欢迎访问ic37.com |
会员登录 免费注册
发布采购

PEEL22LV10AZP-25 参数 Datasheet PDF下载

PEEL22LV10AZP-25图片预览
型号: PEEL22LV10AZP-25
PDF下载: 下载PDF文件 查看货源
内容描述: CMOS可编程电可擦除逻辑器件 [CMOS Programmable Electrically Erasable Logic Device]
分类和应用: 可编程逻辑器件光电二极管输入元件时钟
文件页数/大小: 10 页 / 683 K
品牌: ANACHIP [ ANACHIP CORP ]
 浏览型号PEEL22LV10AZP-25的Datasheet PDF文件第2页浏览型号PEEL22LV10AZP-25的Datasheet PDF文件第3页浏览型号PEEL22LV10AZP-25的Datasheet PDF文件第4页浏览型号PEEL22LV10AZP-25的Datasheet PDF文件第5页浏览型号PEEL22LV10AZP-25的Datasheet PDF文件第7页浏览型号PEEL22LV10AZP-25的Datasheet PDF文件第8页浏览型号PEEL22LV10AZP-25的Datasheet PDF文件第9页浏览型号PEEL22LV10AZP-25的Datasheet PDF文件第10页  
Schmitt Trigger Inputs
The PEEL™22LV10AZ has Schmitt trigger input buffers on all
inputs, including the clock. Schmitt trigger inputs allow direct
input of slow signals such as biomedical and sine waves or
clocks. They are also useful in cleaning up noisy signals. This
makes the PEEL™22LV10AZ especially desirable in portable
applications where the environment is less predictable.
Programming Support
Anachip’s JEDEC file translator allows easy conversion of exist-
ing 24 pin PLD designs to the PEEL™22LV10AZ, without the
need for redesign. Anachip also offers (for free) its proprietary
WinPLACE software, an easy-to-use entry level PC-based soft-
ware development system.
Programming support includes all the popular third party pro-
grammers such as BP Microsystems, System General, Logical
Devices, and numerous others.
Design Security
The PEEL™22LV10AZ provides a special EEPROM security bit
that prevents unauthorized reading or copying of designs pro-
grammed into the device. The security bit is set by the PLD pro-
grammer, either at the conclusion of the programming cycle or as a
separate step, after the device has been programmed. Once the
security bit is set it is impossible to verify (read) or program the
PEEL™ until the entire device has first been erased with the
bulk-erase function.
Signature Word
The signature word feature allows a 64-bit code to be pro-
grammed into the PEEL™22LV10AZ if the PEEL™22LV10AZ+
software option is used. The code can be read back even after the
security bit has been set. The signature word can be used to iden-
tify the pattern programmed into the device or to record the
design revision, etc.
Anachip Corp.
www.anachip.com.tw
6/10
Rev. 1.0 Dec 16, 2004