
TXZ Family
Flash Memory
2018-06-05 3 / 120 Rev. 2.0
3.3.5. Memory Swap............................................................................................................................................................. 49
4. Details of Flash Memory ............................................................................................................................. 51
Functions.......................................................................................................................................................... 51
4.1.1. Operation Mode of the Flash Memory ........................................................................................................................ 52
4.1.2. Command Execution .................................................................................................................................................. 52
4.1.3. Command Description ................................................................................................................................................ 54
4.1.3.1. Automatic Programming ................................................................................................................................................ 54
4.1.3.2. Automatic chip erasing .................................................................................................................................................. 55
4.1.3.3. Automatic Area Erasing ................................................................................................................................................. 55
4.1.3.4. Automatic Block Erasing ............................................................................................................................................... 56
4.1.3.5. Automatic Page Erasing ................................................................................................................................................ 56
4.1.3.6. Automatic Protect Bit Programming............................................................................................................................... 56
4.1.3.7. Automatic Protect Bit Erasing ........................................................................................................................................ 57
4.1.3.8. Automatic Security Bit Programming ............................................................................................................................. 57
4.1.3.9. Automatic Security Bit Erasing ...................................................................................................................................... 58
4.1.3.10. ID-Read ....................................................................................................................................................................... 58
4.1.3.11. Read/Reset Command ................................................................................................................................................ 59
4.1.3.12. Automatic Memory Swap ............................................................................................................................................ 59
4.1.3.13. Automatic Memory Swap Erasing ............................................................................................................................... 59
4.1.4. Stopping Automatic Chip Erasing ............................................................................................................................... 60
4.1.5. Completion Detection of the Automatic Operation ...................................................................................................... 60
4.1.5.1. Procedure ..................................................................................................................................................................... 60
4.1.6. Protection Function ..................................................................................................................................................... 61
4.1.6.1. How to Set the Protection Function ............................................................................................................................... 61
4.1.6.2. Protection Release ........................................................................................................................................................ 61
4.1.6.3. Protection Temporary Release Function ....................................................................................................................... 61
4.1.7. Security Function ........................................................................................................................................................ 62
4.1.7.1. Security Setting ............................................................................................................................................................. 62
4.1.7.2. Security Setting Release ............................................................................................................................................... 62
4.1.7.3. Operation ...................................................................................................................................................................... 62
4.1.8. Memory Swap Function .............................................................................................................................................. 63
4.1.8.1. Memory Swap Setting ................................................................................................................................................... 63
4.1.8.2. Memory Swap Operation ............................................................................................................................................... 63
4.1.8.3. Erasing the Memory Swap Information .......................................................................................................................... 64
4.1.9. User Information Area ................................................................................................................................................ 65
4.1.9.1. Switching Procedure of the User Information Area ........................................................................................................ 65
4.1.9.2. Data programming Method for the User Information Area ............................................................................................. 65
4.1.9.3. Data Erasing Method for the User Information Area ...................................................................................................... 65
5. Registers ..................................................................................................................................................... 66
Register List ..................................................................................................................................................... 66
Detail of Register ............................................................................................................................................. 67
5.2.1. [FCSBMR] (Flash Security Bit Mask Register) ........................................................................................................... 67
5.2.2. [FCSSR] (Flash Security Status Register) .................................................................................................................. 67
5.2.3. [FCKCR] (Flash Key Code Register) .......................................................................................................................... 67
5.2.4. [FCSR0] (Flash Status Register 0) ............................................................................................................................. 68