2.4.2DATA ACCUMULATORS AND
ADDER/SUBTRACTER
The data accumulator consists of a 40-bit adder/
subtracter with automatic sign extension logic. It can
select one of two accumulators (A or B) as its preaccumulation source and post-accumulation destination. For the ADD and LAC instructions, the data to be
accumulated or load ed ca n be optio nally sca led v ia th e
barrel shifter, prior to accumulation.
2.4.2.1Adder/Subtracter, Overflow and
Saturation
The adder/subtracter is a 40-bit adder with an optional
zero input into one side and either true or complement
data into the other input. In the case of addition, the
carry/borrow
true data (not complemented), whereas in the case of
subtraction, the carry/bo rrow
other input is complemented. The adder/subtracter
generates overflow Status bits SA/SB and OA/OB,
which are latched an d reflected i n the ST ATUS register .
• Overflow from bit 39: this is a catastrophic
overflow in which the sign of the accumulator is
destroyed.
• Overflow into guard bits 32 through 39: this is a
recoverable overflow. This bit is set whenever all
the guard bits are not identical to each other.
The adder has an additional saturation block which
controls accumulator data saturation, if selected. It
uses the result of the adder, the overflow Status bits
described above, and the SATA/B (CORCON<7:6>)
and ACCSAT (CORCON<4>) mode control bits to
determine when and to what value to saturate.
Six STATUS register bits have been provided to
support saturation and overflow; they are:
1.OA:
ACCA overflowed into guard bits
2.OB:
ACCB overflowed into guard bits
3.SA:
ACCA saturated (bit 31 overflow and sa turation)
or
ACCA overflowed into guard bits and saturated
(bit 39 overflow and s aturation)
4.SB:
ACCB saturated (bit 31 overflow and sa turation)
or
ACCB overflowed into guard bits and saturated
(bit 39 overflow and s aturation)
5.OAB:
Logical OR of OA and OB
6.SAB:
Logical OR of SA and SB
The OA and OB bits are modified each time data
passes through the adder/subtracter. When set, they
indicate that the most recent operation has overflowed
into the accumulator guard bits (bits 32 through 39).
The OA and OB bits can also optionally generate an
arithmetic warning trap when set and the corresponding overflow trap flag enable bit (OVATE, OVBTE) in
the INTCON1 register (refer to Section 5.0 “Inter-rupts”) is set. This allows the user to take immediate
action, for example, to correct system gain.
The SA and SB bits are modified each ti me data pass es
through the adder/subtracter, but can only be cleared by
the user. When set, they indicate that the accumulator
has overflowed its maximum range (bit 31 for 32-bit saturation, or bit 39 for 40-bit saturation) and will be saturated (if saturation is enabled). When saturation is not
enabled, SA and SB default to bit 39 overflow and thus
indicate that a catastrophic overflow has occurred. If the
COVTE bit in the INTCON1 register is set, SA and SB
bits will generate an arithmetic warning trap when
saturation is disabled.
The overflow and saturation Status bits can optionally
be viewed in the STATUS Register (SR) as the logical
OR of OA and OB (in bit OAB) and the logical OR of SA
and SB (in bit SAB). This allows programmers to check
one bit in the STATUS Register to determine if either
accumulator has overflowed, or one bit to determine if
either accumulator has saturated. This is useful for
complex number arithmetic, which typically uses both
the accumulators.
The device supports three Saturation and Overflow
modes.
1.Bit 39 Overflow and Saturation:
When bit 39 overflow and saturation occurs, the
saturation logic loads the maximally positive 9.31
(0x7FFFFFFFFF) or maximally negative 9.31
value (0x8000000000) into the target accumulator. The SA or SB bit is set and remains set until
cleared by the user. This is referred to as ‘super
saturation’ and provides protection against erroneous data or unexpected algorithm problems
(e.g., gain calculations).
2.Bit 31 Overflow and Saturation:
When bit 31 overflow and saturation occurs, the
saturation logic then loads the maximally positive
1.31 value (0x007FFFFFFF) or maximally negative 1.31 value (0x0080000000) into the target
accumulator . The SA or SB bit is set and rem ains
set until cleared by the user . When this Saturation
mode is in effect, the guard bits are not used (so
the OA, OB or OAB bits are never set).
3.Bit 39 Catastrophic Overflow
The bit 39 overflow Status bit from the adder is
used to set the SA or SB bit, which remain set
until cleared by the user. No saturation operation
is performed and the accumulator is allowed to
overflow (destroying it s sign). If the C OVTE bit in
the INTCON1 register is set, a catastrophic
overflow can initiate a trap exception.
2.4.2.2Accumulator ‘Write Back’
The MAC class of instructions (with the exception of
MPY,MPY.N,ED and EDAC) can optionally write a
rounded version of the high word (bits 31 through 16)
of the accumulator that is not targeted by the instructio n
into data spac e memory. The write is performed across
the X bus into combined X and Y address space. The
following addressing modes are supported:
1.W13, Register Direct:
The rounded contents of the non-target
accumulator are written into W13 as a 1.15
fraction.
2.[W13] + = 2, Register Indirect with Post-Increment: The rounded contents of the non-target
accumulator are wri tten into the ad dress pointed
to by W13 as a 1.15 fraction. W13 is then
incremented by 2 (for a word write).
2.4.2.3Round Logic
The round logic is a combinational block, which performs a conventional (biased) or convergent (unbiased)
round function during an accumulator write (store). The
Round mode is determined by the state of the RND bit
in the CORCON register. It generates a 16-bit, 1.15 data
value which is passed to the data space write saturation
logic. If rounding is not indicated by the instruction, a
truncated 1.15 data value is stored and the least
significant word (lsw) is simply discarded.
Conventional rounding takes bit 15 of the accumulator,
zero-extends it and ad ds it to the AC CxH w ord (bi t s 16
through 31 of the accumulato r). If the ACCxL word (bit s
0 through 15 of the accumulator) is between 0x8000
and 0xFFFF (0x8000 included), ACCxH is incremented. If ACCxL is between 0x0000 and 0x7FFF,
ACCxH is left unchanged. A consequence of this
algorithm is that over a succ ession of ran dom roundin g
operations, the value will tend to be biased slightly
positive.
Convergent (or unbiased) rounding operates in the
same manner as conventional rounding, except when
ACCxL equals 0x8000. If this is the case, the LSb (bit
16 of the accumu lator) of ACCxH is examined. If it is ‘1’,
ACCxH is inc rement ed. If it is ‘0’, ACCxH is not modified. Assuming that bit 16 is effectively random in
nature, this scheme w i ll re mo ve any rou ndi ng b ias th at
may accumulate.
The SAC and SAC.R instructions store either a truncated (SAC) or rounded (SAC.R) version of the c ontents
of the target accumul ator to data mem ory , via the X bu s
(subject to data saturation, see Section 2.4.2.4 “DataSpace Write Saturation”). Note that for the MAC cl as s
of instructions, the accumulator write back operation
will function in the s ame mann er , a ddressing co mbine d
MCU (X and Y) data space though the X bus. For this
class of instructions, the data is always subject to
rounding.
In addition to adder/subtrac ter saturation, writes to dat a
space may also be saturated, but without affecting the
contents of the source accumulator. The data space
write saturation logic block accepts a 16-bit, 1.15 fractional value from the round logic block as its input,
together with overflow status from the original source
(accumulator) and the 16-bit round adder. These are
combined and used t o sele ct the a ppr opriate 1.15 fra ctional value as output to write to data space memory.
If the SATDW bit in the CORCON register is set, data
(after rounding or truncation) is tes te d for ove rflo w and
adjusted accordingly. For input data greater than
0x007FFF, data written to memo ry is forced to the maximum positi ve 1. 15 val ue, 0x 7FFF. For input data less
than 0xFF8000, da ta wr itten to me mory i s forced to th e
maximum negative 1.1 5 value, 0x8000. The MSb of the
source (bit 39) is used to determine the sign of the
operand being tested.
If the SA TDW bi t in the CORCON regis ter is not set , the
input data is always passed through unmodified under
all conditions.
2.4.3BARREL SHIFTER
The barrel shifter is capable of performing up to 15-bit
arithmetic or logic right shifts, or up to 16-bit left shifts
in a single c ycle. The sou rce can be ei ther of th e two
DSP accumulators or the X bus (to support multi-bit
shifts of register or memory data).
The shifter requi res a signed binary value to determine
both the magnitude (num ber of bits) and direction of the
shift operation. A positive value will shift the operand
right. A negative value will shift the operand left. A
value of ‘0’ will not modify the operand.
The barrel shifter is 40 bits wide, thereby obtaining a
40-bit result for DSP shift operati ons and a 16- bit result
for MCU shift operations. Data from the X bus is presented to the barrel shifter between bit positions 16 to
31 for right shifts, and bit positio ns 0 to 15 for left shift s.
Note: This data sheet summarizes features of this g roup
of dsPIC30F devices and is not intended to be a complete
reference source. For more information on the CPU,
peripherals, register descriptions and general device
functionality, refer to the “dsPIC30F Family ReferenceManual” (DS70046). For more information on t he device
instruction set and programming, refer to the “dsPIC 30F/33F Programmer’s Reference Manual” (DS70157).
3.1Program Address Space
The program address space is 4M instruction words. It
is addressable by a 24-bit value from either the 23-bit
PC, table instruction Effective Address (EA), or data
space EA, when program space is mapped into data
space, as defined by Table 3-1. Note that the program
space address i s incr ement ed by two betw een suc cessive program words, in order to provide compatibility
with data space addressing.
User program space access is restricted to the lower
4M instruction word address range (0x000000 to
0x7FFFFE), for all acce sses other than TBLRD/TBLWT,
which use TBLPAG<7> to determine user or configuration space access. In Table 3-1, Read/Write instructions, bit 23 allows access to the Device ID, the User ID
and the Configuration bits. Otherwise, bit 23 is always
clear.
FIGURE 3-1:
Space
User Memory
PROGRAM SPACE MEMORY
MAP FOR dsPIC3 0F1010/
202X
Reset – GOTO Instruction
Reset – Target Address
Reserved
Ext. Osc. Fail Trap
Address Error Trap
Stack Error Trap
Arithmetic Warn. Trap
Reserved
Reserved
Reserved
Vector 0
Vector 1
Vector 52
Vector 53
Alternate Vector Table
User Flash
Program Memory
(4K instructions)
Reserved
(Read 0’s)
000000
000002
000004
000014
00007E
000080
0000FE
000100
001FFE
002000
7FFFFE
800000
Vector Tables
Note:The address map shown in Figure 3-1 is
conceptual, and the actual memory configuration may vary across individual
devices depending on available memory.
