Solved

8086 Assembly : Memcpy procedure for 80188 embedded system

Posted on 2003-10-30
3
943 Views
Last Modified: 2012-06-27
Hi

I need to write a "memcpy" procedure in assembly for an embedded system running on an 80188 microprocessor. Memcpy() copies n bytes from memory area s2 to s1 and returns s1. It is called in C code as follows:

void *memcpy(void *s1, const void *s2, size_t n)

I am very new to assembly programming and is hoping for some advice how this can be done. Btw, is there a compiler which translate C code into assembly?

Any advice is very much appreciated. Thank you.

Regards
Wilson
0
Comment
Question by:Wtwh
3 Comments
 
LVL 11

Accepted Solution

by:
dimitry earned 50 total points
ID: 9650933
Any C-compiler should have an option to produce Asm-output.

void memcpy(void far *s1, const void far *s2, size_t n)

_memcpy proc      near
      push      bp
      mov      bp,sp
      push      si
      push      di
      push      ds

      mov      cx, [bp+12]
      lds      si, [bp+8]
      les      di, [bp+4]

      rep      movsb

      pop      ds
      pop      di
      pop      si
      pop      bp
      ret
_memcpy endp
0
 
LVL 2

Expert Comment

by:MrT-RSI
ID: 9659291
To speed things up you might wanna replace movsb with movsw, especially for larger data blocks:

mov cx,[bp+12]
lds si,[bp+8]
les di,[bp+4]

shr cx,1   ;divide by 2
jnc cxeven
  movsb   ;move 1 byte if odd
cxeven:
rep movsw   ;move rest of bytes in words

Or was the 80188 the 16 bit processor with the 8 bit mem access ? then stick with the original.
0
 
LVL 22

Expert Comment

by:grg99
ID: 9665740

You'd better do a "cld" beforehand!

0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
push(rx) in Beta 21 379
Lowlevel details of a C program 2 489
Return (ret) value over-writing on x64 8 664
query on RISC/CISC binary on single hardware 5 544
In 2017, ransomware will become so virulent and widespread that if you aren’t a victim yourself, you will know someone who is.
Knowledge base software has turned out to be a quite reliable method for storing information, promoting collaborative work and for sharing valuable input and solutions.However, some organizations are trying to develop a knowledge base that works wit…
With the power of JIRA, there's an unlimited number of ways you can customize it, use it and benefit from it. With that in mind, there's bound to be things that I wasn't able to cover in this course. With this summary we'll look at some places to go…
Many functions in Excel can make decisions. The most simple of these is the IF function: it returns a value depending on whether a condition you describe is true or false. Once you get the hang of using the IF function, you will find it easier to us…

861 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now