Logo

MMIXware: A RISC Computer for the Third Millennium

Large book cover: MMIXware: A RISC Computer for the Third Millennium

MMIXware: A RISC Computer for the Third Millennium
by

Publisher: Springer
ISBN/ASIN: 3540669388
ISBN-13: 9783540669388
Number of pages: 550

Description:
MMIX is a RISC computer designed by Donald Knuth to illustrate machine-level aspects of programming. This book constitutes a collection of programs written in CWEB that make MMIX a virtual reality. Among other utilities, an assembler converting MMIX symbolic files to MMIX objects and two simulators executing the programs in given object files are provided. The latest version of all programs can be downloaded from MMIX's home page. The book provides a complete documentation of the MMIX computer and its assembly language.

Home page url

Download or read it online for free here:
Download link
(multiple PDF files)

Similar books

Book cover: Zen of Assembly Language: Volume I, KnowledgeZen of Assembly Language: Volume I, Knowledge
by - jagregory.com
This book unlocks the secrets of writing superb assembly-language code. It assumes that you're already familiar with assembly language, acquainted with the registers and instructions of the 8088, and with the use of one of the popular PC assemblers.
(10162 views)
Book cover: x86 Disassemblyx86 Disassembly
- Wikibooks
This book is about the disassembly of x86 machine code into human-readable assembly, and the decompilation of x86 assembly code into human-readable C or C++ source code. Some topics covered will be common to all computer architectures.
(20921 views)
Book cover: The Second Book of Machine LanguageThe Second Book of Machine Language
by - Compute! Publications
This book offers the reader both a detailed description of the LADS assembler and an efficient tool, a complete language with which to write other machine language programs. Every line in the program is described, all the subroutines are explained.
(23488 views)
Book cover: BIOS Disassembly Ninjutsu UncoveredBIOS Disassembly Ninjutsu Uncovered
by - A-List Publishing
Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs.
(16500 views)