3.1.1DATA ACCESS FROM PROGRAM
MEMORY USING TABLE
INSTRUCTIONS
This architecture fetc hes 24 -bi t w ide prog ram me mo ry.
Consequently, instructions are always aligned. However, as the architecture is modified Harvard, data can
also be present in program space.
There are two methods by which program space can
be accessed; via special table instructions, or through
the remapping of a 16 K word program space page into
the upper half o f da ta space (see Section 3.1.2 “Data
Access from Program Memory Using Program
Space Visibility”). The TBLRDL and TBLWTL instruc-
tions offer a direct m ethod of reading or w riting the least
significant word (lsw) of any address within program
space, without going through data space. The TBLRDH
and TBLWTH instructions are the only method whereby
the upper 8 bits of a program space word can be
accessed as data.
The PC is incremented by two for each successive
24-bit program word. This allows program memory
addresses to directly map to data space addresses.
Program memory can thus be regarded as two 16-bit
word wide address sp ac es , res id ing sid e by si de, each
with the same address range. TBLRDL and TBLWTL
access the space which contains the Least Significant
Data Word, and TBLRDH and TBLWTH access the
space which contains the Most Significant Data Byte.
Figure 3-2 shows how the EA is created for table operations and data space accesses (PSV = 1). Here,
P<23:0> refers to a program space word, whereas
D<15:0> refers to a data space word.
A set of Table Instructions is prov ided to move by te o r
word sized data to and from program space.
1.TBLRDL: Table Read Low
Word: Read the lsw of the program address;
P<15:0> maps to D<15:0>.
Byte: Read one of the LSBs of the program
address;
P<7:0> maps to the destination byte when byte
select = 0;
P<15:8> maps to the d estination b yte when byte
select = 1.
2.TBLWTL: Tabl e Writ e Low (re fer to Section 7.0“Flash Program Memory” for details on Flash
Programming).
3.TBLRDH: Table Read High
Word: Read the most significant word of the
program address;
P<23:16> maps to D<7:0>; D<15:8> always
be = 0.Byte: Read one of the MSBs of the program
address;
P<23:16> maps to the destination byte when
byte select = 0;
The destination byte will al ways be = 0 when
byte select = 1.
4.TBLWTH: Table Write High (refer to Section 7.0“Flash Program Memory” for details on Flash
Programming).
FIGURE 3-3:PROGRAM DATA T ABLE A CCESS (LEAST SI GNIFICANT WO RD)
FIGURE 3-4:PROGRAM DATA T ABLE ACCESS (M OST SI GNIFICANT BYTE)
TBLRDH.W
PC Address
0x000000
0x000002
0x000004
0x000006
Program Memory
‘Phantom’ Byte
(Read as ‘0’)
00000000
00000000
00000000
00000000
23
TBLRDH.B (Wn<0> = 1)
3.1.2DATA ACCESS FROM PROGRAM
MEMORY USING PROGRAM
SPACE VISIBILITY
The upper 32 Kbytes of data space may optionally be
mapped into any 16K word program space page. This
provides transparent access of stored constant data
from X data space, without the need to use special
instructions (i.e., TBLRDL/H, TBLWTL/H instructions).
Program space access through the data space occurs
if the MSb of the data space EA is set and program
space visibility is enabled, by setting the PSV bit in the
Core Control register (CORCON). The functions of
CORCON are discussed in Section 2.4 “DSPEngine”.
Data accesses to this area add an additional cycle to
the instruction being executed, since two program
memory fetches are required.
Note that the upper half of addressable data space is
always part of the X data space. Therefore, when a
DSP operation uses program sp ace mapp ing to acc ess
this memory region , Y d at a space should typically contain state (variable) data for DSP operations, whereas
X data space should typically contain coefficient
(constant) data.
Although each da ta sp ace addres s, 0x8000 and higher ,
maps directly into a corresponding program memory
address (see Figure 3-5), only the lower 16-bits of the
24-bit program word are used to contain the data. The
upper 8 bits shoul d be progra mmed to forc e an illeg al
instruction to maintain machine robustness. Refer to
the “dsPIC30F/33F Programmer’s Reference Manual”
(DS70157) for details on instruction encoding.
16
TBLRDH.B (Wn<0> = 0)
Note that by incrementing the PC by 2 for each program memory word, the Least Significant 15 bits of
data space addresses directly map to the Least Significant 15 bits in the corresponding program space
addresses. The rem aining b its a re provid ed by th e Program Space Vis ibilit y Page regi ster, PSVPAG<7:0>, as
shown in Figure 3-5.
Note:PSV access is tempor arily dis abled d uring
Table Reads/Writes.
For instructions that use PSV which are executed
outside a REPEAT loop:
• The following instructions will require one instruction cycle in addition to the specified execution
time:
- MAC class of instructions with data operand
prefetch
- MOV instructions
- MOV.D instructions
• All other instructions will require two instruction
cycles in addition to the specified execution time
of the instruction.
For instructions that use PSV which are executed
inside a REPEAT loop:
• The following inst ances wi ll require two ins truction
cycles in addition to the specified execution time
of the instruction:
- Execution in the first iteration
- Execution in the last iteration
- Execution prior to exiting the loop due to an
interrupt
- Execution upon re-entering the loop after an
interrupt is serviced
• Any other iteration of the REPEAT loop will allow
the instruction, accessing data using PSV, to
execute in a single cycle.
FIGURE 3-5 :DATA S PACE WINDOW INTO PRO GR AM S PACE OPERATION
Data
Space
EA
EA<15> =
16
EA<15> = 1
15
0
15
PSVPAG
(1)
23150
3.2Data Address Sp ace
The core has two data spaces. The data spaces can be
considered either separate (for some DSP instructions), or as one unified linear address range (for MCU
instructions). The dat a spaces are accessed using two
Address Generation Units (AGUs) and separate data
paths.
3.2.1DATA SPACE MEMORY MAP
The data space memory is split into two blocks, X and
Y data space. A key element of this architectur e is th at
Y space is a subset of X space, and is fully contained
within X space. In order to provide an apparent linear
addressing space, X and Y spaces have contiguous
addresses.
When executing any instruction other than one of the
MAC class of instructions, the X block consists of the
256 byte data address space (including all Y
addresses). When executing one of the MAC class of
instructions, the X block consists of the 256 bytes data
address space excluding the Y address block (for data
reads only). In other word s, all other i nstructions rega rd
the entire data memory as one composite address
space. The MAC class instructions extract the Y
address space from data space and address it using
EAs sourced from W10 and W11. The remaining X data
space is addressed using W8 and W9. Both address
spaces are concurrently accessed only with the MAC
class instructions.
A data space memory map is shown in Figure 3-6.
dsPIC30F1010/202X
FIGURE 3-6: DA TA SP ACE MEMO R Y MA P
SFR Space
(Note)
512 bytes
SRAM Space
MSB
Address
0x0001
0x07FF
0x0801
0x08FF
0x0901
0x09FF
0x8001
16 bits
SFR Space
X Data RAM (X)
256 bytes
Y Data RAM (Y)
256 bytes
(See Note)
LSB
Address
LSBMSB
0x0000
0x07FE
0x0800
2560 bytes
Near
Data
Space
0x08FE
0x0900
0x09FE
0x0A00
0x8000
X Data
Unimplemented (X)
Optionally
Mapped
into Program
Memory
0xFFFF
Note:Unimplemented SFR or SRAM locations read as ‘0’.
The X data space is used by all instructions and supports all Addressing modes. There are separate read
and write data buses. The X read data bus is the return
data path for all inst ructions that view data spac e as
combined X and Y address space. It is also the X
address space data path for the dual operand read
instructions (MAC class). The X write data bus is the
only write path to data space for all instructions.
The X data space also suppo rt s modulo addre ssing for
all instructions, subject to Addressing mode restrictions. Bit-Reversed Addressing is only supported for
writes to X data space.
The Y data space is used in concert with the X data
space by the MAC class of instructions (CLR, ED,EDAC,MAC,MOVSAC,MPY,MPY.N and MSC) to provide two concurrent data read paths. No writes occur
across the Y bus. This class of instructions dedicates
two W register pointers, W10 and W11, to always
address Y data space, independent of X data space,
whereas W8 and W9 always address X data space.
Note that during accumulator write back, the data
address space is con si dere d a c om bin ati on of X and Y
data spaces, so the write occurs across the X bus.
Consequently, the write can be to any address in the
entire data space.
The Y data space can only be used for the data
prefetch operation associated with the MAC class of
instructions. It also supports modulo addressing for
automated circular bu f fe rs. O f c ours e, all othe r ins tru ctions can access the Y dat a address sp ace through the
X data path, as part of the composite linear space.
The boundary between the X and Y data spaces is
defined as shown in Figure 3-6 and is not user programmable. Shoul d an EA poin t to d ata out side it s own
assigned address space, or to a location outside physical memory, an all-zero word/byte will be returne d. For
example, although Y address space is visible by all
non-MAC instructions using any Addressing mode, an
attempt by a MAC instruction to fetch data from that
space, usin g W8 or W9 (X spac e point ers), wi ll ret urn
0x0000.
3.2.3DATA SPACE WIDTH
The core data width is 16 bits. All internal registers are
organized as 16-bit wide words. Data space memory is
organized in byte addressable, 16-bit wide blocks.
3.2.4DATA ALIGNMENT
To help maintain backward compatibility with PIC
MCU devices and improve data space memory usage
efficiency, the dsPIC30F instruction set supports both
word and byte operation s. Data i s aligned in dat a memory and registers as words, but all data space EAs
resolve to bytes. Data byte reads will rea d the comp lete
word, which contain s the byte, usi ng the LSb of an y EA
to determine which byte to select. The selected byte is
placed onto the LSB of the X data path (no byte
accesses are possible fro m the Y data pa th as the MAC
class of instruction can only fetch words). That is, data
memory and registers are organized as two parallel
byte-wide entities with shared (word) address decode,
but separate write lines. Data byte writes only write to
the corresponding side of the array or register which
matches the byte address.
