Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
GP5/T1CKI/OSC1/CLKIN 2 7 GP0/CIN+/ICSPDAT
GP4/T1G/OSC2/CLKOUT 3 6 GP1/CIN-/ICSPCLK
GP3/MCLR/VPP 4 5 GP2/T0CKI/INT/COUT
VDD 1 8 VSS
PIC12F675
GP5/T1CKI/OSC1/CLKIN 2 7 GP0/AN0/CIN+/ICSPDAT
GP4/AN3/T1G/OSC2/CLKOUT 3 6 GP1/AN1/CIN-/VREF/ICSPCLK
GP3/MCLR/VPP 4 5 GP2/AN2/T0CKI/INT/COUT
DFN, DFN-S
VDD 1 8 VSS
GP5/TICKI/OSC1/CLKIN 2 7 GP0/CIN+/ICSPDAT
PIC12F629
GP4/TIG/OSC2/CLKOUT 3 6 GP1/CIN-/ICSPCLK
GP3/MCLR/VDD 4 5 GP2/T0CKI/INT/COUT
VDD 1 8 VSS
GP5/TICKI/OSC1/CLKIN 2 7 GP0/AN0/CIN+/ICSPDAT
PIC12F675
GP4/AN4/TIG/OSC2/CLKOUT 3 6 GP1/AN1/CIN-/ICSPCLK
GP3/MCLR/VDD 4 5 GP2/AN2/T0CKI/INT/COUT
VDD 1 14 VSS
RA5/T1CKI/OSC1/CLKIN 2 13 RA0/CIN+/ICSPDAT
PIC16F630
RA4/T1G/OSC2/CLKOUT 3 12 RA1/CIN-/ICSPCLK
RA3/MCLR/VPP 4 11 RA2/COUT/T0CKI/INT
RC5 5 10 RC0
RC4 6 9 RC1
RC3 7 8 RC2
VDD 1 14 VSS
RA5/T1CKI/OSC1/CLKIN 2 13 RA0/AN0/CIN+/ICSPDAT
PIC16F676
RA4/T1G/OSC2/AN3/CLKOUT 3 12 RA1/AN1/CIN-/VREF/ICSPCLK
RA3/MCLR/VPP 4 11 RA2/AN2/COUT/T0CKI/INT
RC5 5 10 RC0/AN4
RC4 6 9 RC1/AN5
RC3/AN7 7 8 RC2/AN6
QFN
VDD
VSS
NC
NC
16
15
14
13
RA5/T1CKI/OSC1/CLKIN 1 12 RA0/C1IN+/ICSPDAT
RA4/T1G/OSC2/CLKOUT 2 11 RA1/CIN-/VREF/ICSPCLK
PIC16F630
RA3/MCLR/VPP 3 10 RA2/COUT/T0CKI/INT
RC5 4 9 RC0
5
6
7
8
RC4
RC3
RC2
RC1
VDD
VSS
NC
NC
16
15
14
13
RA5/T1CKI/OSC1/CLKIN 1 12 RA0/AN0/C1IN+/ICSPDAT
RA4/T1G/OSC2/CLKOUT 2 11 RA1/AN1/CIN-/VREF/ICSPCLK
PIC16F676
RA3/MCLR/VPP 3 10 RA2/AN2/COUT/T0CKI/INT
RC5 4 9 RC0/AN4
5
6
7
8
RC4
RC3/AN7
RC2/AN6
RC1/AN5
SSOP
VDD 1 20 VSS
GP5/T1CKI/OSC1/CLKIN 2 19 GP0/CIN+/ICSPDAT
GP4/T1G/OSC2/CLKOUT 3 18 GP1/CIN-/ICSPCLK
rfPIC12F675F/H/K
GP3/MCLR/VPP 4 17 GP2/T0CKI/INT/COUT
RFXTAL 5 16 FSKOUT
RFEN 6 15 DATAFSK
CLKOUT 7 14 DATAASK
PS 8 13 LF
VDDRF 9 12 VSSRF
VSSRF 10 11 ANT
Implemented
03FE
03FF 03FF Implemented
OSCCAL
400
Maps to
0-3FF
2000 1FFF
ID Location 2000
Implemented
2001 2008
ID Location Reserved
201F
2002
ID Location
2003
ID Location
Maps to
2004
Reserved 2000-201F
2005
Reserved
2006
Reserved
3FFF
2007
Configuration Word
TDLY2
1 2 3 4 5 6 1 2 3 4 5 15 16
GP1(1)
CLOCK
GP0(1) 0 00 0 0 strt_bit
x x LSb MSb stp_bit
DATA
TDLY1 TSET1
THLD1
Note 1: GP0 and GP1 apply to PIC12F629/675 only. For PIC16F630/676, use RA0 and RA1, respectively.
TDLY2
1 2 3 4 5 6 1 2 3 4 5 15 16
GP1(1)
CLOCK
GP0(1) 01 0 0 strt_bit
0 x x LSb MSb stp_bit
DATA
TSET1 TDLY1 TSET1
THLD1 THLD1
Note 1: GP0 and GP1 apply to PIC12F629/675 only. For PIC16F630/676, use RA0 and RA1, respectively.
TDLY2
1 2 3 4 5 6 1 2 3 4 5 15 16
GP1(1)
CLOCK
TDLY3
GP0(1) x
1 1 0 0 x strt_bit
DATA stp_bit
LSb MSb
TDLY1
Note 1: GP0 and GP1 apply to PIC12F629/675 only. For PIC16F630/676, use RA0 and RA1, respectively.
