6 from GoodFET import GoodFET;
7 from intelhex import IntelHex16bit;
10 print "Usage: %s verb [objects]\n" % sys.argv[0];
11 print "%s test" % sys.argv[0];
12 print "%s dump $foo.hex [0x$start 0x$stop]" % sys.argv[0];
13 print "%s ivt" % sys.argv[0];
14 print "%s peek [0x$start 0x$stop]" % sys.argv[0];
15 print "%s verify $foo.hex [0x$start 0x$stop]" % sys.argv[0];
16 print "%s ramfill" % sys.argv[0];
17 print "%s ramdepth" % sys.argv[0];
18 print "%s info" % sys.argv[0];
19 print "%s call 0x$start" % sys.argv[0];
20 print "%s exec '0x35 0x00 0x..'" % sys.argv[0];
23 #Initailize FET and set baud rate
27 if(sys.argv[1]=="on"):
30 if(sys.argv[1]=="off"):
33 if(sys.argv[1]=="glitchtest"):
34 client.writecmd(client.GLITCHAPP,0x20,0,None);
36 if(sys.argv[1]=="call"):
37 adr=int(sys.argv[2],16);
38 print "Calling %04x" % adr;
40 if(sys.argv[1]=="exec"):
42 for foo in sys.argv[2].split(" "):
43 code+=chr(int(foo,16));
47 if(sys.argv[1]=="info"):
48 a=client.peekbyte(0xff0);
49 b=client.peekbyte(0xff1);
50 print "GoodFET with %02x%02x MCU" % (a,b);
51 if(sys.argv[1]=="ramfill"):
52 client.monitor_ram_pattern();
53 if(sys.argv[1]=="ramdepth"):
54 print "0x%04x RAM bytes free." % client.monitor_ram_depth();
55 if(sys.argv[1]=="test"):
57 if(sys.argv[1]=="findbaud"):
59 if(sys.argv[1]=="dump"):
64 start=int(sys.argv[3],16);
66 stop=int(sys.argv[4],16);
68 print "Dumping from %04x to %04x as %s." % (start,stop,f);
69 h = IntelHex16bit(None);
72 h[i>>1]=client.peekword(i);
74 print "Dumped %04x."%i;
77 if(sys.argv[1]=="erase"):
79 if(sys.argv[1]=="ivt"):
80 client.dumpmem(0xFFE0,0xFFFF);
82 if(sys.argv[1]=="peek"):
86 start=int(sys.argv[2],16);
89 stop=int(sys.argv[3],16);
91 client.dumpmem(start,stop);
92 if(sys.argv[1]=="verify"):
97 start=int(sys.argv[3],16);
99 stop=int(sys.argv[4],16);
101 h = IntelHex16bit(f);
102 for i in h._buf.keys():
103 if(i>=start and i<stop and i&1==0):
106 print "ERROR at %04x, found %04x not %04x"%(i,peek,h[i>>1]);
110 if(sys.argv[1]=="whatever"):
111 for i in [0x24FF, 0x2500, 0x2502, 0x2504]:
112 print "%04x" % client.peekword(i);