Pic 12F629
Pic 12F629
PIC12F629/675
• PIC12F675
GP5/T1CK/OSC1/ GP0/CIN+/
CLKIN 2 7 ICSPDAT
GP4/T1G/OSC2/ GP1/CIN-/VREF/
1.0 PROGRAMMING THE CLKOUT 3 6 ICSPCLK
PIC12F629/675 GP3/MCLR/VPP 4 5
GP2/COUT/
T0CK/INT
The PIC12F629/675 is programmed using a serial
method. The Serial mode will allow the PIC12F629/675
to be programmed while in the user’s system. This FIGURE 1-2: Pin Diagram
allows for increased design flexibility. This
SSOP
programming specification applies to PIC12F629/675
devices in all packages.
VDD •1 20 VSS
rfPIC12F675F/H/K
GP5/T1CKI/OSC1/CLKIN 2 19 GP0/CIN+/ICSPDAT
1.1 Hardware Requirements GP4/T1G/OSC2/CLKOUT 3 18 GP1/CIN-/ICSPCLK
GP3/MCLR/VPP 4 17 GP2/T0CKI/INT/COUT
RFXTAL 5 16 FSKOUT
The PIC12F629/675 requires one power supply for RFEN 6 15 DATAFSK
VDD (5.0V) and one for VPP (12V). CLKOUT 7 14 DATAASK
PS 8 13 LF
VDDRF 9 12 VSSRF
1.2 Programming Mode VSSRF 10 11 ANT
Implemented
03FE
03FF 03FF
OSCCAL Implemented
400
Maps to
0 - 3FF
1FFF
2000 ID Location
2000
Implemented
2001 2008
ID Location Reserved
201F
2002
ID Location
2003
ID Location
2004
Reserved
Maps to
2000 - 201F
2005
Reserved
2006
Reserved
2007
Configuration Word 3FFF
1 2 3 4 5 6 Tdly2 1 2 3 4 5 15 16
GP1
CLOCK
1 2 3 4 5 6 Tdly2 1 2 3 4 5 15 16
GP1
CLOCK
Tdly2
1 2 3 4 5 6 1 2 3 4 5 15 16
GP1
CLOCK Tdly3
GP0 1 1 0 0 X X strt_bit stp_bit
DATA LSb MSb
Tdly1
Tdly2
1 2 3 4 5 6 1 2 3 4 5 15 16
GP1
CLOCK Tdly3
GP0 1 0 0 1 0 X X strt_bit stp_bit
DATA LSb MSb
Tset1 Tdly1
Thld1
Tdly2
1 2 3 4 5 6 1 2 3 4 5 15 16
GP1
CLOCK Tdly3
GP0 1 0 1 0 X X strt_bit stp_bit
DATA LSb MSb
Tset1 Tdly1
Thld1
Tdly2
Next Command
1 2 3 4 5 6 1 2
GP1
CLOCK
0 1 1 0 X X X 0
GP0
DATA Tset1 Tdly1
Thld1
Tprog1
Next Command
1 2 3 4 5 6 1 2
GP1
CLOCK
GP0 0 0 0 1 0 0 X 0
DATA
Tset1 Tdly1
Thld1
ICSPDAT
0 1 0 1 0 0 X 0
tdly1
tset1
1 µs min.
thld1
}
100 ns min.
Tera
Next Command
1 2 3 4 5 6 1 2
GP1
CLOCK
GP0 1 0 0 1 X X X 0
DATA
Tset1 Tset1 Tdly1
Thld1 Thld1
Tera
Next Command
1 2 3 4 5 6 1 2
GP1
CLOCK
GP0 1 1 0 1 X X X 0
DATA
Tset1 Tdly1
Thld1
Start
Bulk Erase
Device
PROGRAM CYCLE
Load Data
Program Cycle
for
Program Memory
Read Data
from Begin Begin
Program Memory Programming Programming
Command Command
(Internally timed) (Externally timed)
Report
No
Data Correct? Programming
Failure
Increment
No All Locations
Address
Done?
Command End
Programming
Program
OSCCAL
Program Data
Memory
(if required)
Verify all
Locations
No Report Verify
Data Correct? Error
Yes
Program
Bandgap Cal.
and Config bits
Done
Start
Load
Configuration
Data
Program Cycle
Read Data
Command
No Report
Data Correct? Programming
Failure
Yes
Increment
Address
Command
Increment
No Address = Yes
Address
0x2004?
Command
Increment
Address
Command
Increment
Address
Command
Program
Cycle
(config. word)
Read Data
Command
Report
No
Data Correct? Programming
Failure
Yes
Done
Start
PROGRAM CYCLE
Load Data
Program Cycle for
Program Memory
Report
No
Data Correct? Programming Wait Tprog1 Wait Tprog2
Failure
Yes
End
Increment No Programming
All Locations
Address
Done?
Command
Yes
Done
Start
Program
OSCCAL
Program
Band Gap Cal
Bits
Done
Legend:
R = Readable bit W = Writable bit U = Unimplemented bit, read as ‘0’
-n = Value at POR 1 = bit is set 0 = bit is cleared x = bit is unknown
Device ID Value
Device
Dev Rev
PIC16F629 00 1111 100 x xxxx
PIC16F675 00 1111 110 x xxxx
• Microchip believes that its family of products is one of the most secure families of its kind on the market today, when used in the
intended manner and under normal conditions.
• There are dishonest and possibly illegal methods used to breach the code protection feature. All of these methods, to our
knowledge, require using the Microchip products in a manner outside the operating specifications contained in Microchip's Data
Sheets. Most likely, the person doing so is engaged in theft of intellectual property.
• Microchip is willing to work with the customer who is concerned about the integrity of their code.
• Neither Microchip nor any other semiconductor manufacturer can guarantee the security of their code. Code protection does not
mean that we are guaranteeing the product as “unbreakable.”
Code protection is constantly evolving. We at Microchip are committed to continuously improving the code protection features of our
products. Attempts to break microchip’s code protection feature may be a violation of the Digital Millennium Copyright Act. If such acts
allow unauthorized access to your software or other copyrighted work, you may have a right to sue for relief under that Act.
03/25/03