As a consequence of th is byte acce ssibility, all effective
address calculatio ns (in cl udi ng tho se ge nera ted by th e
DSP operations, which are restricted to word sized
data) are internal ly scaled to ste p through word-ali gned
memory. For example, the core would recognize that
Post-Modified Register Indirect Addressing mode,
[Ws++], will result in a value of Ws + 1 for byte
operations and Ws + 2 for word operations.
All word accesses m ust be al igned to an even addre ss.
Misaligned word data fetches are not supported, so
care must be taken when mixing byte and word operations, or translatin g from 8-bit MCU cod e. Should a misaligned read or write be attempted, an address error
trap will be generated. If the error occurred on a read,
the instruction underway is completed, whereas if it
occurred on a write, the ins truction wil l be execu ted but
the write will not occur. In either case, a trap will then
be executed, allow ing the syste m and /or user to exam ine the machine state prior to execution of the address
fault.
®
TABLE 3-2:EFFECT OF INVALID
MEMORY ACCESSES
Attempted OperationData Returned
EA = an unimplemented address0x0000
W8 or W9 used to access Y data
space in a MAC instruction
W10 or W11 used to access X
data space in a MAC instruction
All effective addresses are 16 bits wide and point to
bytes within the data space. Therefore, the data space
address range is 64 Kbytes or 32K words.
All byte loads into any W register are loaded into the
LSB. The MSB is not modified.
A Sign-Extend (SE) instruction is provided to allow
users to translate 8-bit signed data to 16-bit signed
values. Alternatively, for 16-bit unsigned data, users
can clear the MSB of any W register by executing a
Zero-Extend (ZE) instruction on the appropriate
address.
Although most ins truc tio ns a r e ca p ab le of operating on
word or byte data sizes, it should be noted that some
instructions, including the DSP instructions, operate
only on words.
3.2.5NEAR DATA SPACE
An 8 Kbyte ‘near’ data space is reserved in X address
memory space between 0x0000 and 0x1FFF, which is
directly addressable via a 13- bit absolute address field
within all memory direct instructions. The remaining X
address space and all of the Y address space is
addressable indirec tly. Additionally , the whole o f X data
space is addressable using MOV instructions, which
support memory direct addressing with a 16-bit
address field.
3.2.6SOFTWARE STACK
The dsPIC DSC de vice cont ain s a softwa re sta ck. W15
is used as the Stack Pointer.
The Stack Pointer always points to the first available
free word and grows from lower addresses towards
higher addresses. It pre-decrement s for stack pop s and
post-increments for stack pushes, as shown in
Figure 3-9. Note that for a PC push during any CALL
instruction, the M SB o f t he PC i s ze ro-extended before
the push, ensuring that the MSB is always clear.
Note:A PC push during exception processing
will concatenate the SRL register to the
MSB of the PC prior to the push.
There is a Stack Pointer Limit re gister (SPLIM) associated with the Stack Pointer. SPLIM is uninitialized at
Reset. As is the case for the Stack Pointer, SPLIM<0>
is forced to ‘0’, because all stack operations must be
word-aligned. Whenever an Effective Address (EA) is
generated using W15 as a source or destination
pointer, the address thus generated is compared with
the value in SPLIM. If the contents of the St ac k Po int er
(W15) and the SPLIM register are equal and a push
operation is performed , a sta ck error trap will not oc cur .
The stack error trap will occur on a subsequent push
operation. Thus, for example, if it is desirable to cause
a stack error trap when the stack grows beyond
address 0x2000 in RAM, initialize the SPLIM with the
value, 0x1FFE.
Similarly , a S tac k Pointer Underflow (stack erro r) trap is
generated when the Stack Pointer address is found to
be less than 0x0800, thus preventing the stack from
interfering with the Special Function Register (SFR)
space.
A write to the SPLIM regis ter should not be im mediately
followed by an indirect read operati on usi ng W15.
FIGURE 3-9:CALL STACK FRAME
0x0000
Stack Grows Towards
000000000
Higher Address
PC<15:0>
PC<22:16>
<Free Word>
015
W15 (before CALL)
W15 (after CALL)
POP: [--W15]
PUSH: [W15++]
3.2.7DATA RAM PROTECTION
The dsPIC30F1010/202X devices support data RAM
protection features which enable segments of RAM to
be protected when us ed i n c onj unc ti on wi th Bo ot C od e
Segment Security. BSRAM (Secure RAM segment for
BS) is accessible only from the Boot Segment Flash
code when enabled. See Table 3-3 for the BSRAM
SFR.
Note: This data sheet summarizes features of this g roup
of dsPIC30F devices and is not intended to be a complete
reference source. For more information on the CPU,
peripherals, register descriptions and general device
functionality, refer to the “dsPIC30F Family ReferenceManual” (DS70046). For more informat ion on the device
instruction set and programming, refer to the “dsPIC30F/33F Programmer’s Reference Manual” (DS70157).
The dsPIC DSC core contains two independent
address generator unit s: the X AGU an d Y AGU. The Y
AGU supports word sized data reads for the DSP MAC
class of instructions only. The dsPIC DSC AGUs
support three types of data addressing:
• Linear Addressing
• Modulo (Circular) Addressing
• Bit-Reversed Addressing
Linear and Modulo Data Addressing modes can be
applied to data space or program space. Bit-Reversed
Addressing is only applicab le to dat a s pace a ddresses .
4.1Instruction Addressing Modes
The Addressing modes in Table 4-1 form the basis of
the Addressing mode s optimized to support the sp ecific
features of individual instructions. The Addressing
modes provided in the MAC class of instructions are
somewhat different from those in the other instruction
types.
4.1.1FILE REGISTER INSTRUCTIONS
Most file register ins truc tio ns use a 13-bit address field
(f) to directly address data present in the first 8192
bytes of data memory (near data space). Most file
register instructions employ a working register, W0,
which is de noted as WREG i n these instruc tions. The
destination is typically either the same file register, or
WREG (with the exception of the MUL instruction),
which writes the re sult t o a re gister or regi ster p air. The
MOV instruction allows additional flexibility and can
access the entire data space.
TABLE 4-1:FUNDAMENTAL ADDRESSING MODES SUPPORTED
Addressing ModeDescription
File Register DirectThe address of the file register is specified explicitly.
Register DirectThe contents of a register are accessed directly.
Register IndirectThe contents of Wn forms the EA.
Register Indirect Post-modifiedThe contents of Wn forms the EA. Wn is post-modified (incremented or
decremented) by a constant value.
Register Indirect Pre-modifiedWn is pre-modified (incremented or decremented) by a signed constant value
to form the EA.
Register Indirect with Register Offset The sum of Wn and Wb forms the EA.
Register Indirect with Literal OffsetThe sum of Wn and a literal forms the EA.
The three-operand MCU instructions are of the form:
Operand 3 = Operand 1 <function> Operand 2
where Operand 1 is alwa ys a work in g register (i.e., the
Addressing mode can only be register direct), which is
referred to as Wb. Operand 2 can be a W register,
fetched from data memory, or a 5-bit literal. The result
location can be either a W register or an address
location. The following Addressing modes are
supported by MCU instructions:
• Register Direct
• Register Indirect
• Register Indirect Post-modified
• Register Indirect Pre-modif ied
• 5-bit or 10-bit Literal
Note:Not all instructions support all the
Addressing modes gi ven above. Indivi dual
instructions may support different subsets
of these Addressing modes.
4.1.3MOVE AND ACCUMULATOR
INSTRUCTIONS
Move instructions and the DSP Accumulator class of
instructions provide a greater degree of addressing
flexibility than other instructions. In addition to the
Addressing modes supported by most MCU instructions, move and accumulator instructions also support
Register Indirect with Register Offset Addressing
mode, also referred to as Register Indexed mode.
Note:For the MOV instructions, the Addressing
mode specified in the instruction can differ
for the source and destination EA. However , the 4 -bit Wb (Register Offs et) fie ld is
shared between both source and
destination (but typically only used by
one).
In summary, the following Addressing modes are
supported by move and accumulator instructions:
• Register Direct
• Register Indirect
• Register Indirect Post-modified
• Register Indirect Pre-modif ied
• Register Indirect with Register Offset (Indexed)
• Register Indirect with Literal Offset
• 8-bit Literal
• 16-bit Literal
Note:Not all instructions support all the
Addressing modes gi ven above. Indivi dual
instructions may support different subsets
of these Addressing modes.
4.1.4MAC INSTRUCTIONS
The dual source operand DSP instructions (CLR, ED,EDAC,MAC,MPY,MPY.N,MOVSAC and MSC), also
referred to as MAC instruction s, utilize a simplified set of
Addressing modes to allow the user to effectively
manipulate the data pointers through register indirect
tables.
The two source operand prefetch registers must be a
member of the set {W8, W9, W10, W11}. For data
reads, W8 and W9 will always be directed to the X
RAGU and W10 and W11 will always be directed to the
Y AGU. The effective add resses generated (bef ore and
after modification) must, therefore, be valid addresses
within X data space for W8 and W9 and Y data space
for W10 and W11.
Note:Register Indirect with Register Offset
Addressing is only available for W9 (in X
space) and W11 (in Y space).
In summary, the following Addressing modes are
supported by the MAC class of instructions:
• Register Indirect
• Register Indirect Post-modified by 2
• Register Indirect Post-modified by 4
• Register Indirect Post-modified by 6
• Register Indirect with Register Offset (Indexed)
4.1.5OTHER INSTRUCTIONS
Besides the variou s Addressing mo des outli ned above,
some instructio ns use li teral con stant s of va rious siz es.
For example, BRA (branch) instructions use 16-bit
signed literals to spe cify the branc h destination directly,
whereas the DISI instruction uses a 14-bit unsigned
literal field. In some instructi ons , suc h as ADD Acc, the
source of an operand or result is im plied by the opcod e
itself. Cert ain opera tions, su ch as NOP, do not have any
operands.
Modulo addressing is a method of providing an automated means to support circular data buffers using
hardware. The objectiv e is to re move the need for software to perform data address boundary checks when
executing tightly looped code, as is typical in many
DSP algorithms.
Modulo addressing can operate in either data or program space (since the dat a pointer mechanism is e ssentially the same for both). One circular buffer can be
supported in each of the X (which also provides the
pointers into program space) and Y data sp aces. Modulo
addressing can operate on any W register poin ter. However, it is not advisable to use W14 or W15 for modulo
addressing, since these two registers are used as the
Stack Frame Pointer and St ack Pointer, respectively.
