{"id":31786325,"url":"https://github.com/cybersecurity-dev/mips-embedded-toolkit","last_synced_at":"2026-02-18T17:31:07.969Z","repository":{"id":290371648,"uuid":"974219675","full_name":"cybersecurity-dev/MIPS-Embedded-Toolkit","owner":"cybersecurity-dev","description":"MIPS based Embedded Device Toolkit","archived":false,"fork":false,"pushed_at":"2025-10-29T18:52:34.000Z","size":13,"stargazers_count":1,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-10-29T20:52:13.316Z","etag":null,"topics":["embedded","embedded-systems","mips","mips-architecture","mips-assembly","mips-instructions","mips-processor"],"latest_commit_sha":null,"homepage":"","language":null,"has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/cybersecurity-dev.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":null,"maintainers":null,"copyright":null,"agents":null,"dco":null,"cla":null}},"created_at":"2025-04-28T12:44:55.000Z","updated_at":"2025-10-29T18:52:39.000Z","dependencies_parsed_at":"2025-10-29T20:39:07.219Z","dependency_job_id":"2e37f401-66af-46b9-86e2-d664f1edbad4","html_url":"https://github.com/cybersecurity-dev/MIPS-Embedded-Toolkit","commit_stats":null,"previous_names":["cybersecurity-dev/mips-embedded-toolkit"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/cybersecurity-dev/MIPS-Embedded-Toolkit","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2FMIPS-Embedded-Toolkit","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2FMIPS-Embedded-Toolkit/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2FMIPS-Embedded-Toolkit/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2FMIPS-Embedded-Toolkit/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/cybersecurity-dev","download_url":"https://codeload.github.com/cybersecurity-dev/MIPS-Embedded-Toolkit/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2FMIPS-Embedded-Toolkit/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":29587076,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-02-18T16:55:40.614Z","status":"ssl_error","status_checked_at":"2026-02-18T16:55:37.558Z","response_time":162,"last_error":"SSL_connect returned=1 errno=0 peeraddr=140.82.121.6:443 state=error: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["embedded","embedded-systems","mips","mips-architecture","mips-assembly","mips-instructions","mips-processor"],"created_at":"2025-10-10T12:51:34.289Z","updated_at":"2026-02-18T17:31:07.914Z","avatar_url":"https://github.com/cybersecurity-dev.png","language":null,"readme":"# MIPS based Embedded Device Toolkit\n\nThe **MIPS** (_Microprocessor without Interlocked Pipeline Stages_) architecture is a RISC (_Reduced Instruction Set Computer_) instruction set architecture (ISA) initially developed by MIPS Computer Systems in the early 1980s. It's known for its clean, simple design and has been influential in computer architecture education.\n\n\u003cdetails\u003e\n\n\u003csummary\u003eInstall required tools on Linux\u003c/summary\u003e\n\n### For Ubuntu 18.04, 20.04, 22.04\n\n```bash\nsudo apt-get update\n```\n\u003c/details\u003e\n\n\n\u003cdetails\u003e\n\n\u003csummary\u003eInstall required python libs\u003c/summary\u003e\n\n### pip install\n```bash\npip install -r requirements.txt\npython3 setup.py install\n```\n\n### conda install\n```bash\nconda config --add channels conda-forge\nconda install --file requirements_conda.txt\npython3 setup.py install\n```\n\n\u003c/details\u003e\n\n| Feature             | MIPS (Microprocessor without Interlocked Pipeline Stages) | ARM (Advanced RISC Machines) |\n|----------------------|---------------------------------------------------------|-----------------------------|\n| **Instruction Set** | Primarily 32-bit fixed length, load-store architecture | Variable length (mostly 32-bit, with 16-bit Thumb) |\n| **Instruction Format**| Fewer formats (R, I, J types)                          | More complex and numerous formats |\n| **Registers** | 32 general-purpose registers                           | Up to 32 general-purpose registers (32-bit or 64-bit) |\n| **Addressing Modes** | Simpler addressing modes                               | More complex and flexible addressing modes |\n| **Execution** | Focus on single-cycle execution for most instructions   | Emphasis on low power consumption and efficiency |\n| **Branching** | Delayed branches                                        | Conditional execution of many instructions |\n| **Data Alignment** | Strict data alignment requirements                      | More flexible data alignment |\n| **Endianness** | Configurable (Big or Little Endian)                     | Bi-endian (configurable, often Little Endian by default) |\n| **History \u0026 Usage** | Historically used in embedded systems, networking, workstations; popular for teaching RISC concepts | Dominant in mobile devices, embedded systems, and increasingly in servers and desktops |\n| **SIMD Extensions** | MIPS-3D, MDMX                                           | NEON, SVE, SVE2               |\n| **Power Consumption** | Generally higher                                        | Generally lower                 |\n| **Complexity** | Simpler instruction set and architecture               | More complex instruction set and architecture |\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcybersecurity-dev%2Fmips-embedded-toolkit","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fcybersecurity-dev%2Fmips-embedded-toolkit","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcybersecurity-dev%2Fmips-embedded-toolkit/lists"}