I am using pyJTAG for loading M430F149 devices. Problem that I am
experiencing is
that pyJTAG programs device (-eEpv) just to address 0x5911 (consistently).
The
rest of the flash is blank (0xFF). I am verifying this by doing memory dump

Intercept of original hex file

:1058B00062023F5009003E405808B01252493F4032
:1058C0000300315221533A413B4130410B120A123D
:1058D00021820A4F814E00003E4004570F41B01212
:1058E00054B60B4FB012F2564F9314200A123012D6
:1058F0000857031230125808B0127EAF1F426202DE
:105900003F5009003E405808B01252493F40030042
:105910003152223C0F4BB01234AE814F02000E4187
:105920002E533F400300B0122E631F4262021F4FEE
:105930004A00B012F23E1F4102000E4F0F5F0F5F90
:105940000F5F0F5F0F5F0F5E0C4F3A404A01B012BE
:105950005AB7824C36020F4321523A413B41304103
:105960000B122183814E00000B433E4004570F4130

Intercept of dump hex file

:1058B00062023F5009003E405808B01252493F4032
:1058C0000300315221533A413B4130410B120A123D
:1058D00021820A4F814E00003E4004570F41B01212
:1058E00054B60B4FB012F2564F9314200A123012D6
:1058F0000857031230125808B0127EAF1F426202DE
:105900003F5009003E405808B01252493F40030042
:105910003152FFFFFFFFFFFFFFFFFFFFFFFFFFFF12
:10592000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF87
:10593000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF77
:10594000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF67
:10595000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF57
:10596000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF47

Anybody run into same problem ? what is magical in 0x511 ?

Nenad





Reply via email to