In general, any particular circular buffer can only be
configured to ope rate in one directio n, as ther e are certain restrictions on the buffer start address (for incrementing buffers) or end address (for decrementing
buffers) based upon the dire ct ion of the buf fer.
The only exception to the usage restrictions is for buffers which have a power-of-2 length. As these buffers
satisfy the start and end address criteria, they may
operate in a Bidirectional mode, (i.e., address boundary checks will be performed on both the lower and
upper address boundaries).
4.2.1START AND END ADDRESS
The modulo addressing scheme requires that a
starting and an end address be specified and loaded
into the 16-bit modulo buffer address registers:
XMODSRT, XMODEND, YMODSRT and YMODEND
(see Table 3-3).
Note:Y-space modulo addressing EA calcula-
tions assume word sized data (LSb of
every EA is always clear).
The length of a ci rcular buf fer is not direc tly specifi ed. It
is determined by the difference between the corresponding start and end addresses. The maximum
possible length of the circular buffer is 32K words
(64 Kbytes).
4.2.2W ADDRESS REGISTER
SELECTION
The Modulo and Bit-Rev ers ed Add ress in g Co ntro l re gister MODCON<15:0 > c on t ai ns enable flags as well as
a W register field to specify the W address registers.
The XWM and YWM fields select which registers will
operate with modul o addressing. If XWM = 15, X RAGU
and X WAGU modulo addressing are disabled.
Similarly, if YWM = 15, Y AGU modulo addressing is
disabled.
The X Address Space Pointer W register (XWM) to
which modulo addressing is to be applied, is stored in
MODCON<3:0> (see Table 3-3). Modulo addressing is
enabled for X dat a space when XWM is set to any v alue
other than 15 and the XMODEN bit is set at
MODCON<15>.
The Y Address Space Pointer W register (YWM) to
which modulo addressing is to be applied, is stored in
MODCON<7:4>. Modulo addressing is enabled for Y
data space when YWM is set to any value other than 15
and the YMODEN bit is set at MODCON<14>.
MOV#0x1100,W0
MOVW0, XMODSRT;set modulo start address
MOV#0x1163,W0
MOVW0,MODEND;set modulo end address
MOV#0x8001,W0
MOVW0,MODCON;enable W1, X AGU for modulo
MOV#0x0000,W0;W0 holds buffer fill value
MOV#0x1110,W1;point W1 to buffer
DOAGAIN,#0x31;fill the 50 buffer locations
MOVW0, [W1++];fill the next location
AGAIN: INCW0,W0;increment the fill value
Start Addr = 0x1100
End Addr = 0x1163
Length = 0x0032 words
Modulo addressing can be applied to the Effective
Address (EA) calculation associated with any W register. It is important to realize that the address boundaries check for ad dre sses le ss th an or greater than the
upper (for incrementing buffers) and lower (for decrementing buffers) boundary addresses (not just equal
to). Address changes may, therefore, jump beyond
boundaries and still be adjusted correctly.
Note:The modu lo corr ected effective address is
written back to the re giste r only when PreModify or Post-Modify Addressing mode is
used to compute the Effective Address.
When an address offset (e.g., [W7 + W2])
is used, modulo add res s c orrec ti on i s p erformed, but the contents of the register
remains unchanged.
4.3Bit-Reversed Addressing
Bit-Reversed Addressing is intended to simplify data
re-ordering for radix-2 FFT algorithms. It is supported
by the X AGU for data writ es only.
The modifier, which may be a constant value or register
contents, is regarded as having its bit order reversed.
The address source and dest ina tion are ke pt in norma l
order. Thus, the only operand requiring reversal is the
modifier.
4.3.1BIT-REVERSED ADDRESSING
IMPLEMENTATION
Bit-Reversed Addressing is enabled when:
1.BWM (W register selection) in the MODCON
register is any value other than 15 (the stack can
not be accessed using Bit-Reversed
Addressing) and
2.the BREN bit is set in the XBREV register and
3.the Addressing mode used is Register Indirect
with Pre-Increment or Post-Increment.
dsPIC30F1010/202X
N
If the length of a bit- reversed buffer is M = 2
then the last ‘N’ bits of the data b uffer start address
must be zeros.
XB<14:0> is the bit-revers ed ad dres s modifier or ‘pivot
point’ which is typically a constant. In the case of an
FFT computation, its value is equal to half of the FFT
data buffer size.
Note:All Bit-Reversed EA calculations assume
word sized data (LSb of every EA is
always clear). The XB value is scaled
accordingly to generate compatible (byte)
addresses.
When enabled, Bit-Reversed Addressing will only be
executed for register indirect with pre-increment or
post-increment add ressing an d word sized dat a wri tes.
It will not function for any ot her Addres sing m ode or for
byte sized data, and normal addresses will be generated instead. When Bit-Reversed Addr essin g is activ e,
the W Address Pointer will always be added to the
address modifier (XB) and the offset associated with
the register Indirect Addressing mode will be ignored.
In addition, as word sized data is a requirement, the
LSb of the EA is ignored (and always clear).
Note:Modulo addressing and Bit-Reversed
Addressing should not be enabled
together. In the event that the user
attempts to do th is, Bit-Reversed Addressing will assume priori ty when activ e for the
X WAGU, and X WAGU modulo addressing will be disabled. However, modulo
addressing will continue to function in the
X RAGU.
If Bit-Reversed Addressing has already been enabled
by setting the BREN (XBREV<15>) bit, then a write to
the XBREV register sho uld not be immedi ately followed
by an indirect read operation using the W register that
has been designated as the bit-reversed pointer.
Note: This data sheet summarizes features of this g roup
of dsPIC30F devices and is not intended to be a complete
reference source. For more information on the CPU,
peripherals, register descriptions and general device
functionality, refer to the “dsPIC30F Family ReferenceManual” (DS70046). For more information on t he device
instruction set and programming, refer to the “dsPIC 30F/33F Programmer’s Reference Manual” (DS70157).
The dsPIC30F1010/202X dev ice has up to 35 in terrupt
sources and 4 processor exceptions (traps), which
must be arbitrated based on a priority scheme.
The CPU is responsible for reading the Interrupt Vector Table (IVT) and transferring the address contained
in the interrupt vector to the Program Counter (PC).
The interrupt vector is transferred from the program
data bus into the Program Counter, via a 24-bit wide
multiplexer on the input of the Program Counter.
The Interrupt Vector Table and Alternate Interrupt Vector Table (AIVT) are placed near the beginning of program memory (0x000004). The IVT and AIVT are
shown in Figure 5-1.
The interrupt controller is responsible for preprocessing the interrupts and processor exceptions,
prior to their being presented to the processor core.
The peripheral interrupts and traps are enabled, prioritized and controlled using centralized special function
registers:
• IFS0<15:0>, IFS1<15:0>, IFS2<15:0>
All interrupt request flags are maintained in these
three registers. The flags are set by their respective peripherals or external signals, and they are
cleared via software.
• IEC0<15:0>, IEC1<15:0>, IEC2<15:0>
All interrupt enable control bits are maintained in
these three registers. These control bits are used
to individually enable interrupts from the
peripherals or external signals.
• IPC0<15:0>... IPC11<7:0>
The user-assignable prio rity lev el assoc iate d with
each of these interrupts is held centrally in these
twelve registers.
• IPL<3:0> The current CPU priority level is explic-
itly stored in the IPL bits. IPL<3> is present in the
CORCON register , whereas IPL<2:0> are present
in the STATUS Register (SR) in the processor
core.
• INTCON1<15:0>, INTCON2<1 5:0>
Global interrupt co ntrol fu nctio ns are deriv ed from
these two registers. INTCON1 contains the control and status flags for the processor exceptions.
The INTCON2 register controls the external interrupt request signal behavior and the use of the
alternate vector table.
• The INTTREG register contains the associated
interrupt vector number and the new CPU interrupt priority level, which are latched into vector
number (VECNUM<6:0>) and Interrupt level
(ILR<3:0>) bit fields in th e INTTREG regi ster. The
new interrupt priority level is the priority of the
pending interrupt.
Note:Interrupt f lag bit s get se t when an In terrupt
condition occurs, regar dless of the st ate of
its corresponding enable bit. User software should ensure the appropriate interrupt flag bits are clear prior to enabling an
interrupt.
All interrupt sources can be user assigned to one of 7
priority levels, 1 through 7, via the IPCx registers.
Each interrupt source is associated with an interrupt
vector, as shown in Figure 5-1. Levels 7 and 1 represent the highest and lowest maskable priorities,
respectively.
Note:Assigning a priority level of 0 to an inter-
rupt source is equivalent to disabling that
interrupt.
If the NSTDIS bit (INTCON1<15>) is set, nesting of
interrupts is prev en ted . Th us , i f a n i nte rrupt is c urre ntl y
being serviced, processing of a new interrupt is
prevented, even if th e ne w inte rrup t is of hi ghe r priority
than the one currently being serviced.
Note:The IPL bits become read-only whenever
the NSTDIS bit has been set to ‘1’.
Certain interrupts have specialized control bits for
features like edge or level triggered interrupts, interrupt-on-change, etc. Control of these features remains
within the peripheral module that generates the
interrupt.
The DISI instruction can be used to disable the
processing of interrupts of priorities 6 and lower for a
certain number of instruc tions, during which the DISI bit
(INTCON2<14>) remains set.
When an interrupt is serviced, the PC is loaded with the
address stored in the vector locati on in Prog ram Memory that corresponds to the int errupt. There are 63 different vect ors wi thin th e IVT (ref er to F igure5-1). These
vectors are contained in locations 0x000004 through
0x0000FE of program memory (refer to Figure 5-1).
These locations c ontain 24-bit a ddresses, a nd, in ord er
to preserve robustness, an address error trap will take
place should the PC attempt to fetch any of these
words during normal execution. This prevents execution of random data as a result of ac cidentally decrementing a PC into vector space, accidentally mapping
a data space add ress int o vec tor sp ac e, or the PC rol ling over to 0x000000 after reaching the end of implemented program memory space. Execution of a GOTO
instructio n to this vector space wil l also generate an
address error trap.
