M58LT256JST, M58LT256JSB
Command interface
4.14
Set Configuration Register command
The Set Configuration Register command writes a new value to the Configuration Register.
Two bus write cycles are required to issue the Set Configuration Register command.
●
●
The first cycle sets up the Set Configuration Register command and the address
corresponding to the Configuration Register content.
The second cycle writes the Configuration Register data and the confirm command.
The Configuration Register data must be written as an address during the bus write cycles,
that is A0 = CR0, A1 = CR1, …, A15 = CR15. Addresses A16-A23 are ignored.
Read operations output the array content after the Set Configuration Register command is
issued.
The Read Electronic Signature command is required to read the updated contents of the
Configuration Register.
4.15
Block Protect command
The Block Protect command protects a block and prevents program or erase operations
from changing the data in it. All blocks are protected after power-up or reset.
Two bus write cycles are required to issue the Block Protect command.
●
●
The first bus cycle sets up the Block Protect command.
The second bus write cycle latches the block address and protects the block.
Once the command has been issued, subsequent bus read operations read the Status
Register.
The protection status can be monitored for each block using the Read Electronic Signature
command.
Refer to
for a detailed explanation. See
for a flowchart for using the Block
Protect command.
4.16
Block Unprotect command
The Block Unprotect command unprotects a block, allowing the block to be programmed or
erased.
Two bus write cycles are required to issue the Block Unprotect command.
●
●
The first bus cycle sets up the Block Unprotect command.
The second bus write cycle latches the block address and unprotects the block.
Once the command has been issued, subsequent bus read operations read the Status
Register.
The protection status can be monitored for each block using the Read Electronic Signature
command. Refer to
for a detailed explanation and
for a flowchart for using
the Block Unprotect command.
29/108