X-Git-Url: http://git.rot13.org/?p=goodfet;a=blobdiff_plain;f=client%2Fgoodfet.msp430;h=20ee81eddf58a3f5c3bd45fe3a9fea56f3c149f7;hp=8a17a263f6577c9aa86593ae08321454e34cffc8;hb=750c7626dbfebf6e043cfcbe02fcb4dd5df3aa34;hpb=a653ba1562dc444e4be791e22264a89a3c6b4a19 diff --git a/client/goodfet.msp430 b/client/goodfet.msp430 index 8a17a26..20ee81e 100755 --- a/client/goodfet.msp430 +++ b/client/goodfet.msp430 @@ -1,17 +1,137 @@ #!/usr/bin/env python -from GoodFET import GoodFET; +import sys; +import binascii; +from GoodFETMSP430 import GoodFETMSP430; +from intelhex import IntelHex16bit, IntelHex; -client=GoodFET(); -client.serInit("/dev/ttyUSB0") -client.MSP430test(); -#client.MSP430dumpbsl(); -# client.MSP430setup(); -# client.MSP430start(); -# client.MSP430haltcpu(); -# ident=client.MSP430peek(0x0ff0); -# print "Target identifies as %04x." % ident; +if(len(sys.argv)==1): + print "Usage: %s verb [objects]\n" % sys.argv[0]; + print "%s test" % sys.argv[0]; + print "%s dump $foo.hex [0x$start 0x$stop]" % sys.argv[0]; + print "%s erase" % sys.argv[0]; + print "%s flash $foo.hex [0x$start 0x$stop]" % sys.argv[0]; + print "%s verify $foo.hex [0x$start 0x$stop]" % sys.argv[0]; + sys.exit(); +#Initialize FET and set baud rate +client=GoodFETMSP430(); +client.serInit() + +#Connect to target +client.MSP430setup(); +#print "setup" + +#Identify model number. +client.MSP430start(); +client.MSP430haltcpu(); +#print "started" + +if(sys.argv[1]=="info"): + #print "Model %08x " % client.MSP430deviceid(); + #print "Core %04x " % client.MSP430coreid(); + #print "Identity %04x" % client.MSP430ident(); + print "Identifies as %s (%04x)" % ( + client.MSP430identstr(), + client.MSP430ident()); +if(sys.argv[1]=="test"): + client.MSP430test(); +if(sys.argv[1]=="dump"): + f = sys.argv[2]; + start=0x0200; + stop=0xFFFF; + if(len(sys.argv)>3): + start=int(sys.argv[3],16); + if(len(sys.argv)>4): + stop=int(sys.argv[4],16); + + print "Dumping from %04x to %04x as %s." % (start,stop,f); + #h = IntelHex16bit(None); + h = IntelHex(None); + i=start; + while i<=stop: + data=client.MSP430peekblock(i,0x20); + print "Dumped %06x."%i; + for j in data: + if i<=stop: h[i]=ord(j); + i+=1; + h.write_hex_file(f); +if(sys.argv[1]=="erase"): + client.MSP430masserase(); +if(sys.argv[1]=="ivt"): + client.MSP430dumpmem(0xFFE0,0xFFFF); +if(sys.argv[1]=="flash"): + f=sys.argv[2]; + start=0; + stop=0xFFFF; + if(len(sys.argv)>3): + start=int(sys.argv[3],16); + if(len(sys.argv)>4): + stop=int(sys.argv[4],16); + + h = IntelHex16bit(f); + + client.MSP430masserase(); + for i in h._buf.keys(): + #print "%04x: %04x"%(i,h[i>>1]); + if(i>=start and i>1]; + val2=client.MSP430pokeflash(i,val); + if(val!=val2): + print "Write error at %04x, %04x!=%04x." %( + i, val, val2); + if(i%0x100==0): + print "%04x" % i; +if(sys.argv[1]=="verify"): + f=sys.argv[2]; + start=0; + stop=0xFFFF; + if(len(sys.argv)>3): + start=int(sys.argv[3],16); + if(len(sys.argv)>4): + stop=int(sys.argv[4],16); + + h = IntelHex16bit(f); + for i in h._buf.keys(): + if(i>=start and i>1]!=peek): + print "ERROR at %04x, found %04x not %04x"%(i,peek,h[i>>1]); + if(i%0x100==0): + print "%04x" % i; +if(sys.argv[1]=="peek"): + start=0x0000; + if(len(sys.argv)>2): + start=int(sys.argv[2],16); + stop=start; + if(len(sys.argv)>3): + stop=int(sys.argv[3],16); + print "Peeking from %04x to %04x." % (start,stop); + while start<=stop: + print "%04x: %04x" % (start,client.MSP430peek(start)); + start=start+2; + +if(sys.argv[1]=="poke"): + start=0x0000; + val=0x00; + if(len(sys.argv)>2): + start=int(sys.argv[2],16); + if(len(sys.argv)>3): + val=int(sys.argv[3],16); + print "Poking %06x to become %04x." % (start,val); + + while client.MSP430peek(start)!=val: + client.MSP430pokeflash(start,val); + print "Poked to %04x" % client.MSP430peek(start); + + + +if(sys.argv[1]=="whatever"): + for i in [0x24FF, 0x2500, 0x2502, 0x2504]: + print "%04x" % client.MSP430peek(i); + +client.MSP430releasecpu(); +client.MSP430stop();