The user-assignable In terrupt Prio rity (IP<2 :0>) bit s for
each individual interru pt source are located in the Least
Significant 3 bits of each nibble, within the IPCx
register(s). Bit 3 of each nibble is not used and is read
as a ‘0’. These bits define the priority level assigned to
a particular interrupt by the user.
Note:The user selectable priority levels start at
0, as the lowest priori ty, and level 7, as the
highest priority.
Since more than one interrupt request source may be
assigned to a specific user specified priority level, a
means is provid ed to assign prio rity within a gi ven level.
This method is called “Natural Order Priority” and is
final.
Natural order priority is determined by the position of an
interrupt in the vector table, and only affects interrupt
operation when multiple interrupts with the same userassigned priority become pending at the same time.
Table 5-1 lists the interrupt numbers and interrupt
sources for the dsPIC DSC devices and their
associated vector numbers.
Note 1: The natural o rder priority sche me has 0
as the highest priority and 53 as the
lowest priority.
2: The natural order priority number is the
same as the INT number.
The ability for the user to assign every interrupt to one
of seven priority levels implies that the user can as sig n
a very high overall priority level to an interrupt with a
low natural order priority. The INT0 (external interrupt
0) may be assigned to priority level 1, thus giving it a
very low effective priority.
A Reset is not a true exception, because the interrupt
controller is not invo lved in the Reset pro cess. The processor initializes its registers in response to a Reset,
which forces the PC to zero. The process or then begins
program execution at location 0x000000. A GOTO
instruction is stored in the first program memory location, immediatel y follo wed by th e addres s t arget for the
GOTO instruction. The processor executes the GOTO to
the specified addres s and then begi ns op erat ion at the
specified target (start) address.
5.2.1RESET SOURCES
In addition to External Reset and Power-on Reset
(POR), there are 6 sources of error conditions which
‘trap’ to the Reset vector.
• Watchdog Time-out:
The watchdog has ti med out, indicating that the
processor is no longer executin g the corre ct flo w
of code.
• Uninitialized W Register Trap:
An attempt to use an uninitialized W register as
an Address Pointer will cause a Reset.
• Illegal Instruction Trap:
Attempted execution of any unused opcodes will
result in an illegal instruction trap. Note that a
fetch of an illegal instruction does not result in an
illegal instruction trap if that instruction is flushed
prior to execution due to a flow change.
• Trap Lockout:
Occurrence of multiple Trap conditions
simultaneously will cause a Reset.
5.3Traps
Traps can be considered as non-maskable interrupts
indicating a software or hardware error, which adhere
to a predefined priority as shown in Figure 5-1. They
are intended to provide the user a means to correct
erroneous operatio n d urin g debug and when operating
within the application.
Note:If the user does not intend to take correc-
tive action in the event of a T rap E rror condition, these vectors must be loaded with
the address of a default handler that simply contains the RESET instruction. If, on
the other hand, one of the vectors c ontai ning an invalid address is called, an
address error trap is generated.
Note that many of these trap conditions can only be
detected when they occur. Consequently , the qu estionable instruction is allowed to complete prior to trap
exception pr ocessing. If the user ch ooses to recover
from the error, the result of the erroneous action that
caused the trap may have to be corrected.
There are 8 fixed priority levels for traps: Level 8
through Level 15, whic h impl ies tha t the IP L3 is alw ays
set during processing of a trap.
If the user is not cur rentl y execu tin g a trap , and h e set s
the IPL<3:0> bit s t o a va lue of ‘0111’ (Lev el 7), t hen al l
interrupts are disabled, b ut traps c an still b e processe d.
5.3.1TRAP SOURCES
The following traps are provided with increasing priority. However, since all traps can be nested, priority has
little effect.
Math Error Trap:
The Math Error trap executes under the following four
circumstances:
1.Should an attempt be made to divide by zero,
the divide operation will be aborted on a cycle
boundary and the trap taken.
2.If enabled, a Math Error trap will be taken when
an arithmetic operation on either accumulator A
or B causes an overflow from bit 31 and the
accumulator guard bits are not utilized.
3.If enabled, a Math Error trap will be taken when
an arithmetic operation on either accumulator A
or B causes a catastrophic overflow from bit 39
and all saturation is disabled.
4.If the shift amount specified in a shift instruction
is greater than the maximum allowed shift
amount, a trap will occur.
This trap is initiated when any of the following
circumstances occurs:
1.A misaligned data word access is attempted.
2.A data fetch from our unimplemented data
memory location is attempted.
3.A data access of an unimplemented program
memory location is attempted.
4.An instruction fetch from vector space is
attempted.
Note:In the MAC class of instru ctions, wherein
the data space is split into X and Y data
space, unimplemented X space includes
all of Y space, and unimplemented Y
space includes all of X space.
5.Execution of a “BRA #literal” instruction or a
“GOTO #literal” instruction, whe re literal
is an unimplem ented progr am memo ry addr ess.
6.Executing instructions after modifying the PC to
point to unimplemented program memory
addresses. The PC may be modified by loading
a value into the stack and executing a RETURN
instruction.
Stack Error Trap:
This trap is initiated under the following conditions:
1.The Stack Pointer is loaded with a value which
is greater than the (user-programmable) limit
value written into the SPLIM register (stack
overflow).
2.The Stack Pointer is loaded with a value which
is less than 0x0800 (simple stack underflow).
Oscillator Fail Trap:
This trap is initiated if the external oscillator fails and
operation becomes reliant on an internal RC backup.
5.3.2HARD AND SOFT TRAPS
It is possible that multiple traps can become active
within the same cycle (e.g., a misaligned word stack
write to an overflowed address). In such a case, the
fixed priority shown in Figure 5-1 is implemented,
which may requ ire the user to check if ot her traps are
pending, in order to completely correct the fault.
‘Soft’ traps incl ude excepti ons of priority level 8 through
level 11, inclusive. The arithmetic error trap (level 11)
falls into this category of traps.
‘Hard’ traps include exceptions of priority level 12
through level 15, inclusive. The address error (level
12), stack error (level 13) and oscillator error (level 14)
traps fall into this category.
Each hard trap that occurs must be acknowledged
before code execution of any type may continue. If a
lower priority hard trap occurs while a higher priority
trap is pending, acknowledged, or is being processed,
a hard trap conflict will occur.
The device is automatic ally Reset in a hard trap conflict
condition. The TRAPR Status bit (RCON<15>) is set
when the Reset occurs, so that the condition may be
detected in software.
All interrupt event flags are sampled in the be ginning of
each instruction cycle by the IFSx registers. A pending
interrupt request (IR Q) is indic ated by the flag bit bein g
equal to a ‘1’ in an IFSx register. The IRQ will cause an
interrupt to occur if the corresp onding bit in the interru pt
enable (IECx) register is set. For the remainder of the
instruction cycle, the priorities of all pending interrupt
requests are evaluated.
If there is a pending IRQ with a priority level greater
than the current processor priority level in the IPL bits,
the processor will be interrupted.
The processor then stacks the current Program
Counter and the low byte of the processor STATUS
Register (SRL), as shown in Figure 5-2. The low byte
of the STATUS register contains the processor priority
level at the time, prior to the beginning of the interrupt
cycle. The processor then loads the priority level for
this interrupt into the STATUS register. This action will
disable al l lower prior ity i nterru pts unt il th e comple tion
of the Interrupt Service Routine (ISR).
FIGURE 5-2:INTERRUPT STACK
FRAME
0x0000
Higher Address
Stack Grows Towards
PC<15:0>
SRL IPL3 PC<22:16>
<Free Word>
015
W15 (before CALL
W15 (after CALL)
POP : [--W15]
PUSH : [W15++]
5.5Alternate Vector Table
In Program Memory , the IVT is fol lowed by the AIVT, as
shown in Figure 5-1. Access to the Alternate Vector
Table is provided by the ALTIVT bit in the INTCON2
register . If the ALTIVT bit is set, all int errup t and exception processes will use the alternate vectors instead of
the default vecto rs. The alternate vectors are org anized
in the same manner as the default vectors. The AIVT
supports emulation and debugging efforts by providing
a means to switch between an application and a support environment, without requiring the interrupt vectors to be reprogrammed. This feature also enables
switching between applications for evaluation of
different software algorithms at run time.
If the AI VT is not requir ed, the p rogram m emory al located to the AIVT may be used for other purposes.
AIVT is not a protected section and may be freely
programmed by the user.
5.6Fast Context Saving
A context saving option is available using shadow registers. Shadow registers are provided for the DC, N,
OV, Z and C bits i n SR, and th e registe rs W0 thro ugh
W3. The shadows are o nly one level dee p. The shadow
registers are accessible using the PUSH.S and POP.S
instructions only.
When the processor vectors to an interrupt, the
PUSH.S instruction can be used to store the current
value of the aforementioned registers into their
respective shadow registers.
If an ISR of a certain priority uses the PUSH.S and
POP.S instructions for fast context saving, then a
higher priority I SR shou ld no t inc lude the s ame instructions. Users must save the key registers in software
during a lower priorit y interrupt, if t he higher prio rity ISR
uses fast context saving.
Note 1: The user can always lower the priority
level by writing a new value into SR. The
Interrupt Service Routine must clear the
interrupt flag bits in the IFSx register
before lowering the processor interrupt
priority, in order to avoid recursive
interrupts.
2: The IPL3 bit (CORCON<3>) is always
clear when interrupts are being processed. It is set only during execution of
traps.
The RETFIE (Return from Interrupt) instruction will
unstack the Program Counter and status regist ers to
return the processor to its state prior to the interrupt
sequence.
The interrupt controller supports three external interrupt request signals, INT0-IN T2. These inputs are edge
sensitive; they require a low-to-high or a high-to-low
transition to generate an interrupt request. The
INTCON2 register has thre e bits, IN T0EP-INT2EP, that
select the polarity of the edge detection circuitry.
5.8Wake-up from Sleep and Idle
The interr upt controller may be used to wake-u p the
processor from either Sleep or Idle modes, if Sleep or
Idle mode is active when the interrupt is generated.
