The RISC-V Architecture
The RISC-V Architecture
An introduction to the open source 32-bit and 64-bit RISC-V architecture, instruction set, and extensions
Join the DZone community and get the full member experience.Join For Free
This article introduces the exciting, relatively new RISC-V (pronounced risk five) processor architecture and its instruction set. RISC-V is a completely open source specification for a reduced instruction set processor. A complete user-mode (non-privileged) instruction set specification has been released and several inexpensive hardware implementations of this architecture are currently available.
Work is ongoing to develop specifications for a number of instruction set extensions to support general-purpose computing, high-performance computing, and embedded applications that require minimal code size. Commercially available processors implement many of these developmental extensions.
RISC-V Architecture and Features
The RISC-V architecture, publicly announced in 2014, was developed at the University of California at Berkeley by Yunsup Lee, Krste Asanović, David A. Patterson, and Andrew Waterman. This effort followed four previous major RISC architectural design projects at UC Berkeley, leading to the name RISC-V, where V represents the Roman numeral five.
The RISC-V project began as a clean sheet with these major goals:
- Design a RISC instruction set architecture (ISA) suitable for use in a wide variety of applications, spanning the spectrum from micro-power embedded devices to high-performance cloud server multiprocessors.
- Provide an ISA that is free to use by anyone for any application. This contrasts with the ISAs of almost all other commercially available processors, which are the carefully guarded intellectual property of the company that designed them.
- Incorporate lessons learned from previous decades of processor design, avoiding wrong turns and suboptimal features that other architectures must retain in newer generations to maintain compatibility with previous, sometimes ancient in technological terms, generations.
- Provide a small but complete base ISA suitable for use in embedded devices. The base ISA is the minimal set of capabilities any RISC-V processor must implement. The base RISC-V is a 32-bit processor architecture with 31 general-purpose registers. All instructions are 32 bits long. The base ISA supports integer addition and subtraction, but does not include integer multiplication and division. This is to avoid forcing minimal processor implementations to include the fairly expensive multiplication and division hardware for applications that do not require those operations.
- Provide optional ISA extensions to support floating-point mathematics, atomic memory operations, and multiplication and division.
- Provide additional ISA extensions to support privileged execution modes, similar to the x86, x64, and ARM privileged architectures.
- Support a compressed instruction set, implementing 16-bit versions of many 32-bit instructions. In processors implementing this extension, 16-bit instructions may be freely interspersed with 32-bit instructions.
- Provide optional ISA extensions to support 64-bit, and even 128-bit, processor word sizes using paged virtual memory on single- and multi-core processors, and in multiprocessing configurations.
RISC-V processors are available today at competitive prices and, given the sophistication of the ISA design and the advantages of its free-to-use nature, we can expect the use of RISC-V processors to grow rapidly in the coming years. RISC-V Linux distributions are available, including all the software development tools needed to build and run applications on RISC-V-based computers and smart devices.
This RISC-V base ISA register set is presented in the following figure.
RISC-V base ISA register set
The registers are 32 bits wide. General-purpose registers
x31 are available for use without any restrictions or special functions assigned by the processor hardware. Register
x0 is hardwired to return zero when it is read, and will discard any value written to it. We will see some interesting uses of register
Each register has one or two alternate names as shown in the figure. These names correspond to the usage of registers in the standard RISC-V application binary interface (ABI). Because registers
x31 are functionally interchangeable, it is necessary for the ABI to dictate which register should serve as the stack pointer, which registers should contain arguments to functions, which should contain return values, and so forth. The meanings of the register designations are:
ra: Function return address.
sp: Stack pointer.
gp: Global data pointer.
tp: Thread-local data pointer.
t6: Temporary storage.
fp: Frame pointer for function-local stack data (this usage is optional).
s11: Saved registers (if the frame pointer is not in use,
a7: Arguments passed to functions. Any additional arguments are passed on the stack. Function return values are passed in
pc register contains the 32-bit program counter, holding the address of the current instruction.
