512 Mb (64 MB), 3.0 V Serial NOR Flash Memory
Wide temperature range
Table of contents
6 Address space map .......................................................................................................................25
6.1 Overview................................................................................................................................................................25
6.1.1 Extended address ..............................................................................................................................................25
6.1.2 Multiple address spaces ....................................................................................................................................25
6.2 Flash memory array ..............................................................................................................................................25
6.3 ID address space ...................................................................................................................................................26
6.3.1 Device unique ID ................................................................................................................................................26
6.4 JEDEC JESD216 serial flash discoverable parameters (SFDP) space .................................................................26
6.5 Security regions address space............................................................................................................................26
6.6 Registers................................................................................................................................................................27
6.6.1 Status Register 1 ................................................................................................................................................28
6.6.2 Status Register 2 Volatile (SR2V) .......................................................................................................................30
6.6.3 Configuration Register 1....................................................................................................................................31
6.6.4 Configuration Register 2....................................................................................................................................33
6.6.5 Configuration Register 3....................................................................................................................................36
6.6.6 Individual and Region Protection Register (IRP)..............................................................................................40
6.6.7 Password Register (PASS)..................................................................................................................................41
6.6.8 Protection Register (PR) ....................................................................................................................................41
6.6.9 Individual Block Lock Access Register (IBLAR) .................................................................................................42
6.6.10 Pointer Region Protection Register (PRPR) ....................................................................................................43
6.6.11 DDR Data Learning Registers...........................................................................................................................43
7 Data protection ............................................................................................................................44
7.1 Security Regions ...................................................................................................................................................44
7.1.1 Reading Security Region memory regions .......................................................................................................44
7.1.2 Programming the Security Regions ..................................................................................................................44
7.1.3 Erasing the Security Regions.............................................................................................................................44
7.1.4 Security Region Lock Bits (LB3, LB2, LB1, LB0) ................................................................................................44
7.2 Deep power down.................................................................................................................................................44
7.3 Write Enable commands ......................................................................................................................................45
7.3.1 Write Enable (WREN)..........................................................................................................................................45
7.3.2 Write Enable for Volatile Registers (WRENV) ....................................................................................................45
7.4 Write Protect signal...............................................................................................................................................46
7.5 Status Register Protect (SRP1, SRP0) ..................................................................................................................46
7.6 Array protection ....................................................................................................................................................47
7.6.1 Legacy block protection ....................................................................................................................................47
7.6.2 Individual block lock (IBL) protection...............................................................................................................50
7.6.3 Pointer region protection (PRP)........................................................................................................................51
7.7 Individual and region protection .........................................................................................................................52
7.7.1 IRP Register ........................................................................................................................................................54
7.7.2 Protection Register (PR) ....................................................................................................................................55
7.7.3 Password protection mode...............................................................................................................................55
7.7.4 Security region read password protection.......................................................................................................56
7.7.5 Recommended IRP protection process ............................................................................................................56
8 Commands ...................................................................................................................................57
8.1 Command set summary .......................................................................................................................................57
8.1.1 Extended addressing .........................................................................................................................................57
8.1.2 CYWT16B512 SPI device.....................................................................................................................................58
8.1.3 Command summary by function ......................................................................................................................59
8.1.4 Read device identification.................................................................................................................................61
8.1.5 Register read or write ........................................................................................................................................61
8.1.6 Read flash array .................................................................................................................................................62
8.1.7 Program flash array ...........................................................................................................................................62
8.1.8 Erase flash array.................................................................................................................................................62
Datasheet
5 of 152
002-34691 Rev. **
2022-05-25