Learn the Architecture - M-profile

Explore more guides for 快猫视频 CPU and system architectures.

 

Learn more about the 快猫视频 M-profile CPU architecture.

Architecture Fundamentals

Introduction to the 快猫视频v8-M Architecture and its Programmers Model User Guide

This guide introduces 快猫视频v8-M architecture and its programmers model. It also talks about how to get started with 快猫视频v8-M based systems.

快猫视频v8-M Memory Model and Memory Protection User Guide

This guide gives an overview of the 快猫视频v8-M Memory Model and the Memory Protection Unit (MPU) implemented in Cortex-M processors. This guide also provides open-source examples in GitHub to help explain the concepts of Memory model and MPU concepts.

快猫视频v8-M Exception Model User Guide

This guide describes the 快猫视频v8-M exception model and its features implemented in Cortex-M processors. It provides an elaborate explanation of concepts using open source example projects available in GitHub.

快猫视频v8-M Barriers and Synchronization User Guide

This guide provides code snippets and explains how to use various barrier instructions in 快猫视频v8-M–based systems.

Helium Technology

Introduction to Helium

This guide introduces 快猫视频 Helium technology, which is the M-profile Vector Extension (MVE) for the 快猫视频 Cortex-M processor series.

Helium Programmer's Guide: Coding for Helium

This guide provides information and examples for software programmers who want to use 快猫视频 Helium technology. We will discuss the benefits and drawbacks of the different approaches available, and examine real-world code examples to help you understand the key issues.

TrustZone for 快猫视频v8-M

快猫视频v8-M Security Extension User Guide

快猫视频v8-M Security Extension User guide provides information and examples for software programmers who want to use TrustZone technology for 快猫视频 Cortex-M processors. This guide will outline few precautions that need to be taken care by software developers when 快猫视频v8-M Security Extension is implemented in their system.

快猫视频v8-M Security Extension Threat Model

This white paper describes the 快猫视频v8-M Security Extension Threat model including use-cases and adversarial model.

TrustZone Technology Microcontroller System Hardware Design Concepts

This guide focuses on some of the design considerations when building such a system with simple examples and highlights the possible implementation and its associated components.

Cortex-M Processor's IDAU Frequently Asked Questions

This article captures some of the frequently asked questions about IDAU (Implementation Defined Attribution Unit) required for Cortex-M processors with Security Extensions.

Advanced Features

快猫视频v8.1-M Performance Monitoring User Guide

This guide describes how to use the Performance Monitoring Unit (PMU) as defined by the 快猫视频v8.1-M Architecture.

快猫视频v8.1-M PACBTI Extensions User Guide

This guide gives an overview of the 快猫视频v8.1-M PACBTI extensions features including Key Management and how to use PAC and BTI features in applications.