You may be surprised to learn there is no processor flags register in the RISC-V ISA. Some operations that modify flags in other processor architectures instead store their results in a RISC-V register. For example, the signed (
slt) and unsigned (
sltu) RISC-V comparison instructions subtract two operands and set a destination register to 0 or 1 depending on the sign of the result. A subsequent conditional branch instruction uses the value in that register to determine which code path to take.
Some of the flags found in other processors must be computed in RISC-V. For example, there is no carry flag. To determine if an addition resulted in a carry, it is necessary to perform a comparison between the sum and one of the operands of the addition instruction. If the sum is greater than or equal to the addend (either addend can be used for the comparison), a carry did not occur; otherwise the addition produced a carry.
Most of the base ISA computational instructions use a three-operand format, in which the first operand is the destination register, the second operand is a source register, and the third operand is either a second source register or an immediate value. This is an example three-operand instruction:
add x1, x2, x3
This instruction adds register
x3 and stores the result in register
To avoid introducing instructions that are not strictly necessary, many instructions take on extra duties that are performed by dedicated instructions in other processor architectures. For example, RISC-V has no instruction that simply moves one register to another. Instead, a RISC-V addition instruction adds a source register and an immediate value of zero and stores the result in a destination register, producing the same result. The instruction to transfer register
x1 is therefore
add x1, x2, 0, assigning the value (
x2 + 0) to
RISC-V assembly language provides a number of pseudo-instructions using terminology likely to be more familiar to assembly language programmers. The assembler translates the pseudo-instruction
mv x1, x2 to a literal
add x1, x2, 0. We will discuss pseudo-instructions in more detail later.
RISC-V Base Instruction Set
The base RISC-V instruction set is composed of just 47 instructions. Eight are system instructions that perform system calls and access performance counters. The remaining 39 instructions fall into the categories of computational instructions, control flow instructions, and memory access instructions. We will examine each of these categories in turn.
All the computational instructions except
auipc use the three-operand form. The first operand is the destination register, the second is a source register, and the third is either a second source register or an immediate value. Instruction mnemonics using an immediate value (except for
auipc) end with the letter
sub: Perform addition and subtraction. The immediate value in the
addiinstruction is a 12-bit signed value. The
subinstruction subtracts the second source operand from the first. There is no
addican add a negative immediate value.
srai: Perform logical left and right shifts (
srl), and arithmetic right shifts (
sra). Logical shifts insert zero bits into vacated locations. Arithmetic right shifts replicate the sign bit into vacated locations. The number of bit positions to shift is taken from the lowest 5 bits of the second source register or from the 5-bit immediate value.
xori: Perform the indicated bitwise operation on the two source operands. Immediate operands are 12 bits.
sltui: The set if less than instructions set the destination register to 1 if the first source operand is less than the second source operand: This comparison is in terms of two’s complement (
slt) or unsigned (
sltu) operands. Immediate operand values are 12 bits.
lui: Load upper immediate. This instruction loads bits 12-31 of the destination register with a 20-bit immediate value. Setting a register to an arbitrary 32-bit immediate value requires two instructions: First,
luisets bits 12-31 to the upper 20 bits of the value. Then
addiadds in the lower 12 bits to form the complete 32-bit result.
luihas two operands: the destination register and the immediate value.
auipc: Add upper immediate to PC. This instruction adds a 20-bit immediate value to the upper 20 bits of the program counter. This instruction enables PC-relative addressing in RISC-V. To form a complete 32-bit PC-relative address,
auipcforms a partial result, then an
addiinstruction adds in the lower 12 bits.
