Logo

MMIXware: A RISC Computer for the Third Millennium

Large book cover: MMIXware: A RISC Computer for the Third Millennium

MMIXware: A RISC Computer for the Third Millennium
by

Publisher: Springer
ISBN/ASIN: 3540669388
ISBN-13: 9783540669388
Number of pages: 550

Description:
MMIX is a RISC computer designed by Donald Knuth to illustrate machine-level aspects of programming. This book constitutes a collection of programs written in CWEB that make MMIX a virtual reality. Among other utilities, an assembler converting MMIX symbolic files to MMIX objects and two simulators executing the programs in given object files are provided. The latest version of all programs can be downloaded from MMIX's home page. The book provides a complete documentation of the MMIX computer and its assembly language.

Home page url

Download or read it online for free here:
Download link
(multiple PDF files)

Similar books

Book cover: The Art of Assembly LanguageThe Art of Assembly Language
by - No Starch Press
Presents assembly language from the high-level point of view, so you can start writing meaningful programs within days. This is the most-often recommended book on 80x86 assembly language programming in newsgroups, on web sites, and by word of mouth.
(10386 views)
Book cover: Assemblers And LoadersAssemblers And Loaders
by - Prentice Hal
Comprehensive book on the design of assemblers and loaders. It covers one and two-pass assemblers, absolute and relocatable object files, multiple location counters, local labels, macros, conditional assembly, listing file, disassemblers, and loaders.
(10898 views)
Book cover: The Power PC Compiler Writer's GuideThe Power PC Compiler Writer's Guide
by - Warthman Associates
This book describes the code patterns that perform well on PowerPC processors. The book will be particularly helpful to compiler developers and application-code specialists who are already familiar with optimizing compiler technology.
(9960 views)
Book cover: BIOS Disassembly Ninjutsu UncoveredBIOS Disassembly Ninjutsu Uncovered
by - A-List Publishing
Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs.
(3953 views)