Introduction to AMBA® AXI is a practical introduction to the AXI (Advanced eXtensible Interface) protocol, a core building block of modern system-on-chip (SoC) designs.

Arm AMBA AXI Protocols Overview

Recommended experience
Recommended experience
Intermediate level
General background in computing or engineering helpful. No prior AXI knowledge required.
Recommended experience
Recommended experience
Intermediate level
General background in computing or engineering helpful. No prior AXI knowledge required.
What you'll learn
Explain the role of AXI in modern system-on-chip (SoC) designs
Identify AXI channels, signals, and transaction types
Interpret AXI transfers, ordering rules, and atomic accesses
Details to know

Add to your LinkedIn profile
March 2026
9 assignments
See how employees at top companies are mastering in-demand skills

There are 11 modules in this course
Welcome to Introduction to AMBA® AXI. This short video will walk you through how the course is structured, what you’ll learn, and how to approach the material. Take a moment to get oriented, then move on when you’re ready — the course is designed to let you learn at your own pace.
What's included
1 video
1 video•Total 3 minutes
- Course Introduction•3 minutes
In this module, you will build the foundational understanding needed for working with AMBA AXI. You’ll explore what the AMBA architecture is, why it was created, and how it has evolved to support increasingly complex system-on-chip designs. You’ll also be introduced to the AXI protocol - its purpose, its key features, and the role it plays within the broader AMBA family. By the end of the module, you’ll have a clear picture of how AMBA standardises on-chip communication and why AXI has become the most widely adopted protocol for high-performance, low-latency systems.
What's included
4 videos1 assignment
4 videos•Total 12 minutes
- Introduction•2 minutes
- What is AMBA and why use it?•3 minutes
- AMBA's evolution•5 minutes
- The AXI Protocol•2 minutes
1 assignment•Total 10 minutes
- End of module assesment•10 minutes
This module introduces how information moves through the AXI protocol by exploring the structure and behaviour of channel-based communication. Learners will examine how the VALID/READY handshake enables flexible data flow, and how individual transfers combine to form complete read and write transactions. Through examples of single-data and multi-data transactions, the module illustrates how AXI separates responsibilities across channels to maintain efficiency. The module concludes by showing how AXI supports multiple active transactions, enabling high throughput in modern SoC designs.
What's included
9 videos1 assignment
9 videos•Total 15 minutes
- Introduction•3 minutes
- How AXI Channel Handshakes Control Data Flow•1 minute
- Transfers vs Transactions in AXI•1 minute
- AXI Channel Behavior: Worked Examples•2 minutes
- Write Transactions with a Single Data Transfer•2 minutes
- Write Transactions with Multiple Data Transfers•1 minute
- Read Transactions with a Single Data Transfer•1 minute
- Read Transactions with Multiple Data Transfers•2 minutes
- Supporting Multiple Active Transactions in AXI•1 minute
1 assignment•Total 20 minutes
- End of Module Assessment•20 minutes
In this chapter, you’ll take a closer look at the signals that make AXI communication work. Each AXI channel uses a specific set of signals to coordinate intent, control data movement, manage access permissions, and report results. By understanding what these signals mean and how they interact, you’ll build a clearer picture of how AXI enables reliable, high-performance communication across a system. We’ll explore the purpose of key control and data signals, how channel dependencies influence system behaviour, and how features such as burst configuration, protection levels, caching hints, atomic access support, and Quality of Service build flexibility into the protocol. By the end, you’ll be able to recognise the role of these signals in shaping AXI transactions and appreciate why they matter when integrating components or analysing system performance.
What's included
12 videos1 assignment
12 videos•Total 27 minutes
- Introduction•2 minutes
- Write channel signals•2 minutes
- Read channel signals•1 minute
- AXI channel dependencies•2 minutes
- Data size, length, and burst type•4 minutes
- Write data strobes•3 minutes
- Protection level support•2 minutes
- Cache support•3 minutes
- Quality of Service•2 minutes
- Region signaling and user signals•2 minutes
- Response signaling•2 minutes
- Atomic accesses with the lock signal•2 minutes
1 assignment•Total 20 minutes
- End of module assessment•20 minutes