Control Flow Instructions
The conditional branching instructions perform comparisons between two registers and, based on the result, may transfer control within the range of a signed 12-bit address offset from the current PC. Two unconditional jump instructions are available, one of which (
jalr) provides access to the entire 32-bit address range.
bgeu: Branch if equal (
beq), not equal (
bne), less than (
blt), less than unsigned (
bltu), greater or equal (
bge), or greater or equal, unsigned (
bgeu). These instructions perform the designated comparison between two registers and, if the condition is satisfied, transfer control to the address offset provided in the 12-bit signed immediate value.
jal: Jump and link. Transfer control to the PC-relative address provided in the 20-bit signed immediate value and store the address of the next instruction (the return address) in the destination register.
jalr: Jump and link, register. Compute the target address as the sum of the source register and a signed 12- bit immediate value, then jump to that address and store the address of the next instruction in the destination register. When preceded by the
jalrinstruction can perform a PC-relative jump anywhere in the 32-bit address space.
Memory Access Instructions
The memory access instructions transfer data between a register and a memory location. The first operand is the register to be loaded or stored. The second is a register containing a memory address. A signed 12-bit immediate value is added to the address in the register to produce the final address for the load or store.
The load instructions perform sign extension for signed values or zero extension for unsigned values. The sign or zero extension operation fills in all 32 bits in the destination register when a smaller data value (a byte or halfword) is loaded. Unsigned loads are specified by a trailing u in the mnemonic.
lw: Load an 8-bit byte (
lb), a 16-bit halfword (
lh) or 32-bit word (
lw) into the destination register. For byte and halfword loads, the instruction will either sign-extend (
lh) or zero-extend (
lhu) to fill the 32-bit destination register. For example, the instruction
lw x1, 16(x2)loads the word at the address (
x2+ 16) into register
sw: Store a byte (
sb), halfword (
sh) or word (
sw) to a memory location matching the size of the data value.
fence: Enforce memory access ordering in a multithreaded context. This instruction ensures a coherent view of cached data across threads.
fencetakes two operands: the first specifies the types of memory accesses that must complete prior to the fence instruction. The second specifies the types of memory accesses controlled following the fence. The operation types ordered by this instruction are memory reads and writes (
w) and I/O device inputs and outputs (
o). For example, the instruction
fence rw, rwwill guarantee that all loads and stores involving memory addresses occurring before the fence instruction will complete before any subsequent memory loads or stores take place. This instruction ensures that any values present in processor caches are properly synchronized with memory or the I/O device.
fence.i: This instruction ensures that any stores to instruction memory have completed before the
fence.iinstruction completes. This instruction is primarily useful in the context of self-modifying code.
Of the eight system instructions, one invokes a system call, one initiates a debugger breakpoint, and the remaining six read and write system control and status registers (CSRs). The CSR manipulation instructions read the current value of the selected CSR into a register, then update the CSR by either writing a new value, clearing selected bits, or setting selected bits. The source value for the CSR modification is provided in a register or as an immediate 5-bit value. CSRs are identified by a 12-bit address. Each CSR instruction performs the read and write of the CSR as an atomic operation.
ecall: Invoke a system call. Registers used for passing parameters into and returning from the call are defined by the ABI, not by processor hardware.
break: Initiate a debugger breakpoint.
csrrsi: Read the specified CSR into a destination register and either write a source operand value to the register (
csrrw), clear any 1 bit in the source operand in the register (
csrrc), or set any 1 bit in the source operand in the register (
csrrs). These instructions take three operands: The first is the destination register receiving the value read from the CSR, the second is the CSR address, and the third is a source register or a 5-bit immediate value (
Six CSRs are defined in the base RISC-V architecture, all read-only. To execute any of the CSR access instructions in a read-only mode, register
x0 must be provided as the third operand. These registers define three 64-bit performance counters:
cycleh: The lower (
cycle) and upper (
cycleh) 32 bits of the 64-bit count of elapsed system clock cycles since a reference time, typically system startup. The frequency of the system clock may vary if dynamic voltage and frequency scaling (DVFS) is active.
timeh: These are the lower (
time) and upper (
timeh) 32 bits of the 64-bit count of elapsed real-time clock cycles since a reference time, typically system startup.
instreth: The lower (
instret) and upper (
instreth) 32 bits of the 64-bit count of processor instructions retired.