If an enabled interrupt request of sufficient priority is
received by the interrupt controller, then the standard
interrupt request is presented to the processor. At the
same time, the processor will wake-up from Sleep or
Idle and begin execution of the Interrupt Service
Routine needed to process the interrupt request.
dsPIC30F1010/202X
REGISTER 5-1:INTCON1: INTERRUPT CONTROL REGISTER 1
R/W-0R/W-0R/W-0R/W-0R/W-0R/W-0R/W-0R/W-0
NSTDISOVAERROVBERRCOVAERRCOVBERROVATEOVBTECOVTE
bit 15bit 8
R/W-0R/W-0U-0R/W-0R/W-0R/W-0R/W-0U-0
SFTACERRDIV0ERR
bit 7bit 0
Legend:
R = Readable bitW = Writable bitU = Unimplemented bit, read as ‘0’
-n = Value at POR‘1’ = Bit is set‘0’ = Bit is clearedx = Bit is unknown
bit 15NSTDIS: Interrupt Nesting Disable bit
1 = Interrupt nesting is disabled
0 = Interrupt nesting is enabled
bit 14OVAERR: Accumulat or A Overflow Trap Flag bit
1 = Trap was caused by overflow of Accumulator A
0 = Trap was not caused by overflow of Accumulat or A
bit 13OVBERR: Accumulator B Overflow Trap Flag bit
1 = Trap was caused by overflow of Accumulator B
0 = Trap was not caused by overflow of Accumulat or B
bit 12COVAERR: Accumulator A Catastrophic Overflow Trap Enable bit
1 = Trap was caused by catastrophic overflow of Accumulator A
0 = Trap was not caused by catastrophic overflow of Accumulator A
bit 11COVBERR: Accumulator B Catastrophic Overflow Trap Enable bit
1 = Trap was caused by catastrophic overflow of Accumulator B
0 = Trap was not caused by catastrophic overflow of Accumulator B
bit 10OVATE: Accumulator A Overflow Trap Enable bit
1 = Trap overflow of Accumulator A
0 = Trap disabled
bit 9OVBTE: Accumulator B Overflow Trap Enable bit
1 = Trap overflow of Accumulator B
0 = Trap disabled
bit 8COVTE: Catastrophic Overflow Trap Enable bit
1 = Trap on catastrophic overflow of Accumulator A or B enabled
0 = Trap disabled
bit 7SFTACERR: Shift Accumulator Error Status bit
1 = Math error trap was caused by an invalid accumulator shift
0 = Math error trap was not caused by an inv alid accumulat or shift
bit 6DIV0ERR: Arithmetic Error Status bit
1 = Math error trap was caused by a divided by zero
0 = Math error trap was not caused by an inv alid accumulat or shift
bit 5Unimplemented: Read as ‘0’
bit 4MATHERR: Arithmetic Error Status bit
1 = Overflow trap has occurred
0 = Overflow trap has not occurred
bit 3ADDRERR: Address Error Trap Status bit
1 = Address error trap has occurred
0 = Address error trap has not occurred
Note: This data sheet summarizes features of this g roup
of dsPIC30F devices and is not intended to be a complete
reference source. For more information on the CPU,
peripherals, register descriptions and general device
functionality, refer to the “dsPIC30F Family ReferenceManual” (DS70046).
All of the device pins (except VDD, VSS, MCLR and
OSC1/CLKI) are shared between the peripherals and
the parallel I/O ports.
All I/O input ports feature Schmitt Trigger inputs for
improved noise immunity.
6.1Paralle l I/O (P IO) Ports
When a peripheral is enabled and the peripheral is
actively driving an associated pin, the use of the pin as
a general purpose output pin is disabled. The I/O pin
may be read, but the output driver for the parallel port
bit will be disabled. If a peripheral is enabled, but the
peripheral is not actively driving a pin, that pin may be
driven by a port.
All port pins have three registers directly associated
with the operation of the port pin. The data direction
register (TRISx) determ ines whe ther the pin is an inp ut
or an output. If the data direction bit is a ‘1’, then the pin
is an input. All port pins are defined as inputs after a
Reset. Reads from the latch (LATx), read the latch.
Writes to the latch, write the latch (LATx). Reads from
the port (PORTx), read the port pins, and writes to the
port pins, write the latch (LATx).
Any bit and its associated data and control registers
that are not valid for a particular device will be
disabled. That means the corresponding LATx and
TRISx registers and the port pin will read as zeros.
When a pin is shared with another peripheral or function that is defined as an input only, it is nevertheless
regarded as a dedicated port because there is no
other competing source of outputs.
A Parallel I/O (PIO) port that shares a pin with a peripheral is, in general, subservient to the peripheral. The
peripheral’s output buffer data and control signals are
provided to a pair of multiplexers. The multiplexers
select whether the peripheral or the associated port
has ownership of the outp ut dat a and co ntro l sign als of
the I/O pad cell. Figu re 6-1 shows how ports are shared
with other periphe rals, and th e associa ted I/O ce ll (pad)
to which they are connected. Table 6-1 and Table 6-2
show the register formats for the shared ports, PORTA
through PORTF, for the dsPIC30F1010/2020 and
PORT A throug h PORTG for the dsPIC30F2023 dev ice,
respectively.
FIGURE 6-1:BLOCK DIAGRAM OF A SHARED PORT STRUCTURE
The use of the ADPCFG and TRIS reg isters co ntrol the
operation of the A/D port pins. The port pins that are
desired as analog inputs must have their corresponding TRIS bit set (input). If the TRIS bit is cleared
(output), the digital output level (V
converted.
When reading the POR T regist er , all pins c onfigured as
analog input channe l will read as cleare d (a low lev el).
Pins configured as digi tal inputs will not convert an an alog input. Analog levels on any pin that is defined as a
digital input (including the ANx pins), may cause the
input buffer to consume current that exceeds the
device specifications.
6.2.1I/O PORT WRITE/READ TIMING
One instruction cycle is required between a port
direction change or port write operation and a read
operation of the same port. Typically this instruction
would be a NOP.
EXAMPLE 6-1:PORT WRITE/READ
EXAMPLE
MOV 0xFF00, W0; Configure PORTB<15:8>
; as inputs
MOV W0, TRISBB; and PORTB<7:0> as outputs
NOP; Delay 1 cycle
BTSS PORTB, #13; Next Instruction
OH or VOL) will be
6.3Input Change Notification
The input change notification function of the I/O ports
allows the dsPIC30F1010/202X devices to generate
interrupt requests to the processor in response to a
change-of-state on selected input pins. This feature is
capable of detecting input change-of-states even in
Sleep mode, when the clocks are disabled. There are
8 external signals (CN0 through CN7) that can be
selected (enabled) for generating an interrupt request
on a change-of-state.
There are two control registers associated with the CN
module. The CNEN1 register contain the CN interrupt
enable (CNxIE) control bits for each of the CN input
pins. Setting any of these bits enables a CN interrupt
for the corresponding pins.
Each CN pin also has a weak pull-up connected to it.
The pull-ups act as a current source that is connected
to the pin and eliminate the need for external resistors
when push button or keypad devices are connected.
The pull-ups are enabled separately using the CNPU1
register, which contain the weak pull-up enable (CNxPUE) bits for each of the CN pins. Setting any of the
control bits enables the weak pull-ups for the
corresponding pins.
Note: Pull-ups on change notification pins should
always be disabled whenever the port pin is
configured as a digital output.
Note: This data sheet summarizes features of this g roup
of dsPIC30F devices and is not intended to be a complete
reference source. For more information on the CPU,
peripherals, register descriptions and general device
functionality, refer to the “dsPIC30F Family ReferenceManual” (DS70046). For more information on t he device
instruction set and programming, refer to the “dsPIC 30F/33F Programmer’s Reference Manual” (DS70157).
The dsPIC30F family of devices contains internal
program Flash memory for executing user code. There
are two methods by which the user can program this
memory:
1.In-Circuit Serial Programming™ (ICSP™)
programming capability
2.Run-Time Self-Programming (RTSP)
7.1In-Circuit Serial Programming
(ICSP)
dsPIC30F devices c an be s erially prog rammed while in
the end application circu it. This is simply done wit h two
lines for Programming Clock and Programming Data
(which are named PGC and PGD respectively), and
three other lines for Power (V
Master Clear (MCLR
). This allows customers to manufacture boards with unprogrammed devices, and then
program the microcontroller just before shipping the
product. This also allows the most recent firmware or a
custom firmware to be programmed.
DD), Ground (VSS) and
7.2Run-Time Self-Programming
(RTSP)
RTSP is accomplished using TBLRD (table read) and
TBLWT (table write) instructions .
With RTSP, the user may erase program memory 32
instructions (96 bytes ) at a time and can write program
memory data 32 instructions (96 bytes) at a time.
7.3Table Instruction Operation Summary
The TBLRDL and the TBLWTL instructions are used to
read or write to bits <15:0> of program memory.
TBLRDL and TBLWTL can access program memory in
Word or Byte mode.
The TBLRDH and TBLWTH i nstructio ns are used to read
or write to bits <23:16> of program memory. TBLRDH
and TBLWTH can access program memory in Word or
Byte mode.
A 24-bit program memory address i s formed usin g bit s
<7:0> of the TBLPAG register and the Effective
Address (EA) from a W register specified in the table
instruction, as shown i n Figure 7-1.
The dsPIC30F Flash program memory is organized
into rows and panels. Each row consists of 32 instructions, or 96 bytes. Each panel consists of 128 rows, or
4K x 24 instructi ons. RTSP allo ws the user to er ase one
row (32 instructions) at a time and to program 32
instructions at one tim e. RTSP may be us ed to program
multiple program memory panels, but the table pointer
must be changed at each panel boundary.
Each panel of program memory contains write latches
that hold 32 instructions of programming data. Prior to
the actual programming operation, the write data must
be loaded into the panel write latches. The data to be
programmed into the panel is loaded in sequential
order into t he write latche s; instruction ‘0’, instruction
‘1’, etc. The in struction wo rds loade d must alway s be
from a group of 32 boundary.
The basic sequence f or RTSP program ming is to set up
a table point er, then do a s eries o f TBLWT instructions
to load the write latc hes. Prog ramming is perfo rmed b y
setting the special bits in the NVMCON register. 32
TBLWTL and four TBLWTH instructions are required to
load the 32 instructions. If multiple panel programming
is required, the table pointer needs to be changed and
the next set of multiple write latches written.
All of the table write operations are single-word writes
(2 instruction cycles), because only the table latches
are written. A programming cycle is required for
programming each row.
The Flash Program Memory is readable, writable and
erasable during normal operation over the entire V
range.
