Content for Reverse Engineering

The Group Decode ROM: The 8086 processor’s first step of instruction decoding

“A key component of any processor is instruction decoding: analyzing a numeric opcode and figuring out what actions need to be taken. The Intel 8086 processor (1978) has a complex instruction set, making instruction decoding a challenge. The first step …

Reverse-engineering the division microcode in the Intel 8086 processor

“While programmers today take division for granted, most microprocessors in the 1970s could only add and subtract — division required a slow and tedious loop implemented in assembly code. One of the nice features of the Intel 8086 processor (1978) was …

The microcode and hardware in the 8086 processor that perform string operations

“Intel introduced the 8086 microprocessor in 1978. This processor ended up being hugely influential, setting the path for the x86 architecture that is extensively used today. One interesting feature of the 8086 was instructions that can efficiently operate on blocks …

Reverse-engineering the register codes for the 8086 processor’s microcode

“Like most processors, the Intel 8086 (1978) provides registers that are faster than main memory. As well as the registers that are visible to the programmer, the 8086 has a handful of internal registers that are hidden from the user …

How the 8086 processor determines the length of an instruction

“The Intel 8086 processor (1978) has a complicated instruction set with instructions ranging from one to six bytes long. This raises the question of how the processor knows the length of an instruction.1 The answer is that the 8086 …

Reverse-engineering the ModR/M addressing microcode in the Intel 8086 processor

“One interesting aspect of a computer’s instruction set is its addressing modes, how the computer determines the address for a memory access. The Intel 8086 (1978) used the ModR/M byte, a special byte following the opcode, to select …

Reverse-engineering the interrupt circuitry in the Intel 8086 processor

“Interrupts have been an important part of computers since the mid-1950s,1 providing a mechanism to interrupt a program’s execution. Interrupts allows the computer to handle time-critical tasks such as I/O device operations. In this blog post, I …

Silicon reverse-engineering: the Intel 8086 processor’s flag circuitry

“Status flags are a key part of most processors, indicating if an arithmetic result is negative, zero, or has a carry, for instance. In this post, I take a close look at the flag circuitry in the Intel 8086 processor …

Understanding the x86’s Decimal Adjust after Addition (DAA) instruction

“I’ve been looking at the DAA machine instruction on x86 processors, a special instruction for binary-coded decimal arithmetic. Intel’s manuals document each instruction in detail, but the DAA description doesn’t make much sense. I ran an extensive …

Reverse-engineering the conditional jump circuitry in the 8086 processor

“Intel introduced the 8086 microprocessor in 1978 and it had a huge influence on computing. I’m reverse-engineering the 8086 by examining the circuitry on its silicon die and in this blog post I take a look at how conditional …