Welcome to this module on Atomic Accesses in the AXI protocol. In modern systems, multiple agents often need to access shared resources at the same time. In these situations, it’s not enough for transactions to be fast — they also need to be atomic, ensuring that critical read-modify-write sequences complete without interference. In this module, we’ll explore what atomic accesses are and why they are used. We’ll then look in detail at the two mechanisms AXI provides to support atomicity: locked accesses and exclusive accesses. You’ll see how each approach works, how they differ, and the trade-offs involved in their use. In particular, we’ll focus on how locked and exclusive accesses affect interconnect behaviour and bandwidth utilisation, and why exclusive accesses are generally preferred in high-performance systems. By the end of the module, you’ll be able to recognise when atomic accesses are required, understand how AXI supports them, and appreciate the design decisions behind each mechanism.
What's included
8 videos1 assignment
8 videos•Total 19 minutes
- Introduction•3 minutes
- Introduction to Atomic Accesses•0 minutes
- What are Atomic Accesses and Why Are They Needed?•1 minute
- Locked Accesses in AXI: Overview•1 minute
- How Locked Accesses Operate•4 minutes
- Exclusive Access Monitors in AXI•2 minutes
- Exclusive Transaction Pairs: PassPass Case•4 minutes
- Exclusive Transactions Pairs: PassFail Case•4 minutes
1 assignment•Total 20 minutes
- Atomic Accesses•20 minutes
Welcome to this module on Atomic Accesses in the AXI protocol. In modern systems, multiple agents often need to access shared resources at the same time. In these situations, it’s not enough for transactions to be fast — they also need to be atomic, ensuring that critical read-modify-write sequences complete without interference. In this module, we’ll explore what atomic accesses are and why they are used. We’ll then look in detail at the two mechanisms AXI provides to support atomicity: locked accesses and exclusive accesses. You’ll see how each approach works, how they differ, and the trade-offs involved in their use. In particular, we’ll focus on how locked and exclusive accesses affect interconnect behaviour and bandwidth utilisation, and why exclusive accesses are generally preferred in high-performance systems. By the end of the module, you’ll be able to recognise when atomic accesses are required, understand how AXI supports them, and appreciate the design decisions behind each mechanism.
What's included
10 videos1 assignment
10 videos•Total 19 minutes
- Introduction•3 minutes
- Simple AXI Transactions•4 minutes
- Using Transfer IDs in AXI•2 minutes
- Ordering Rules for Write Transactions•2 minutes
- Ordering Rules for Read Transactions•1 minute
- Ordering between Read and Write Transactions•1 minute
- Unaligned Transfer Start Addresses•2 minutes
- Endianness Support in AXI•2 minutes
- Write Interface Attributes and their effects•1 minute
- Read Interface Attributes and their effects•1 minute
1 assignment•Total 20 minutes
- Knowledge Check•20 minutes
Welcome to this module on AXI Issue F updates. As AXI has evolved, new features have been added to address emerging system requirements, particularly around coherency, performance optimisation, and tighter integration with cache-based architectures. Issue F introduces a number of these updates, extending AXI beyond its original transaction model.In this module, we’ll explore the key additions introduced in Issue F, including atomic transactions, cache stashing, and several new transaction types and signalling mechanisms. We’ll also look at updates related to coherency signalling, data integrity, and address translation.Rather than focusing on implementation detail, the emphasis here is on understanding what these features are, why they were introduced, and how they extend existing AXI behaviour.By the end of the module, you’ll have a clear view of the most important Issue F updates and how they fit into the ongoing evolution of the AXI protocol.
What's included
13 videos1 assignment
13 videos•Total 30 minutes
- What are atomic transactions in Issue F?•2 minutes
- Atomic transaction types introduced in issue F•2 minutes
- Atomic transaction signaling in AXI Issue F•1 minute
- What is cache stashing and why is it used?•2 minutes
- How cache stashing transactions work•2 minutes
- Cache stashing signaling in AXI•3 minutes
- Deallocating transactions and their purpose•4 minutes
- Untranslated transactions in AXI•2 minutes
- Data checking and poison signaling•2 minutes
- Updates to coherency signaling in issue F•2 minutes
- Clean operations and cache maintenance•1 minute
- Other AXI updates introduced in issue F (Part 1)•4 minutes
- Other AXI updates introduced in issue F (Part 2)•1 minute
1 assignment•Total 10 minutes
- Knowledge Check•10 minutes
