Table of contents
Job planning
viii Programming Manual, 03/2006 Edition, 6FC5398-2BP10-1BA0
1.23 CHECKSUM: Form the checksum over an array..................................................................... 1-69
1.24 ROUNDUP: Round up ............................................................................................................. 1-70
2 Subroutines, Macros............................................................................................................................... 2-1
2.1 Using subroutines ...................................................................................................................... 2-1
2.2 Subroutines with SAVE mechanism .......................................................................................... 2-3
2.3 Subroutines with parameter transfer (PROC, VAR) .................................................................. 2-5
2.4 Call subroutines (L or EXTERN) ................................................................................................ 2-9
2.5 Parameterized subroutine return (RET)................................................................................... 2-14
2.6 Subroutine with program repetition (P) .................................................................................... 2-18
2.7 Modal subroutine (MCALL) ...................................................................................................... 2-19
2.8 Indirect subroutine call (CALL)................................................................................................. 2-21
2.9 Repeating program sections with indirect programming (CALL) ............................................. 2-22
2.10 Indirect call of a program programmed in ISO language (ISOCALL) ...................................... 2-23
2.11 Calling subroutine with path specification and parameters (PCALL)....................................... 2-24
2.12 Extend search path for subroutine calls with CALLPATH........................................................ 2-24
2.13 Search path adaptation of the subroutines prepared during startup ....................................... 2-26
2.14 Execute external subroutine (EXTCALL) ................................................................................. 2-27
2.15 Subroutine call with M, T and D functions................................................................................ 2-31
2.16 Suppress individual block (SBLOF, SBLON)........................................................................... 2-32
2.17 Suppress current block display (DISPLOF) ............................................................................. 2-36
2.18 Cycles: Setting parameters for user cycles.............................................................................. 2-37
2.19 Macro technique (DEFINE...AS) .............................................................................................. 2-41
3 File and Program Management .............................................................................................................. 3-1
3.1 Program memory ....................................................................................................................... 3-1
3.2 Working memory ........................................................................................................................ 3-6
3.3 Defining user data ...................................................................................................................... 3-8
3.4 Protection levels for user data, MD, SD and NC commands................................................... 3-12
3.4.1 Defining protection levels for user data (GUD) ........................................................................ 3-12
3.4.2 Automatic activation of GUDs and MACs ................................................................................ 3-14
3.4.3 Change the protection data for the machine and setting data (REDEF MD, SD).................... 3-15
3.4.4 Protection levels for NC commands (REDEF)......................................................................... 3-16
3.5 REDEF Changing the attributes of the NC language elements............................................... 3-19
3.6 SEFORM structuring statement in the Step editor................................................................... 3-24
4 Protection zones..................................................................................................................................... 4-1
4.1 Definition of the protection zones (CPROTDEF, NPROTDEF) ................................................. 4-1
4.2 Activating, deactivating protection zones (CPROT, NPROT).................................................... 4-4
4.3 Checking for protection zone violation, working area limitation and software limits.................. 4-7
5 Special Motion Commands..................................................................................................................... 5-1
5.1 Approaching coded positions (CAC, CIC, CDC, CACP, CACN) ............................................... 5-1