Computing Compass
Computing Compass
  • Видео 11
  • Просмотров 8 603
How functions and expressions are evaluated
Timestamps:
00:00 What is a memory stack?
00:44 What is a stack pointer in computer memory?
01:22 What is a stack frame in computer memory?
01:44 What are the main components of a stack frame?
02:04 Understanding the Frame Pointer in Memory
02:42 Types of Frame Pointers in Memory Management
02:52 Understanding the old frame pointer in memory
03:28 Why is the location of the old frame pointer called the base of the stack frame even though it is not the first element to be pushed on the stack frame
04:03 The current frame pointer in computer memory
04:51 How a memory stack process function calls
07:46 What are infix and postfix notations
08:09 Converting Infix to Postfix Using a Stack
08:17 Visual Guide...
Просмотров: 129

Видео

Assemblers linkers and loaders
Просмотров 3,6 тыс.2 месяца назад
FAIR USE COPYRIGHT NOTICE: The Copyright Laws of the United States recognizes a “fair use” of copyrighted content. The videos and this RUclips channel in general may contain certain copyrighted works that were not specifically authorized to be used by the copyright holder(s), but which we believe in good faith are protected by federal law and the fair use doctrine for purposes such as criticism...
Addressing modes explained
Просмотров 1,4 тыс.2 месяца назад
FAIR USE COPYRIGHT NOTICE: The Copyright Laws of the United States recognizes a “fair use” of copyrighted content. The videos and this RUclips channel in general may contain certain copyrighted works that were not specifically authorized to be used by the copyright holder(s), but which we believe in good faith are protected by federal law and the fair use doctrine for purposes such as criticism...
Characteristics of machine instructions
Просмотров 2462 месяца назад
FAIR USE COPYRIGHT NOTICE: The Copyright Laws of the United States recognizes a “fair use” of copyrighted content. The videos and this RUclips channel in general may contain certain copyrighted works that were not specifically authorized to be used by the copyright holder(s), but which we believe in good faith are protected by federal law and the fair use doctrine for purposes such as criticism...
Basic computing concepts
Просмотров 2917 месяцев назад
0:00 Calculator model of a computer 01:31 Main components of a computer 02:50 Two types of control unit 03:13 Difference between Core and CPU 04:02 Registers 05:20 Cache memory 05:43 Different types of cache memory (L1,L2.L3) 06:09 Different types of instructions 07:01 Instruction format 07:19 Three address format 07:46 Two address format 08:08 Addressing mode 08:55 How binary numbers are displ...
Register spilling and register window
Просмотров 1249 месяцев назад
FAIR USE COPYRIGHT NOTICE: The Copyright Laws of the United States recognizes a “fair use” of copyrighted content. The videos and this RUclips channel in general may contain certain copyrighted works that were not specifically authorized to be used by the copyright holder(s), but which we believe in good faith are protected by federal law and the fair use doctrine for purposes such as criticism...
Big endian and little endian assignment
Просмотров 8910 месяцев назад
FAIR USE COPYRIGHT NOTICE: The Copyright Laws of the United States recognizes a “fair use” of copyrighted content. The videos and this RUclips channel in general may contain certain copyrighted works that were not specifically authorized to be used by the copyright holder(s), but which we believe in good faith are protected by federal law and the fair use doctrine for purposes such as criticism...
Integer representation in computers
Просмотров 12810 месяцев назад
FAIR USE COPYRIGHT NOTICE: The Copyright Laws of the United States recognizes a “fair use” of copyrighted content. The videos and this RUclips channel in general may contain certain copyrighted works that were not specifically authorized to be used by the copyright holder(s), but which we believe in good faith are protected by federal law and the fair use doctrine for purposes such as criticism...
Decoding Memory: Word vs. Byte Addressable Explained
Просмотров 2,5 тыс.Год назад
Decoding Memory: Word vs. Byte Addressable Explained

Комментарии

  • @glennmorrissey5309
    @glennmorrissey5309 11 дней назад

    Short, concise, easy to understand and to follow. Well done. I'm glad to see that you used C as the higher level language in the example provided.

  • @rty1955
    @rty1955 14 дней назад

    Intel makes things unnecessarily complicated. IBM mainframes are SOOO much easier and have been since the 60s. IBM Mainframes dont need a silly stack pointer. totally unnecessary

  • @soulweaver8552
    @soulweaver8552 22 дня назад

    fantastic video

  • @drivetrainerYT
    @drivetrainerYT 28 дней назад

    Perfect delivery, tone, iterations. Please keep being this crystal clear and structured. Many thanks!

  • @maxmuster7003
    @maxmuster7003 2 месяца назад

    mov eax, [ebx+esi*4+64] ; using the Data Segment DS by default, SEGMENT:OFFSET = address

  • @maxmuster7003
    @maxmuster7003 2 месяца назад

    Good work.

  • @maxmuster7003
    @maxmuster7003 2 месяца назад

    To prevent confusion, i prever to speak hexadecimal values digit by digit and not like decimal values, because hex is not based on ten. Else we have to say e-thousand b-hundred f-ty f for ebff and this sounds badly wrong. So 80h is not eighty h, but eight zero h.

  • @maxmuster7003
    @maxmuster7003 2 месяца назад

    All instructions of the syscall are not visible and hidden, so we don’t know how the string is going to the screen. Personaly i like to write directly into the screen memory without using a syscall.

  • @maxmuster7003
    @maxmuster7003 2 месяца назад

    I am not familar with the C programming language. If somebody try to explain assembly with C commands i can’t understand it.😂

  • @maxmuster7003
    @maxmuster7003 2 месяца назад

    I like to use batch files as open source container for x86 assembly to create a new executable file with a little help from Debug. Debug use the instruction to build the mashine code without a linker. Most of these container batch files have to start with one or more hexadecimal or "string" parameter(%1 %2 %3) attached (separeted with a space between) to build and to modify the routine inside, but without that the executable have to convert/combining the ASCII digits of the parameter into values. This part do Debug. Batch files(script files) are the only one executable files that have no problems with copy&paste. All other executable can’t be copy&paste, because not all bytes of a mashine code are visible as an ASCII character. Batch files let you see the source code, but not an executable of mashine code. Batch files with x86 are for tiny executable only usefull. Debug don’t provide jump labels, so we have to use the addresses for memory access and jump instructions.

    • @ArneChristianRosenfeldt
      @ArneChristianRosenfeldt Месяц назад

      I once lived a happy life on Commodore computers and PCs . Binary files were not a problem in the slightest. Then the internet reached us. 7bit ASCII and all those ugly text formats inspired by printer protocols. Can’t even attach a jpeg to an Email without jumping through hoops. And we had byte code language like Java, but then came JavaScript, ugh.

  • @ohasis8331
    @ohasis8331 2 месяца назад

    A very annoying and insanely droning monotone from your ai narrator.

  • @nyanayayansh6464
    @nyanayayansh6464 3 месяца назад

    Thank e