Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Hardware

Cracking open the Commodore 64

By Mark W. Kaelin February 13, 2008, 2:49 AM PST

Image
1
of 20

Cracking open the Commodore 64

Simple design

Image 1

Simple design

For many of us, the first computer we can remember having was the Commodore 64. For me the Commodore 64 replaced an Intellivision console and I was intrigued by the ability to not only play games but to also connect to an online community via a 300 baud modem. The Commodore 64 was extremely powerful in its day and we can still marvel at the beauty of its simple design in this TechRepublic Cracking Open.

You can get a good look at the Commodore 64 in the TechRepublic First Look photo gallery published earlier.

Image 1
Cracking open the Commodore 64

High tech

High tech

One of the first things you notice when you separate the case is that there is a huge piece of cardboard with tin foil on one side lying over the circuit board. Presumably this is for shield the electronic components.

Cracking open the Commodore 64

Standard pins

Standard pins

The keyboard connection is a familiar pins and plug setup.

Cracking open the Commodore 64

Closer

Closer

RAM chips are the most numerous chips to be found on the mother board. They are located on the bottom right of this image.

Cracking open the Commodore 64

Control ROMs

Control ROMs

The two large chips on the bottom left are the Input/Output control chips. If your joysticks stop working, these chips are the likely culprit.

Above those we have the ROM Kernel chips which controlled the BASIC functions that acted as an operating system for the C64.

Cracking open the Commodore 64

Processing

Processing

The chips in his image are where the processing gets done. The 6510 CBM 1784 chip is where machine language is generated, the 906114 is a Programmable Logic Array, and the 6581 1484 is the SID sound chip.

The other chips in this photo are various logic chips from various manufacturers. HD is Hitachi for example.

Cracking open the Commodore 64

Beyond chips

Beyond chips

On this part of the motherboard you can see areas for video and power control.

Cracking open the Commodore 64

Capacitors

Capacitors

Those are some big capacitors. Electronics in the early 1980s was huge when you compare it to 2008.

Cracking open the Commodore 64

No static

No static

I’m guessing this is an inexpensive way to avoid static discharge to the various chips when you insert a modem or cartridge.

Cracking open the Commodore 64

Input/Output

Input/Output

Here is a closer look at the chips that handle joystick and keyboard input.

Cracking open the Commodore 64

Basically speaking

Basically speaking

The BASIC ROM Kernel for the C64 is contained on these chips.

Cracking open the Commodore 64

Not central

Not central

These two chips essentially make up the CPU of the system.

Cracking open the Commodore 64

Sound off

Sound off

The big chip is the SID sound processor and the smaller chips are various logic chips.

Cracking open the Commodore 64

Cover 1 removed

Cover 1 removed

There are various chips under this first metal cover. The MC4044P chip is a Phase Frequency Detector for example. There was too much thermal paste on the big chip for me to get the numbers, but it was connected to the cover via a piece of copper which suggests it generated heat.

Cracking open the Commodore 64

Video out

Video out

The chips located under the second cover control the video out to a monitor or television.

Cracking open the Commodore 64

Closer still

Closer still

A closer look at the components responsible for video output.

Cracking open the Commodore 64

No doubt

No doubt

Confirmation – we are looking at the insides of a Commodore 64.

123_Osborne1_TRS80.jpg
123_Osborne1_TRS80.jpg
Cracking open the Commodore 64

Modem

Modem

We got a modem with our Commodore 64 – might as well find out what is inside.

Cracking open the Commodore 64

Simple and functional

Simple and functional

Not much to a modem back then – simple and elegant.

Cracking open the Commodore 64

In all its glory

In all its glory

  • Hardware
  • Account Information

    Share with Your Friends

    Cracking open the Commodore 64

    Your email has been sent

Share: Cracking open the Commodore 64
Image of Mark W. Kaelin
By Mark W. Kaelin
Mark W. Kaelin has been writing and editing stories about the information technology industry, gadgets, finance, accounting, and tech-life for more than 25 years. Most recently, he has been a regular contributor to BreakingModern.com, aNewDomain.net,
  • Account Information

    Contact Mark W. Kaelin

    Your message has been sent

  • |
  • See all of Mark W.'s content

TechRepublic Premium

  • TechRepublic Premium

    Hardware inventory policy

    This policy describes guidelines your organization can follow to track, process and decommission IT equipment. From the policy: SUMMARY An organization’s IT hardware inventory constitutes a significant capital investment in order to perform company operations. Because hardware represents a critical asset and often holds organizational data, it is important for the company to track each ...

    Published:  January 23, 2023, 11:00 AM EST Modified:  January 24, 2023, 11:00 AM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Malware response checklist

    Whether an infection is the result of a disgruntled employee, hardware vulnerability, software-based threat, social engineering penetration, robotic attack or human error, all organizations must be prepared to immediately respond effectively to such an issue if the corresponding damage is to be minimized. Because even the best protected networks become infected, all organizations must have ...

    Published:  January 22, 2023, 11:00 AM EST Modified:  January 23, 2023, 1:00 PM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Checklist: Securing Windows 10 systems

    Every operating system should be appropriately secured, especially end user workstations which often contain or permit access to company data and upon which most employee job duties are based. To get the maximum security protection out of your Windows 10 deployments follow this checklist from TechRepublic Premium. Also included in this checklist: Security solutions Product ...

    Published:  January 22, 2023, 11:00 AM EST Modified:  January 23, 2023, 2:00 PM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Cloud data storage policy

    Third-party cloud-based file storage applications such as Dropbox, OneDrive and Google Drive have all contributed to the success of business cloud data storage. These products have brought proven flexibility and ease of data access to users and businesses alike while ensuring security of confidential information. Cloud data storage offers many benefits to consumers and companies ...

    Published:  January 22, 2023, 11:00 AM EST Modified:  January 23, 2023, 3:00 PM EST Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice