Hi All.

I have been doing some work on reverse engineering the jtag/ocd
interface on the ppc440epx (which is a closed protocol). Turns out
I've had a bit of luck. It is now possible to 'debrick' a ROACH board,
ie load up a bootloader, without any proprietary tools or programmers.

The programmer I have used is an Amontec JTAGKey Tiny (which has an
FTDI ft2232 chip on it). The JTAG operation are performance using
urjtag, a nice GPL'ed tool which supports a number of jtag
programmers.

I have put all the details up on:
http://casper.berkeley.edu/wiki/ROACH_Debricking

The solution, as it sits, is rather incomplete, ugly, and less than
ideal. However, it does seem to work.

Here is a link describing the secret COP interface.
http://www.mail-archive.com/[email protected]/msg30394.html

I am pretty excited about this! Hopefully IBM and Freescale don't hunt
me down...

Cheers,
David

-- 
David George
Karoo Array Telescope
Tel: +27 11 442-2434
Email: [email protected]

Reply via email to