Implementation_of_RISC-V_Processor
Implementation_of_RISC-V_Processor
1051/itmconf/20257402006
ICCPCI-2024
1 Introduction
During 1970s, Very Large-Scale Integration (VLSI) Design was emerged and brings a drastic
changes and advancements in semiconductor and communication technologies. These
developments brings out an innovation of microprocessor design and electronic computing.
This rapid progress may get advancements in areas like aviation, healthcare, mobile devices,
and the automotive sector of computing.
By 2030, it is estimated more than 22.7 billion devices will be interlinked through IOT
networks (W. Wang et al., 2021), it brings out the future advancements or innovations in
sectors like smart cities, self-driving vehicles and space exploration technologies.
VLSI, Very large scale integration is defines as a method of designing the intergrated circuits
by adding thousands of transistors onto a single chip. Before VLSI, ICs have very few
functionalities . After VLSI Technology, Engineers can consolidate the crucial components
such as the Central Processing Unit (CPU), Read-Only Memory (ROM), Random Access
Memory (RAM), and other logical units onto a single chip. Modern innovations such as
lowbit-rate, high-definition video and cellular networks, provides enhanced applications,
processing capabilities and portability to users. This evolution is expected to persist,
significantly shaping the VLSI and system design in the upcoming years.
Today’s Processors are maily based on two key architectural paradigms. They are : Complex
Instruction Set Computing (CISC) and Reduced Instruction Set Computing (RISC). CISC
architecture is defined as an extensive set of instructions which are capable of executing
multiple step operations within a single command. This approach is flexible and it is also
reduces the number of instructions needed for a program so that it minimizes the complexity
of a program. Making it suitable for scenarios where backward compatibility with older
software or specialized instructions is crucial, such as in personal computers and certain
© The Authors, published by EDP Sciences. This is an open access article distributed under the terms of the Creative Commons
Attribution License 4.0 (https://creativecommons.org/licenses/by/4.0/).
ITM Web of Conferences 74, 02006 (2025) https://doi.org/10.1051/itmconf/20257402006
ICCPCI-2024
highperformance computing tasks. The Design of CISC often leads to higher power
consumption and complex circuitry because of this production costs and energy demands
increases.
The other key architectural paradigm is Reduced Instruction Set Computing (RISC). This
RISC Processor mainly focuses on simplicity and efficiency. It’s uses a smaller set of
instructions unlike CISC because of this smaller set of instruction its executed rapidly. This
architecture enables the faster data processing, speeds, better energy efficiency, and easier
opeimization for parallel processing. Due to this advantages , RISC architecture design
becomes famous in most of the devices where power efficiency and quick processing is
needed, like smartphones, tablets, and other mobile or electronic devices. Both CISC and
RISC have their own features and properties both have advantages and disadvantages,
However, making research into enhancing their strengths a valuable endeavor for both
academia and industry as demand for higher performance computing solutions grows.
RISC-V was introduced in 2010 by the University of California, Berkeley, as an open and
freely available Instruction Set Architecture (ISA) rooted in the principles of RISC. It is
opensource design which removes the licensing costs, key obstacles in the semiconductor
industry. This allows companies to tailor and deploy RISC-V to meet their specific needs
without being limited by proprietary constraints. Consequently, RISC-V has gained
significant attention across various sectors, including embedded systems, mobile technology,
data centre, and artificial intelligence.
As the demand for more powerful and efficient computing grows, RISC-V is likely to become
even more important. Its ability to offer low-cost, customizable, and high-performance
solutions makes it a key player in the semiconductor and computing industries. RISC-V is
paving the way for new technologies in everything from everyday electronics to self-driving
systems and beyond, helping to shape the future of technology. In future RISC-V processor
plays very crucial role in most of the electronic devices which gradually increases the
performance of the devices.
2 Methodology
The Instruction Set Architecture (ISA) defines the processor commands that can carry out,
which is a key part of how a computer is built and works. This ISA have operations (called
opcodes) and the data (called operands) which are used to perform tasks. For example, in a
MOV instruction, the opcode is "MOV," and the operands tell the processor which data needs
to move and where to move, like moving the value 54 in hexadecimal to a register (e.g., AL).
