Solved

How to clear hyperterminal screen in 8051 assembly programming

Posted on 2004-10-08
2
2,980 Views
Last Modified: 2010-10-05
Hi,

Currently I am doing 8051 assembly project which need me to make some selection on hyperterminal screen. I am facing a problem to clear current screen when I am suppose to display another screen on a 'cleaned' display.
How shall I clear the hyperterminal screen by assembly code?
Please help me.
0
Comment
Question by:jessicalim
2 Comments
 
LVL 12

Expert Comment

by:Gary Dewrell
Comment Utility
Hi jessicalim,

Here is a good basic PHP Mysql tutorial to get you started.   http://www.devdreams.com/phptutorials_displayingdatainamysqldatabase.php

God Bless
0
 
LVL 22

Accepted Solution

by:
grg99 earned 125 total points
Comment Utility
First you have to figure out what screen-clear code Hyperterminal uses.  It's probably the semi-standard ANSI control code, but better to check first.

Here's a few of the most common ANSI control codes.  "ESC" means the ESC character code, decimal 27.

ESC[#;#H - Cursor Position (CUP)
    The first # specifies the line number, the second # specifies the column. The default for both is 1

ESC[#A - Cursor Up (CUU)
    Moves the cursor UP # number of lines

ESC[#B - Cursor Down (CUD)
    Moves the cursor DOWN # number of lines

ESC[#C - Cursor Forward (CUF)
    Moves the cursor RIGHT # number of columns

ESC[#D - Cursor Backward (CUB)
    Moves the cursor LEFT # number of columns

ESC[#;#f - Horizontal & Vertical Position
    (same as ESC[#;#H)

ESC[s - Save Cursor Position (SCP)
    The current cursor position is saved. The cursor position can be restored using (RCP) ESC[u.

ESC[u - Restore cursor position (RCP)
    Restores the cursor position saved with the (SCP) sequence ESC[s.

ESC[2J - Erase Display (ED)
    Clears the screen and moves to the home position

ESC[K - Erase Line (EL)
    Clears the current line from the cursor position

0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Convert from C to MIPS 14 1,334
Assemlby_ARM 3 504
0 terminated? 2 316
Assembly Language 5 380
HOW TO: Upload an ISO image to a VMware datastore for use with VMware vSphere Hypervisor 6.5 (ESXi 6.5) using the vSphere Host Client, and checking its MD5 checksum signature is correct.  It's a good idea to compare checksums, because many installat…
Scam emails are a huge burden for many businesses. Spotting one is not always easy. Follow our tips to identify if an email you receive is a scam.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now