Re: RISC/CISC Hack Architecture

Posted by yhirshhorn on
URL: http://nand2tetris-questions-and-answers-forum.52.s1.nabble.com/RISC-CISC-Hack-Architecture-tp4034432p4036655.html

I see. I was referring to the HACK ISA's c-command, meaning commands with an op-code of 1xx instead of 0xx. For example:
ADM=D-M;JLT
 Is a legal command (even if it is not encouraged to store and branch at the same time).
But even a more common command:
M=M+D
Does loading (from memory), computing and storing (in memory) at the same time, which is - if I read correctly, a violation of both first requirements.