The two 32-bit halves of each performance counter cannot be read in a single atomic operation. To prevent erroneous readings, the following procedure should be used to reliably read each of the 64-bit counters:
- Read the upper 32 bits of the counter into a register.
- Read the lower 32 bits of the counter into another register.
- Read the upper 32 bits into yet another register.
- Compare the first and second reads of the upper 32 counter bits. If they differ, jump back to step 1.
This procedure will read a valid count value even though the counter continues to run between the reads. In general, execution of this sequence should require at most one backward jump in step 4.
The RISC-V architecture has a truly reduced instruction set, lacking several types of instructions present in the instruction sets of other processor architectures. The functions of many of those more familiar instructions can be performed with RISC-V instructions, though perhaps not in an immediately intuitive manner.
The RISC-V assembler supports a number of pseudo-instructions, each of which translates to one or more RISC-V instructions providing a type of functionality one might expect in a general-purpose processor instruction set. The following table presents a few of the most useful RISC-V pseudo-instructions:
Near function call (20-bit offset)
Far function call (32-bit offset)
Return from function
Branch if equal to zero
Branch if greater than or equal to zero
Branch if less than zero
Branch if greater than
Branch if less than or equal
Fence all memory and I/O accesses
Read a CSR
Load 12-bit immediate
Load 32-bit immediate
Load the address of symbol, where
Load word at symbol, where
Store word at symbol, where
In these instruction listings,
rd is the destination register,
rs is the source register,
csr is a control and status register,
symbol is an absolute data address, and
offset is a PC-relative instruction address.
Instructions combining the upper 20 bits of an address or immediate value with an immediate value containing the lower 12 bits must perform a step to reverse the effect of the sign extension of bit 11 of the lower 12-bit value in the second instruction of each sequence. This is necessary because the immediate value in the
addi instruction is always treated as signed. The most significant bit of the 12 bit immediate value will be sign-extended through bit 31 before being added to the upper 20 bits.
The following example demonstrates the problem and the solution. Assume we want to load the value 0xFFFFFFFF into a register using
addi and naively add the upper and lower portions:
addi instruction sign-extends 0xFFF to 0xFFFFFFFF before adding it to 0xFFFFF000. The result of the addition is then 0xFFFFEFFF, which is not what we want. Adding bit 11 of the lower 12 bits to the upper 20 bits will fix this:
The result is now 0xFFFFFFFF, the correct value. This procedure will work for any other numeric value. If bit 11 happens to be zero, nothing will be added to the upper 20 bits.
The RISC-V architecture defines three privilege levels at which a thread can run:
- User (U) privilege level
- Supervisor (S) privilege level
- Machine (M) privilege level
All RISC-V implementations must support M mode, the most privileged level, capable of accessing all system features. M mode is entered at system reset. The code in a simple embedded system might run entirely in M mode.
In a slightly more sophisticated use case, a secure boot process might run at the M privilege level, loading and starting an application that runs in U mode. This approach is appropriate for a secure embedded solution.
In addition to the mandatory M level, A RISC-V processor may implement either or both of the S and U privilege levels. A system running a general-purpose operating system uses S mode and U mode in the same manner as the kernel and user modes of other common processor architectures. RISC-V U mode applications request system services with the
ecall (environment call) instruction, generating an exception handled at the S level. The privilege architecture of RISC-V directly supports modern operating systems such as Linux.
Separate collections of CSRs are defined to enable configuration, control, and monitoring of the system at each of the three privilege levels. Depending on the privilege level of the running thread and the level of a CSR, the thread may have read-write, read-only, or no access to the CSR. Threads at higher privilege levels can access CSRs at lower privilege levels.
