I am using pyJTAG for loading M430F149 devices. Problem that I am experiencing is that pyJTAG programs device (-eEpv) just to address 0x5911 (consistently). The rest of the flash is blank (0xFF). I am verifying this by doing memory dump
Intercept of original hex file :1058B00062023F5009003E405808B01252493F4032 :1058C0000300315221533A413B4130410B120A123D :1058D00021820A4F814E00003E4004570F41B01212 :1058E00054B60B4FB012F2564F9314200A123012D6 :1058F0000857031230125808B0127EAF1F426202DE :105900003F5009003E405808B01252493F40030042 :105910003152223C0F4BB01234AE814F02000E4187 :105920002E533F400300B0122E631F4262021F4FEE :105930004A00B012F23E1F4102000E4F0F5F0F5F90 :105940000F5F0F5F0F5F0F5E0C4F3A404A01B012BE :105950005AB7824C36020F4321523A413B41304103 :105960000B122183814E00000B433E4004570F4130 Intercept of dump hex file :1058B00062023F5009003E405808B01252493F4032 :1058C0000300315221533A413B4130410B120A123D :1058D00021820A4F814E00003E4004570F41B01212 :1058E00054B60B4FB012F2564F9314200A123012D6 :1058F0000857031230125808B0127EAF1F426202DE :105900003F5009003E405808B01252493F40030042 :105910003152FFFFFFFFFFFFFFFFFFFFFFFFFFFF12 :10592000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF87 :10593000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF77 :10594000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF67 :10595000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF57 :10596000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF47 Anybody run into same problem ? what is magical in 0x511 ? Nenad