DD
7.5Control Registers
The four SFRs used to read and write the program
Flash memory are:
•NVMCON
• NVMADR
• NVMADRU
• NVMKEY
7.5.1NVMCON REGISTER
The NVMCON register controls which blocks are to be
erased, which memory type is to be programmed and
the start of the programming cycle.
7.5.2NVMADR REGISTER
The NVMADR register is used to hold the lower two
bytes of the effective address. The NVMADR register
captures the EA<15:0> of the last tab le instruction that
has been executed and selects the row to write.
7.5.3NVMADRU REGISTER
The NVMADRU register is used to hold the upper byte
of the effective address. The NVMADRU register captures the EA<23:16> of the last table instruction that
has been executed.
7.5.4NVMKEY REGISTER
NVMKEY is a write-only register that is used for write
protection. To start a programming or an erase
sequence, the user must consecutively write 0x55 and
0xAA to the NVMKEY register. Refer to Section 7.6
“Programming Operations” for further details.
Note:The user can also directly write to the
NVMADR and NVMADRU registers to
specify a program memory address for
erasing or programming.
A complete programming sequence is necessary for
programming or erasing the internal Flash in RTSP
mode. A programming operati on is nominally 2 ms ec in
duration and the processor stalls (waits) until the operation is fi nished. Setting t he WR bit (NVMCO N<15>)
starts the operation, and the WR bit is automatically
cleared when the operation is finished.
7.6.1PROGRAMMING ALGORITHM FOR
PROGRAM FLASH
The user can erase and program one row of program
Flash memory at a time. The general process is:
1.Read one row of program Flash (32 instruction
words) and store into data RAM as a data
“image”.
2.Update the data image with the desired new
data.
3.Erase program Flash row.
a) Setup NVMCON register for multi-word,
program Flash, erase and set WREN bit.
b) Write address of row to be erased into
NVMADRU/NVMDR.
c)Write ‘55’ to NVMKEY.
d) Write ‘AA’ to NVMKEY.
e) Set the WR bit. This will begin erase cycle.
f)CPU will stall for the duration of the erase
cycle.
g) The WR bit is cleared when erase cycle
ends.
4.Write 32 instruction words of data from data
RAM “image” into the program Flash write
latches.
5.Program 32 instruction words into program
Flash.
a) Setup NVMCON register for multi-word,
program Flash, program and set WREN bit.
b) Write ‘55’ to NVMKEY.
c)Write ‘AA’ to NVMKEY.
d) Set the WR bit. This will begin program
cycle.
e)CPU will stall for duration of the program
cycle.
f)The WR bit is cleared by the hardware
when program cycle ends.
6.Repeat steps 1 through 5 as needed to program
desired amount of program Flash memory.
7.6.2ERASING A ROW OF PROGRAM
MEMORY
Example 7-1 shows a code sequence that can be used
to erase a row (32 instructions) of program memory.
EXAMPLE 7-1:ERASING A ROW OF PROGRAM MEMORY
; Setup NVMCON for erase operation, multi word write
; program memory selected, and writes enabled
; Init pointer to row to be ERASED
MOV#0x4041,W0;
MOVW0
MOV#tblpage(PROG_ADDR),W0;
MOVW0
MOV#tbloffset(PROG_ADDR),W0; Intialize in-page EA<15:0> pointer
MOVW0, NVMADR ; Intialize NVMADR SFR
DISI#5; Block all interrupts with priority <7
MOV#0x55,W0
MOVW0
MOV #0xAA,W1 ;
MOVW1
BSETNVMCON,#WR; Start the erase sequence
NOP ; Insert two NOPs after the erase
NOP; command is asserted
Example 7-2 shows a sequence of instructions that
can be used to load th e 96 bytes of write lat ches. 32
TBLWTL and 32 TBLWTH instructions are needed to
load the write latches selected by the table pointer.
EXAMPLE 7-2:LOADING WRITE LATCHES
; Set up a pointer to the first program memory location to be written
; program memory selected, and writes enabled
; Perform the TBLWT instructions to write the latches
; 0th_program_word
; 1st_program_word
; 2nd_program_word
; 31st_program_word
MOV#0x0000,W0;
MOVW0
MOV#0x6000,W0; An example program memory address
Note: In Example 7-2, the contents of the upper byte of W3 have no effect.
7.6.4INITIATING THE PROGRAMMING
SEQUENCE
For protection, the w rite i nitiate sequ ence for N VMKEY
must be used to allow any erase or program operation
to proceed. After the program ming comm and has been
executed, the user must wait for the programming time
until programming is complete. The two instructions
following the start of the programming sequence
should be NOPs.
EXAMPLE 7-3:INITIATING A PROGRAMMING SEQUENCE
DISI#5; Block all interrupts with priority <7
MOV#0x55,W0
MOVW0
MOV #0xAA,W1 ;
MOVW1
BSETNVMCON,#WR; Start the erase sequence
NOP ; Insert two NOPs after the erase
NOP; command is asserted
Note: This data sheet summarizes features of this g roup
of dsPIC30F devices and is not intended to be a complete
reference source. For more information on the CPU,
peripherals, register descriptions and general device
functionality, refer to the “dsPIC30F Family ReferenceManual” (DS70046).
This section describes the 16-bit General Purpose
Timer1 module and associated operational modes.
Figure 8-1 depicts the simplified block diagram of the
16-bit Timer1 Module.
Note:Timer1 is a ‘Type A’ timer. Please refer to
the specifications for a Type A timer in
Section 21.0 “Electrical Characteristics” of this document.
The following sec tions provid e a detailed description of
the operational modes of the timers, including setup
and control registers along with associated block
diagrams.
The Timer1 module is a 16-bit timer which can serve as
the time counter fo r the rea l-time clo ck, o r operate as a
free running interval timer/coun ter . The 16-bit timer ha s
the following modes:
• 16-bit Timer
• 16-bit Synchronous Counter
• 16-bit Asynchronous Counter
Further, the following operational characteristics are
supported:
• Timer gate operation
• Selectable prescaler settings
• Timer operation during CPU Idle and Sleep
modes
• Interrupt on 16-bit period regi ster match or falling
edge of external gate signal
These operating mode s are determined by s etting the
appropriate bit(s) in the 16-bit SFR, T1CON. Figure 8-1
presents a block diagram of the 16-bit timer module.
16-bit Timer Mode: In t he 16-bi t T imer m ode, the timer
increments on every instruction cycle up to a match
value, preloaded into the period register PR1, then
resets to 0 and continues to count.
When the CPU goes into the Idle mode, the timer will
stop incrementing, unless the TSIDL (T1CON<13>)
bit = 0. If TSIDL = 1, the timer module logic will resume
the incrementing sequence upon termination of the
CPU Idle mode.
16-bit Synchronous Counter Mode: In the 16-bit
Synchronous Counter mode, the timer increments on
the rising edge of the applied external clock signal,
which is synchronized with the internal phase clocks.
The timer counts up to a match value preloade d in PR1,
then resets to 0 and continues.
When the CPU goes into the Idle mode, the timer will
stop incrementing, unless the respective TSIDL bit = 0.
If TSIDL = 1, the timer module logic will resume the
incrementing sequence upon termination of the CPU
Idle mode.
16-bit Asynchronous Counter Mode: In the 16-bit
Asynchronous Counter mode, the timer increments on
every rising edge of the applied external clock signal.
The timer counts up to a match value preloade d in PR1,
then resets to ‘0’ and continues.
When the timer is co nfigured for the As ynchronous mod e
of operation and the CPU goes into the Idle mode, the
timer will stop incrementing if TSIDL = 1.
FIGURE 8-1:16-BIT TIMER1 MODULE BLOCK DIAGRAM (TYPE A TIMER)
PR1
Equal
T1IF
Event Flag
T1CK
0
1
TGATE
Reset
Comparator x 16
TMR1
QDCKTGATE
Q
TCS
1 X
TSYNC
1
0
TGATE
TON
Sync
TCKPS<1:0>
2
8.1Timer Gate Operation
The 16-bit timer can be pl aced in the Ga ted Ti me Accumulation mo de. This mode allow s the internal T
CY to
increment the respectiv e timer when the ga te input signal (T1CK pin) is asserted high. Control bit TGATE
(T1CON<6>) must be set to enable this mode. The
timer must be enabled (TON = 1) and the timer clock
source set to internal (TCS = 0).
When the CPU goes into the Idle mode, the timer will
stop incrementing, unless TSIDL = 0. If TSIDL = 1, the
timer will resume the incrementing sequence upon
termination of the CPU Idle mode.
8.2Timer Prescaler
The input clock (FOSC/2 or external clock) to the 16-bit
Timer, has a prescale option of 1:1, 1:8, 1:64, and
1:256 selected by control bits TCKPS<1:0>
(T1CON<5:4>). The pres ca le r co unter is cleared when
any of the following occurs:
• a write to the TMR1 register
• clearing of the TON bit (T1CON<15>)
• device Reset such as POR
However, if the timer is disabled (TON = 0), then the
timer prescaler cannot be reset since the prescaler
clock is halt ed.
TMR1 is not cleared when T1CON is written. It is
cleared by writing to the TMR1 register.
Gate
Sync
T
CY
Prescaler
0 1
0 0
1, 8, 64, 256
8.3Timer Operation During Sleep
Mode
During CPU Sleep mode, the timer will operate if:
• The timer module is enabled (TON = 1) and
• The timer clock source is selected as external
(TCS = 1) and
• The TSYNC bit (T1CON<2>) is as serted to a logic
‘0’, which defines the external clock source as
asynchronous
When all three conditions are true, the timer will
continue to count up to th e perio d regis ter and be res et
to 0x0000.
When a match between the timer and the period register occurs, an interrupt can be generated, if the
respective timer interrupt enable bit is asserted.
The 16-bit timer has the ability to ge nera t e an in terru pt
on period mat ch. When the timer count matches the
period register , th e T1IF bit is asse rted and an in terrupt
will be generated, if enabled. The T1IF bit must be
cleared in software. The timer interrupt flag T1IF is
located in the IFS0 control register in the Interrupt
Controller.
When the Gated Time Accumulation mode is enabled,
an interrupt will also be gen erated on the f alling edge of
the gate signal (at the end of the accumulation cycle).
Enabling an interrupt is accomplished via the respective timer interrupt enable bit, T1IE. The timer interrupt
enable bit is located in the IEC0 control register in the
Interrupt Controller.