The RISC-V S privilege level supports paged virtual memory with a 32-bit address space divided into 4KB pages. A 32-bit virtual address is separated into a 20-bit virtual page number and a 12-bit page offset. Two additional virtual memory configurations are defined for the RISC-V 64-bit environment. One is a 39-bit address space, supporting 512GB of virtual memory. For applications requiring even more virtual addresses, a 48-bit address space is available, supporting 256TB of virtual memory. Although the 48-bit configuration offers far more memory than the 39-bit version, it also requires additional storage for page tables and consumes more processing time during traversal of those tables.
The following instructions support privileged execution levels:
uret– These instructions return from the exception handler initiated by an
ecallinstruction. Each of these instructions can be executed at the privilege level indicated by the first letter of the instruction or higher. Executing one of these instructions referencing a privilege level lower than that of the current thread will return from the exception initiated at the lower level.
wfi– Wait for interrupt. This instruction requests the current thread to stall until an interrupt becomes available for servicing. The RISC-V specification only requires that this instruction serve as a hint, so a particular implementation may process a
wfiinstruction as a no-op rather than actually stalling the thread. Because it is possible for the processor to handle
wfias a no-op, code that follows a
wfiinstruction must explicitly check for the presence of pending interrupts in need of processing. This sequence typically occurs inside a loop.
sfence.vma– Flush virtual memory page table data from cache to memory. The leading
sin the instruction mnemonic indicates this instruction is targeted for use at the supervisor privilege level.
We won't cover the topic here, but RISC-V also defines instructions and CSRs supporting virtualization and the hypervisor that manages the virtual environment.
The instruction set described in this section is named RV32I, which stands for the RISC-V 32-bit integer instruction set. Although the RV32I ISA provides a complete and useful instruction set for many purposes, it lacks several functions and features available in other processors such as x86 and ARM.
The RISC-V extensions provide a mechanism for adding capabilities to the base instruction set in an incremental and compatible manner. Implementors of RISC-V processors can selectively include extensions in a processor design to optimize tradeoffs between chip size, system capability, and performance.
The RISC-V M extension adds integer multiplication and division functionality to the base RV32I instruction set. The following instructions are available in this extension:
mul: Multiply two 32-bit registers and store the lower 32 bits of the result in the destination register.
mulhsu: Multiply two 32-bit registers and store the upper 32 bits of the result in the destination register. Treat the multiplicands as both signed (
mulh), both unsigned (
mulhu), or signed
rs1is the first source register in the instruction and
rs2is the second.
divu: Perform division of two 32-bit registers, rounding the result toward zero, on signed (
div) or unsigned (
remu: Return the remainder corresponding to the result of a
divuinstruction on the operands.
Division by zero does not raise an exception. To detect division by zero, code should test the divisor and branch to an appropriate handler if it is zero.
The RISC-V A extension provides atomic read-modify-write operations to support multithreaded processing in shared memory.
The atomic load-reserved (
lr.w) and store-conditional (
sc.w) instructions work together to perform a memory read followed by a write to the same location as an atomic sequence. The load-reserved instruction places a reservation on the memory address during the load. If another thread writes to the same location while the reservation is in effect, the reservation is cancelled.
When the store-conditional instruction executes, it returns a value indicating if it successfully completed the atomic operation. If the reservation remains valid (in other words, no intervening write occurred to the target address), the store-conditional instruction writes the register to memory and returns zero, indicating success. If the reservation was cancelled, the store-conditional instruction does not alter the memory location and returns a non-zero value indicating the store operation failed. The following instructions implement the load-reserved and store-conditional operations:
lr.w: Load a register from a memory location and place a reservation on the address.
sc.w: Store a register to a memory location conditionally. Set the destination register to zero if the operation succeeded and the memory location was written, or set the destination register to a nonzero value if the reservation was cancelled. If the reservation was cancelled, the memory location is not modified by this instruction.
