
9/43
M25PE80
struction) is executed. The device consumption
drops further to I
CC2
. When in this mode, only the
Release from Deep Power-down instruction is ac-
cepted. All other instructions are ignored. The de-
vice remains in the Deep Power-down mode until
the Release from Deep Power-down instruction is
executed. This can be used as an extra software
protection mechanism, when the device is not in
active use, to protect the device from inadvertent
Write, Program or Erase instructions.
Status Register
The Status Register contains two status bits that
can be read by the Read Status Register (RDSR)
instruction.
WIP bit.
 The Write In Progress (WIP) bit indicates
whether the memory is busy with a Write, Program
or Erase cycle. 
WEL bit.
 The Write Enable Latch (WEL) bit indi-
cates the status of the internal Write Enable Latch.
Table 2. Status Register Format
Note: WEL and WIP are volatile read-only bits (WEL is set and re-
set by specific instructions; WIP is automatically set and re-
set by the internal logic of the device).
Protection Modes
The environments where non-volatile memory de-
vices are used can be very noisy. No SPI device
can operate correctly in the presence of excessive
noise. To help combat this, the M25PE80 features
the following data protection mechanisms:
Power On Reset and an internal timer (t
PUW
) 
can provide protection against inadvertant 
changes while the power supply is outside the 
operating specification.
Program, Erase and Write instructions are 
checked that they consist of a number of clock 
pulses that is a multiple of eight, before they 
are accepted for execution.
All instructions that modify data must be 
preceded by a Write Enable (WREN) 
instruction to set the Write Enable Latch 
(WEL) bit. This bit is returned to its reset state 
by the following events:
–
Power-up
–
Reset (RESET) driven Low
–
Write Disable (WRDI) instruction 
completion
–
Page Write (PW) instruction completion
■
■
■
–
–
Page Program (PP) instruction completion
Write to Lock Register (WRLR) instruction 
completion
Page Erase (PE) instruction completion
Sector Erase (SE) instruction completion
Bulk Erase (BE) instruction completion
The Hardware Protected mode is entered 
when Top Sector Lock (TSL) is driven Low, 
causing the top 256 pages of memory to 
become read-only. When Top Sector Lock 
(TSL) is driven High, the top 256 pages of 
memory behave like the other pages of 
memory
The Reset (Reset) signal can be driven Low to 
protect the contents of the memory during any 
critical time, not just during Power-up and 
Power-down.
In addition to the low power consumption 
feature, the Deep Power-down mode offers 
extra software protection from inadvertant 
Write, Program and Erase instructions while 
the device is not in active use.
The Software Protection is managed by 
specific Lock Registers assigned to each 
sector and sub-sector as follows:
–
each 64KB sector has a Lock Register
–
inside sector 0 and sector 15, each 4KB 
sub-sector also has a Lock Register (in 
addition to the Lock Register at sector 
level)
The Lock Registers can be read and written 
using the Read Lock Register (RDLR) and 
Write to Lock Register (WRLR) instructions.
In each Lock Register two bits control the 
protection of each sector/sub-sector: the Write 
Lock Bit and the Lock Down Bit.
–
Write Lock Bit:
The Write Lock Bit determines whether 
the contents of the sector/sub-sector can 
be modified (using the Write, Program or 
Erase instructions). When the Write Lock 
Bit is set, ‘1’, the sector/sub-sector is write 
protected – any operations that attempt to 
change the data in the sector/sub-sector 
will fail. When the Write Lock Bit is reset to 
‘0’, the sector/sub-sector is not write 
protected by the Lock Register, and may 
be modified, unless TSL is Low (in which 
case the top sector will remain write 
protected).
–
Lock Down Bit:
The Lock Down Bit provides a mechanism 
for protecting software data from simple 
hacking and malicious attack. When the 
Lock Down Bit is set, ‘1’, further 
–
–
–
■
■
■
■
b7 
b0
0 
0 
0 
0 
0 
0 
WEL WIP