16位伪指令汇编程序查看内存

来源:互联网 发布:网络恐吓怎么解决 编辑:程序博客网 时间:2024/05/29 04:34

【实验内容】

用16位指令编写完整程序,实现下列数据定义语句和相关指令,在debug下查看内存数据的定义情况,单步跟踪查看各寄存器的值。

题目:

ORG 0

ARRAY LABEL BYTE

DA1 DW 2,9,14,3,315H,-6

DA2 DB 7,‘ABCDEDFG’

LEN = $-DA2

ORG 100H

DA3 DW DA4

DA4 DB 4 DUP(2 DUP(1,2,3),4)

…………

MOV AL,ARRAY+2 (AL)=( )H

ADD AL,DA2+1 (AL)=( )H

MOV AX,DA2-DA1 (AX)=( )H

MOV BL,LEN (BL)=( )H

MOV AX, DA3 (AX)=( )H

MOV BX, TYPE DA4 (BX)=( )H

MOV BX, OFFSET DA4 (BX)=( )H

MOV CX, SIZE DA4 (CX)=( )H

MOV DX, LENGTH DA4 (DX)=( )H

MOV BX, WORD PTR DA4 (BX)=( )H

MOV BL, LEN AND 0FH (BL)=( )H

MOV BL, LEN GT 5 (BL)=( )H

MOV AX, LEN MOD 5 (AX)=( )H

填后的答案:

MOV AL,ARRAY+2 (AL)=( 09 )H

ADD AL,DA2+1 (AL)=( 41 )H

MOV AX,DA2-DA1 (AX)=( 000c )H

MOV BL,LEN (BL)=( 09 )H

MOV AX, DA3 (AX)=( 0102 )H

MOV BX, TYPE DA4 (BX)=( 0001 )H

MOV BX, OFFSET DA4 (BX)=( 0102 )H

MOV CX, SIZE DA4 (CX)=( 0004 )H

MOV DX, LENGTH DA4 (DX)=( 0004 )H

MOV BX, WORD PTR DA4 (BX)=( 0201 )H

MOV BL, LEN AND 0FH (BL)=( 09 )H

MOV BL, LEN GT 5 (BL)=( ff )H

MOV AX, LEN MOD 5 (AX)=( 0004 )H

具体代码:

DATA SEGMENT    ORG 0    ARRAY LABEL BYTE    DA1 DW 2,9,14,3,315H,-6    DA2 DB 7,'ABCDEDFG'    LEN = $-DA2    ORG 100H    DA3 DW DA4    DA4 DB 4 DUP(2 DUP(1,2,3),4);1 2 3 1 2 3 4   *4timesDATA ENDSCODE SEGMENTASSUME CS:CODE,DS:DATASTART:MOV AX,DATAMOV DX,AXMOV AL,ARRAY+2;MOV AL,[0002]ADD AL,DA2+1;MOV AL,[000D]MOV AX,DA2-DA1;MOV AX,000C;DA1的长度MOV BL,LEN;MOV BL,09;DA2的长度MOV AX,DA3;MOV AX,[0100]MOV BX,TYPE DA4;MOV BX,0001MOV BX,OFFSET DA4;MOV BX,0102MOV CX,SIZE DA4;MOV CX,0004MOV DX,LENGTH DA4;MOV DX,0004MOV BX,WORD PTR DA4;MOV BX,[0102]MOV BL,LEN AND 0FH;MOV BL,09MOV BL,LEN GT 5;MOV BL,FFMOV AX,LEN MOD 5;MOV AX,0004MOV AH,4CHINT 21HCODE ENDSEND START
原创粉丝点击