The atomic memory operation (AMO) instructions atomically load a word from a memory location into the destination register, perform a binary operation between the value read and
rs2, and store the result back to the memory address. The following instructions implement the AMO operations:
amoswap.w: Atomically swap
amoadd.w: Atomically add
amoxor.w: Atomically perform AND, OR, or XOR with
amomaxu.w: Atomically perform minimum or maximum selection of signed or unsigned (instructions with the
usuffix) values with
The RISC-V C extension implements compressed instructions with the goals of minimizing the amount of memory consumed by instruction storage and reducing the amount of bus traffic required to fetch instructions.
All RV32I instructions discussed previously are 32 bits in length. The C extension provides alternate 16-bit representations of many of the most frequently used RV32I instructions. Each compressed instruction is equivalent to one full-length instruction. No mode switching is necessary, meaning programs can freely intermix 32-bit RV32I instructions and compressed 16-bit instructions. In fact, assembly language programmers do not even need to take steps to specify whether an instruction should be generated in compressed form. The assembler and linker are capable of transparently emitting compressed instructions where possible to minimize code size with no execution performance penalty.
When working with processors and software development tool sets supporting the RISC-V C extension, the benefits of compressed instructions are immediately available to developers working in assembly language as well as to those working with higher-level languages.
F and D Extensions
The RISC-V F and D extensions provide hardware support for single-precision (F) and double-precision (D) floating-point arithmetic in accordance with IEEE 754. The F extension adds 32 floating-point registers named
f31 and a control and status register named
fcsr to the architecture. These registers are all 32 bits. The extension includes a set of floating-point instructions that complies with the requirements in the IEEE 754-2008 single-precision standard.
Most floating-point instructions operate on the floating-point registers. Data transfer instructions are provided to load floating-point registers from memory, store floating-point registers to memory, and move data between floating-point registers and integer registers.
The D extension widens
f31 to 64 bits. In this configuration, each
f register can hold a 32-bit value or a 64-bit value. Double-precision floating-point instructions are added, in compliance with the IEEE 754-2008 double-precision standard. The D extension requires the F extension be present.
Several additional extensions to the RISC-V architecture have been defined, are in development, or are at least under consideration for future development:
- RV32E architecture : This is not actually an extension, rather it is a modified architecture intended to reduce processor hardware requirements below those of the RV32I instruction set for small embedded systems. The only difference between RV32I and RV32E is the reduction in the number of integer registers to 15. This change is expected to reduce processor die area size and power consumption by about 25% compared to an otherwise equivalent RV23I processor.
x0remains a dedicated zero register. Halving the number of registers frees up one bit in each register specifier in an instruction. These bits are guaranteed to remain unused in future revisions and are thus available for use in customized instruction extensions.
- Q extension: The Q extension supports 128-bit quad-precision floating-point mathematics as defined in IEEE 754-2008.
- L extension: The L extension supports decimal floating-point arithmetic as defined in IEEE 754-2008.
- B extension: The B extension supports bit manipulations such as inserting, extracting, and testing individual bits.
- T extension: The T extension supports memory transactions consisting of atomic operations across multiple addresses.
- P extension: The P extension provides packed SIMD instructions for floating-point operations in small RISC-V systems.
- V extension: The V extension supports data-parallel, or vector, operations. The V extension does not specify the lengths of data vectors; that decision is left to the implementers of a RISC-V processor design. A typical implementation of the V extension might support 512-bit data vectors, though implementations with up to 4,096-bit vector lengths are currently available.
- N extension: The N extension provides support for handling interrupts and exceptions at the U privilege level.
- Zicsr extension: The Zicsr extension performs atomic read-modify-write operations on the system CSRs. These instructions are described in the System instructions section.
- Zifencei extension: The Zifencei extension defines the
fence.iinstruction, described in the Memory access instructions section.