This module introduces the key enhancements added to the AXI protocol in Release G. These updates focus on improving read behaviour, supporting system-level resource control, and extending cache management capabilities. Learners will explore new read data handling features, including read data chunking and changes to read interleaving behaviour. The module also introduces Memory Partitioning and Monitoring (MPAM), which enables finer control over shared system resources. Finally, the module examines updates related to cache management operations on write transactions, including persistence behaviour. By the end of this module, learners will understand how the Release G updates extend AXI functionality to better support performance optimisation, resource management, and cache-aware system design.
What's included
8 videos1 assignment
8 videos•Total 13 minutes
- Introduction to AXI Issue G•1 minute
- Read data chunking in AXI release G•2 minutes
- Read data chunking: Worked example•1 minute
- Disabling Read interleaving in AXI•2 minutes
- Memory Partitioning and Monitoring (MPAM)•3 minutes
- Cache Management Operations on write transactions•1 minute
- Persist signals for write CMOs•2 minutes
- Persist CMO write: Worked example•1 minute
1 assignment•Total 6 minutes
- Knowledge Check•6 minutes
This module introduces the enhancements added to the AXI protocol in Issue H, with a particular focus on memory safety, transaction flexibility, and extended write behaviours. Learners will explore updates to regular and untranslated transactions, before diving into memory tagging, including its purpose, signalling, and read and write operation behaviour. The module also introduces several new transaction types, such as prefetch transactions, write plus cache management operations, and write zero transactions. By the end of this module, learners will understand how Issue H extends AXI to better support modern system requirements such as memory protection, performance optimisation, and improved data handling.
What's included
11 videos1 assignment
11 videos•Total 22 minutes
- Updates to regular AXI transactions in issue H•2 minutes
- Untranslated Transactions in issue H•1 minute
- What is Memory Tagging and why is it used?•3 minutes
- Memory tagging support in AXI•2 minutes
- Memory tagging signaling in AXI•2 minutes
- Memory Tagging: Read Operation Behavior•2 minutes
- Memory Tagging: Write Operation Behavior•3 minutes
- Prefetch transactions in AXI•3 minutes
- Write transactions with Cache Management Operations•2 minutes
- Write zero transactions and their purpose•2 minutes
- Other AXI updates introduced in issue H•2 minutes
1 assignment•Total 10 minutes
- Knowledge Check•10 minutes
ACE-Lite is included as an optional module for learners who may encounter it in existing systems or legacy designs. While ACE-Lite introduced coherency-related concepts to AXI-based systems, it is no longer treated as a separate focus in modern AMBA specifications and has been absorbed into the wider AXI and ACE landscape. New designs typically target more recent AMBA features, so this module is provided for background and context rather than as essential knowledge. Welcome to this module on ACE-Lite. Up to this point in the course, we’ve focused on AXI as a high-performance, non-coherent interface. In many systems, however, components need to share data while maintaining a consistent view of memory. This is where coherency becomes important.In this module, we’ll first revisit the limits of non-coherent AXI-based systems and explore why coherency is required. We’ll then look at common coherency solutions at a high level, before introducing ACE-Lite and the problem it was designed to solve.Although ACE-Lite was originally defined as a separate protocol, it has since been absorbed into later versions of AXI. We treat it separately here to clearly highlight the additional concepts it introduces and how they extend standard AXI behaviour. By the end of this module, you’ll understand what ACE-Lite is, when it is used, and how it enables limited coherency while preserving the performance characteristics of AXI. Please note this is an optional module - ACE Lite used to be a separate protocol but was folded into AMBA AXI version 5.
What's included
5 videos
5 videos•Total 12 minutes
- AXI Review•2 minutes
- AXI Features•2 minutes
- Non Coherent AXI Systems•2 minutes
- Approaches to System Coherency•4 minutes
- Introducing ACE-Lite Coherency Extensions•2 minutes
This final module will test your knowledge of AMBA AXI
What's included
1 assignment
1 assignment•Total 40 minutes
- Assessment•40 minutes
Instructor

Offered by
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.

Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
More questions
Financial aid available,

