MIPS Assembly

Posted on 2013-01-14
Last Modified: 2013-02-17
How Can I print 2 more string on this code:

la $a0, hello_msg
        li $v0, 4

Why I cannot do it like this: !!! Loading the address into 3 differant addresses and then Calling the print_string()??? Please explain clearly....

la $a0, hello_msg1
la $a1, hello_msg2
la $a2, hello_msg3

        li $v0, 4
Question by:pauledwardian
  • 3
  • 2
LVL 25

Assisted Solution

by:Kyle Hamilton
Kyle Hamilton earned 500 total points
ID: 38786926
im not an expert by any means, but assembly doesnt have highlevel functions like print_string(). are you writing this in C and compiling to assembly?

i probably cant help you, but i hope you dont mind if i tag along on this question.
LVL 82

Expert Comment

ID: 38787132
Because print_string accept only one argument in $a0 and not in $a1, $a2
LVL 25

Assisted Solution

by:Kyle Hamilton
Kyle Hamilton earned 500 total points
ID: 38787856
haha, I thought you were referring to an an actual MIPS microprocessor. But you're talking about a language called MIPS, which by the way, is not assembly, but more like C.

How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

LVL 82

Expert Comment

ID: 38787875

Did you never call an OS function with assembly? ;-)
LVL 25

Accepted Solution

Kyle Hamilton earned 500 total points
ID: 38788113
no... that's why I was confused, and wanted to see the outcome of this question.

I did a little assembly using just a small instruction set on the PIC16 microcontroller to make an LED matrix display some messages, but that's the extent of my experience - doh! :)


Author Closing Comment

ID: 38900357

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
word0 challenge 4 52
Copy Files - Python 7 54
What is Python programming? 3 64
recursion example 16 68
This is about my first experience with programming Arduino.
In this post we will learn how to connect and configure Android Device (Smartphone etc.) with Android Studio. After that we will run a simple Hello World Program.
This tutorial will introduce the viewer to VisualVM for the Java platform application. This video explains an example program and covers the Overview, Monitor, and Heap Dump tabs.
The viewer will be introduced to the technique of using vectors in C++. The video will cover how to define a vector, store values in the vector and retrieve data from the values stored in the vector.

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now