The next section covers the extension of the base RISC-V ISA to 64 bits.
The RISC-V introduction to this point has discussed the 32-bit RV32I architecture and instruction set, with extensions. The RV64I instruction set extends RV32I to a 64-bit architecture. As in RV32I, instructions are 32-bits wide. In fact, the RV64I instruction set is almost entirely the same as RV32I except for a few significant differences:
- All of the integer registers are widened to 64 bits.
- Addresses are widened to 64 bits.
- Bit shift counts in instruction opcodes increase in size from 5 to 6 bits.
- Several new instructions are defined to operate on 32-bit values in a manner equivalent to RV32I. These instructions are necessary because most instructions in RV64I operate on 64-bit values and there are many situations in which it is necessary to operate efficiently on 32-bit values. These word-oriented instructions have an opcode mnemonic suffix of
w-suffix instructions produce signed 32-bit results. These 32-bit values are sign-extended (even if they are unsigned values) to fill the 64-bit destination register. In other words, bit 31 of each result is copied into bits 32-63.
The following new instructions are defined in RV64I:
sraiw: These instructions perform equivalently to the RV32I instruction with the same mnemonic, minus the
wsuffix. They work with 32-bit operands and produce 32-bit results. The result is sign-extended to 64 bits.
sd: Load and store a 64-bit doubleword. These are the 64-bit versions of the
swinstructions in the RV32I instruction set.
The remaining RV32I instructions perform the same functions in RV64I, except addresses and registers are 64 bits in length. The same opcodes, both in assembly source code and binary machine code, are used in both instruction sets.
In the next section, we will examine some standard 32-bit and 64-bit RISC-V configurations that are commercially available. Each of these consists of a base ISA plus selected extensions.
Standard RISC-V Configurations
The RV32I and RV64I instruction sets provide a base set of capabilities useful mainly in smaller embedded system designs. Systems intended to support multithreading, multiple privilege levels, and general-purpose operating systems require several of the RISC-V extensions to operate correctly and efficiently.
The minimum RISC-V configuration recommended for establishing an application development target consists of a base RV32I or RV64I instruction set architecture augmented with the I, M, A, F, D, Zicsr, and Zifencei extensions. The abbreviation for this combination of features is G, as in RV32G or RV64G. Many G configurations additionally support the compressed instruction extension, with the names RV32GC and RV64GC.
In embedded applications, a common configuration is RV32IMAC, providing the base instruction set plus multiply/divide functionality, atomic operations, and compressed instruction support. Marketing materials for RISC-V processors frequently use these shorthand descriptions of processor capabilities.
The following section presents a small example of RISC-V assembly language.
RISC-V Assembly Language
This RISC-V assembly language example is a complete application that runs on a RISC-V processor:
This program prints the following text in a console window and then exits.
Hello, Computer Architect!
These are some points of interest within the assembly code:
%pcrel_lodirectives select the high 20 bits (
%pcrel_hi) or low 12 bits (
%pcrel_lo) of the PC-relative address of the label provided as an argument. The combination of the
addiinstructions places the address of the message string in
1:is a local label. When referencing a local label, the letter
bis appended to reference a label earlier in the code (backwards), or
fis appended to reference a label later in the code (forward). The
%pcrel_lodirectives are paired: The
1:local label resolves the lower 12 bits of the offset to the
This article introduced the RISC-V processor architecture and its instruction set. The RISC-V project has defined a complete user-mode instruction set specification and a number of extensions to support general-purpose computing, high-performance computing, and embedded applications requiring minimal code size. RISC-V processors are offered commercially, and open source products are available to implement instantiations of RISC-V in FPGA devices.
This article is adapted from my new book, Modern Computer Architecture and Organization, published by Packt Publishing. The book includes chapter exercises that get you started with RISC-V development using freely available tools. These exercises, along with example solutions, are available at the book GitHub repository.
Opinions expressed by DZone contributors are their own.