HP Z600 Intel Chipset - how to find revision

Posted on 2012-09-21
Last Modified: 2012-09-21
I have a HP Z600 (KK549ET/ABU) and wish to add a single 8GB REGISTERED DIMM as memory.
The Kingston site says this machine requires C2 revision of Intel 5520 chipset.

My question is, how can I tell which revision this motherboard has installed as when I install the DIMM in the socket (CPU0, DIMM1 socket), I get 5 beeps and red light which seems to indicate a problem with the memory - presumably if the C2 revision is not installed, the memory will be rejected.

Question by:brothertom
    LVL 87

    Expert Comment

    SIW might be able to give you further details on the chipset if you are running windows on the PC:
    LVL 62

    Accepted Solution

    Check the BIOS Boot Block date in the System Setup menu
    Compare with the date list here to determine if you have B3 or C2
    LVL 14

    Expert Comment

    by:Rob Miners
    You can also download the Intel® Chipset Identification Utility, select your Operating System and download the appropriate Utilty

    Author Closing Comment

    Many thanks for your quick response and correctly identified document.  I was obviously searching in the wrong place - thanks again :)

    Author Comment

    Thanks rrjmin0 also.
    LVL 14

    Expert Comment

    by:Rob Miners
    Your welcome :)

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Free Trending Threat Insights Every Day

    Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

    The Rasberry PI is a low cost piece of hardware that you can have a lot of fun with through experimenting and building/working on projects like media players, running a low cost computer, build data loggers etc. - see:
    This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
    It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
    Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    11 Experts available now in Live!

    Get 1:1 Help Now