Note: This data sheet summarizes features of this g roup
of dsPIC30F devices and is not intended to be a complete
reference source. For more information on the CPU,
peripherals, register descriptions and general device
functionality, refer to the “dsPIC30F Family ReferenceManual” (DS70046).
This section describes the 32-bit General Purpose
Timer module (Timer2/3) and associated operational
modes. Figure 9-1 depicts the simplifie d block diagra m
of the 32-bit Ti mer2/3 module. Fig ure 9-2 and Figure 93 show Timer2/3 configured as two independent 16-bit
timers: Timer2 and Timer3, respectively.
Note:The dsPIC30F1010 device does not fea-
ture Timer3. T imer2 is a ‘T y pe B’ timer an d
Timer3 is a ‘Type C’ timer. Please refer to
the appropriate timer typ e i n Section21.0“Electrical Characteristics” of this
document.
The Timer2/3 modul e is a 32-bit timer, which can be
configured as two 16-bit tim ers, with s elect abl e operating modes. These timers are utilized by other
peripheral modules such as:
• Input Capture
• Output Compare/Simpl e PWM
The following sections provide a detailed description,
including setup and control registers, along with associated block diagrams for the ope rati ona l mod es of the
timers.
The 32-bit timer has the following modes:
• Two independent 16-bit timers (Timer2 and
Timer3) with all 16-bit operat ing modes (except
Asynchronous Counter mode)
• Single 32-bit Timer operation
• Single 32-bit Synchronous Counter
Further, the following operational characteristics are
supported:
• ADC Event Trigger
• Timer Gate Operation
• Selectable Prescaler Settings
• Timer Operation during Idle and Sleep modes
• Interrupt on a 32-bit Period Register Match
These operating modes are determined by setting the
appropriate bit(s) in the 16-bit T2CON and T3CON
SFRs.
For 32-bit timer/counter operation, Timer2 is the least
significant word and Tim er3 is the mos t significant w ord
of the 32-bit timer.
Note:For 32-bit timer operation, T3CON control
bits are ignored. Only T2CON control bits
are used for setup and control. Timer 2
clock and gate inputs are utilized for the
32-bit timer module, but an interrupt is
generated with the Timer3 interrupt flag
(T3IF) and the interrupt is en abled with the
Timer3 interrupt enable bit (T3IE).
16-bit Mode: In the 16-bit mode, Timer2 and Timer3
can be configured as two independent 16-bit timers.
Each timer can be set up in ei ther 16-bit Timer mode or
16-bit Synchronous Counter mode. See Section 8.0“Timer1 Module” for details on these two operating
modes.
The only functional difference between Timer2 and
Timer3 is that Timer2 provides synchronization of the
clock prescaler output . This is useful for high-fre quency
external clock inputs.
32-bit Timer Mode: In t he 32-bi t T imer m ode, the timer
increments on every instruction cycle up to a match
value, preloaded int o the combi ned 32-bi t period register PR3/PR2, then resets to ‘0’ and continues to count.
For synchronous 32-bit reads of the Timer2/Timer3
pair, reading the least significant word (TMR2 register)
will cause the most significant word to be read and
latched into a 16-bit holding register, termed
TMR3HLD.
For synchronous 32-bit writes, the holding register
(TMR3HLD) must first be written to. When followed by
a write to the TMR2 regi ster, the contents of TMR3HLD
will be transferred and latched into the MSB of the
32-bit timer (TMR3).
32-bit Synchronous Counter Mode: In the 32-bit
Synchronous Counter mode, the timer increments on
the rising edge of the applied external clock signal,
which is synchronized with the internal phase clocks.
The timer counts up to a match value preloaded in the
combined 32 -bi t per i od re gi st er, PR3/PR 2 , th en re se ts
to ‘0’ and continues.
When the timer is configured for the Synchronous
Counter mode of operation and the CPU goes into the
Idle mode, the timer will stop incrementing, unless the
TSIDL (T2CON<13>) bit = 0. If TSIDL = 1, the timer
module logic will resume the increm enting sequence
upon termination of the CPU Idle mode.
The 32-bit timer can be pl aced in the Ga ted Ti me Accumulation mo de. This mode allow s the internal T
increment the respectiv e timer when the ga te input signal (T2CK pin) is asserted high. Control bit TGATE
(T2CON<6>) must be set to en able this mode . When in
this mode, Timer2 is the originating clock source. The
TGA TE setting is ignored for T imer3. The timer must b e
enabled (TON = 1) and the timer cl ock source set to
internal (TCS = 0).
The falling edge of the external signal terminates the
count operation, but does not res et the time r. The user
must reset the timer in ord er to start count ing from zero.
CY to
9.2ADC Event Trigger
When a match occurs between th e 32-bit timer (TMR 3/
TMR2) and the 32-bit combined period register (PR3/
PR2), a special ADC trigger event signal is generated
by Timer3.
9.3Timer Prescaler
The input cloc k (FOSC/2 or external clock) to the timer
has a prescale option of 1:1, 1:8, 1:64, and 1:256
selected by control bits TCKPS<1:0> (T2CON<5:4>
and T3CON<5:4>). For the 32-bit timer operation, the
originating clock source is Timer2. The prescale r operation for Timer3 is not applicable in this mode. The
prescaler counter is cleared when any of the following
occurs:
• a write to the TMR2/TMR3 register
• clearing either of the TON (T2CON<15> or
T3CON<15>) bits to ‘0’
• device Reset such as POR
However, if the timer is disabled (TON = 0), then the
Timer 2 prescaler cannot be reset, since the prescaler
clock is halt ed.
TMR2/TMR3 is not cleared when T2CON/T3CON is
written.
9.4Timer Operation During Sleep
Mode
During CPU Sleep mode, the timer will not operate,
because the internal clocks are disabled.
9.5Timer Interrupt
The 32-bit timer module can generate an interrupt on
period match, or on the fa lling edge of the external gate
signal. When the 32-bit timer count matches the
respective 32-bit period register, or the falling edge of
the external “gate” signal is detected, the T3IF bit
(IFS0<7>) is asserted a nd an interru pt will be gene rated if enabled. In this mode, the T3IF interrupt flag is
used as the source of the interrupt. The T3IF bit must
be cleared in software.
Enabling an interrupt is accomplished via the
respective timer interrupt enable bit, T3IE (IEC0<7>).
The key operational features of the Input Capture
module are:
Note: This data sheet summarizes features of this g roup
of dsPIC30F devices and is not intended to be a complete
reference source. For more information on the CPU,
peripherals, register descriptions and general device
functionality, refer to the “dsPIC30F Family ReferenceManual” (DS70046).
This section describes the Input Capture module and
associated operational modes. The features provided
by this module are useful in applications requiring Frequency (Period) and Pulse measurement. Figure 10-1
• Simple Capture Event mode
• Timer2 and Timer3 mode selection
• Interrupt on input capture event
These operating modes are determined by setting the
appropriate bits in the ICxCON register (where x =
1,2,...,N). The dsPIC DSC devices contain up to 8
capture channels, (i.e., the maximum value of N is 8).
Note:The dsPIC30F1010 devices does not fea-
depicts a block diagram of the Input Capture module.
Input capture is useful for such modes as:
• Frequency/Period/Pulse Measurements
• Additional sources of External Interrupts
FIGURE 10-1:INPUT CAPTURE MODE BLOCK DIAGRAM
From General Purpose Timer Module
ICx
Pin
Prescaler
1, 4, 16
3
Synchronizer
ICM<2:0>
Mode Select
ICBNE, ICOV
ICxCON
Clock
ICI<1:0>
Edge
Detection
Logic
Interrupt
Logic
ture a Input Capture module. The
dsPIC30F202X devices have one capture
input – IC1. The naming of this capture
channel is intentional and preserves software compatibility with other dsPIC DSC
devices.
T2_CNT
FIFO
R/W
Logic
T3_CNT
1616
10
ICxBUF
ICTMR
Set Flag
Data Bus
Set Flag
ICxIF
ICxIF
Note:Where ‘ x’ i s sh ow n, re fere nce is made to the reg is ters o r bits associated to the respe cti ve i npu t
The simple capture events in the dsPIC30F product
family are:
• Capture every falling edge
• Capture every rising edge
• Capture every 4th rising edge
• Capture every 16th rising edge
• Capture every rising and falling edge
These simple Input Capture modes are configured by
setting the appropriate bits ICM<2:0> (ICxCON<2:0>).
10.1.1CAPTURE PRESCALER
There are four input capture prescaler settings, specified by bits ICM<2:0> (ICxCON<2:0>). Whenever the
capture channel is turn ed of f, the pr esc aler coun ter will
be cleared. In addition, any Reset will clear the
prescaler counter.
10.1.2CAPTURE BUFFER OPERATION
Each capture channel has an associated FIFO buffer,
which is four 16-bit words deep. There are two status
flags, which provide status on the FIFO buffer:
• ICBFNE – Input Capture Buffer Not Empty
• ICOV – Input Capture Overflow
The ICBFNE will be set on the first input capture event
and remain set until all capture events have been read
from the FIFO. As each word is read fro m the FIFO, the
remaining words are advanced by one position within
the buffer.
In the event that the FIFO is full with four capture
events and a fifth capture event occurs prior to a read
of the FIFO, an Overflow condition will occur and the
ICOV bit will be set to a lo gic ‘1’. The fifth capture event
is lost and is not stored in the FIFO. No additional
events will be captured until all four events have been
read from the buffer.
If a FIFO read is performed after the last read and no
new capture event has been received, the read will
yield indet erminate re sults.
10.1.3TIMER2 AND TIMER3 SELECTION
MODE
The input capture modu le c onsis ts of up to 8 input capture channels. Each ch annel can select between one of
two timers for the time base, Timer2 or Timer3.
Selection of the timer resource is accomplished
through SFR bit ICTMR (ICxCON<7>). Timer3 is the
default timer resource available for the input capture
module.
10.1.4HALL SENSOR MODE
When the input capture module is set for capture on
every edge, rising and fal ling, ICM <2:0> = 001, the fol-
lowing operations are performed by the input capture
logic:
• The input capture interrupt flag is set on every
edge, rising and falling.
• The Interrupt on Capture mode setting bits,
ICI<1:0>, are ignored, since every capture
generates an interrupt.
• A Capture Overflow con dition is not generated in