2.3.1.4 Read Data From Program Memory If the program memory is code-protected (CP = 0), the
data is read as zeros.
After receiving this command, the chip will transmit
data bits out of the program memory (user or
configuration) currently accessed, starting with the
second rising edge of the clock input. The data pin will
go into Output mode on the second rising clock edge
and revert to Input mode (high-impedance) after the
16th rising edge.
TDLY2
1 2 3 4 5 6 1 2 3 4 5 15 16
GP1(1)
CLOCK
TDLY3
GP0(1)
DATA 0 0 1 0 x x strt_bit stp_bit
LSb MSb
TSET1
THLD1 TDLY1
Note 1: GP0 and GP1 apply to PIC12F629/675 only. For PIC16F630/676, use RA0 and RA1, respectively.
TDLY2
1 2 3 4 5 6 1 2 3 4 5 15 16
GP1(1)
CLOCK
TDLY3
GP0(1)
1 0 1 0 x x
DATA strt_bit stp_bit
LSb MSb
TSET1
THLD1 TDLY1
Note 1: GP0 and GP1 apply to PIC12F629/675 only. For PIC16F630/676, use RA0 and RA1, respectively.
GP0(1)
0 1 1 0 x x x 0
DATA
TSET1
THLD1 TDLY1
Note 1: GP0 and GP1 apply to PIC12F629/675 only. For PIC16F630/676, use RA0 and RA1, respectively.
TPROG1
Next Command
1 2 3 4 5 6 1 2
GP1(1)
CLOCK
GP0(1) 0 0 0 1 0 0 x 0
DATA
TSET1 TDLY1
THLD1
Note 1: GP0 and GP1 apply to PIC12F629/675 only. For PIC16F630/676, use RA0 and RA1, respectively.
VIHH
MCLR TPROG2
End Programming command
1 2 3 4 5 6 1 2
ICSPCLK
ICSPDAT 0 0 0 1 1 0 x 0
TSET1 TDLY1
THLD1 1 s min.
}
100 ns min.
VIHH
MCLR
Next Command
1 2 3 4 5 6 1 2
ICSPCLK
ICSPDAT 0 1 0 1 0 0 x 0
TDLY1
TSET1
THLD1
1 s min.
}
100 ns min.
TERA
Next Command
1 2 3 4 5 6 1 2
GP1(1)
CLOCK
GP0(1) 1 0 0 1 x x x 0
DATA
TSET1 TSET1 TDLY1
THLD1 THLD1
Note 1: GP0 and GP1 apply to PIC12F629/675 only. For PIC16F630/676, use RA0 and RA1, respectively.
TERA
Next Command
1 2 3 4 5 6 1 2
GP1(1)
CLOCK
GP0(1) 1 1 0 1 x x x 0
DATA
TSET1
THLD1 TDLY1
Note 1: GP0 and GP1 apply to PIC12F629/675 only. For PIC16F630/676, use RA0 and RA1, respectively.
Start
Yes
Read and Save
Band Gap Cal. Program Cycle
Value
Load Data
for
Bulk Erase Program Memory
Device
Begin Begin
Programming Programming
Program Cycle Command Command
(Internally timed) (Externally timed)
Read Data
from Wait TPROG1 Wait TPROG2
Program Memory
Report
No End
Data Correct? Programming
Programming
Failure
Yes
No Increment
All Locations Address
Done? Command
Program Data
Program Verify all
Memory
OSCCAL Locations
(if required)
No Report Verify
Data Correct? Error
Yes
Program
Band Gap Cal.
and Config. bits
Done
Start
Load
Configuration
Data
Program Cycle
Read Data
Command
No Report
Data Correct? Programming
Failure
Yes
Increment
Address
Command
Increment
Address
Command
Increment
Address
Command
Program
Cycle
(Config. Word)
Read Data
Command
No Report
Data Correct? Programming
Failure
Yes
Done
Start
Program Cycle
Load Data
Program Cycle for
Program Memory
No Report
Data Correct? Programming Wait TPROG1 Wait TPROG2
Failure
Yes
End
Increment No Programming
Address All Locations
Command Done?
Yes
Done
Start
No Report OSCCAL
RETLW Instruction
Correct? Instruction Error
Yes
Program
OSCCAL
Program
Band Gap Cal.
Bits
Done
Legend:
R = Readable bit W = Writable bit U = Unimplemented bit, read as 0
-n = Value at POR 1 = Bit is set 0 = Bit is cleared x = Bit is unknown
Microchip believes that its family of products is one of the most secure families of its kind on the market today, when used in the
intended manner and under normal conditions.
There are dishonest and possibly illegal methods used to breach the code protection feature. All of these methods, to our
knowledge, require using the Microchip products in a manner outside the operating specifications contained in Microchips Data
Sheets. Most likely, the person doing so is engaged in theft of intellectual property.
Microchip is willing to work with the customer who is concerned about the integrity of their code.
Neither Microchip nor any other semiconductor manufacturer can guarantee the security of their code. Code protection does not
mean that we are guaranteeing the product as unbreakable.
Code protection is constantly evolving. We at Microchip are committed to continuously improving the code protection features of our
products. Attempts to break Microchips code protection feature may be a violation of the Digital Millennium Copyright Act. If such acts
allow unauthorized access to your software or other copyrighted work, you may have a right to sue for relief under that Act.
08/24/05