There are two main types of Instruction Set Architectures (ISAs), They are: Reduced
Instruction Set Computing (RISC) and Complex Instruction Set Computing (CISC). RISC
ISAs have fewer and simpler instructions, which makes them faster and more efficient,
making them ideal and suitable for modern processors. CISC ISAs, have more complex
instructions that can perform multiple tasks at once, which is helpful for certain specialized
applications but harder to optimize and less efficient. One of the popular RISC ISA is ARM,
it focuses on simplicity, energy efficiency, and fast execution, making it easier and suitable
to optimize across different processors.
2
ITM Web of Conferences 74, 02006 (2025) https://doi.org/10.1051/itmconf/20257402006
ICCPCI-2024
3 Implementation
The processor comprises several components, including the ALU, ALU decoder (aludec),
main decoder (maindec), instruction memory (imem), data memory (dmem), pipeline
registers, multiplexers, and forwarding units. Key elements of the datapath are summarized
below.
The ALU handles arithmetic and logical operations on binary data, directed by signals from
the ALU decoder. It retrieves data from the pipeline register (ID_IEx) and delivers the output
to ALUResults.This RISC-V ALU implementation supports nine instructions, including
addition, subtraction, bitwise operations (AND, OR, XOR), and shifts.
3
ITM Web of Conferences 74, 02006 (2025) https://doi.org/10.1051/itmconf/20257402006
ICCPCI-2024
The ALU decoder interprets instructions to identify the required ALU operation. It combines
inputs (ALUOp, funct3, funct7b5, opb5) to generate control signals. For instance, RTypeSub
distinguishes between R-type ADD and SUB instructions by applying bitwise operations to
funct7b5 and opb5.
The main decoder generates control signals (RegWrite, ALUSrc, MemWrite, etc.) based on
the instruction’s opcode. These control signals guide the data flow within the datapath
through multiplexers, enabling different data processing and memory operations as needed.
4
ITM Web of Conferences 74, 02006 (2025) https://doi.org/10.1051/itmconf/20257402006
ICCPCI-2024
The job of Main Decoder is to figure out what the instructions means and what actions needs
to be performed. It takes the operation code and breaks it down, deciding the which parts of
the processor should be activated to carry out the task.
Main Decoder is used to translate the instruction into signals which controls the processor. It
ensures whether the operations are carried out is right or wrong.
Pipeline registers are temporary storage elements in a processor's pipeline that facilitate data
transfer between instruction execution stages, ensuring synchronization and controlled data
flow. A 5-stage pipeline contains four registers: Fetch-Decode Register, Decode-Execute
Register, Execute-Memory Register, and Memory-Writeback Register, each named to
represent the stages they divide.
4 Result
5
ITM Web of Conferences 74, 02006 (2025) https://doi.org/10.1051/itmconf/20257402006
ICCPCI-2024
The Data Cache Module (dmem) stores data with write enabled by MemWrite. Figure 4.4
captures the simulation waveform. The sw instruction is analyzed, particularly instruction
0x0471AA23. After three cycles post-fetch, the data reaches the memory stage, where it
writes data if MemWrite is set. The functionality of dmem is verified.
The Core Decoder generates control signals from the instruction opcode. Figure 4.8 shows
the simulation results for opcodes 0x0110011 (R-type) and 0x1100011 (B-type). Control
signals for various instruction types are summarized.
References
1. R. Urquhart, "What Does RISC-V Stand For? A Brief History of the Open ISA,"
Semiconductor Engineering: Systems & Design, Opinion, Mar. 29, 2021.
2. D. Bhandarkar and D. W. Clark, "Performance from Architecture: Comparing a
RISC and a CISC with Similar Hardware Organization," in Proc. 4th Int’l Conf.
ASPLOS, Santa Clara, CA, USA, Apr. 8–11, 1991.
3. M. N. Topiwala and N. Saraswathi, "Implementation of a 32-bit MIPS Based RISC
Processor Using Cadence," 2014 IEEE Int’l Conf. Adv. Commun., Control and
6
ITM Web of Conferences 74, 02006 (2025) https://doi.org/10.1051/itmconf/20257402006
ICCPCI-2024