Hi,
Trimming out the PORT_GROUPING attribute allowed the rest of the
Lattice BSDL to be parsed. I have a patch that adds the device to the
database (not sure if you pull commits from Github or not) here:
  
https://github.com/shuckc/urjtag/commit/a131efaef0dca84a5b8a7860d3158e13f4493f62

Programming the chip using .SVF files output from the vendor tool
chain worked, as did reading the BSR.

My interest was to build some automated hardware regression tests
after programming, so I added a function 'get_dr_out_boundary_dict' to
the Python bindings. This returns the contents of the BSR register as
a dictionary, keyed by the pin names - sample below. Commit is:
  
https://github.com/shuckc/urjtag/commit/12086b4d2b76ad52c792b33975e92bb8756a42f7

Would be happy to rework as required to get either upstream if you are willing.

Chris

$ ./jtagRead.py
Connected to libftdi driver.
IR length: 8
Chain length: 1
Device Id: 00000001000000010010000001000011 (0x01012043)
  Manufacturer: Lattice Semiconductors (0x043)
  Part(0):      LFE3_35EA (0x1012)
  Stepping:     0
  Filename:     /usr/share/urjtag/lattice/lfe3-35ea/lfe3_35ea_fpbga484

LED0    DL UP  1 (PR66A)
LED1       L0  1 (PR66B)
LED2     Poll  1 (PR68A)
LED3      PLL  1 (PR68B)
LED4           0 (PR69A)
LED5           0 (PR69B)
LED6           0 (PR71A)
LED7           0 (PR71B)

$ cat jtagRead.py
#!/usr/bin/python
import urjtag

urc = urjtag.chain()
urc.cable("FT2232", "vid=0x0403", "pid=0x6010", "interface=0")
urc.tap_detect()

# setup chain to part0, sample pins
urc.part(0)
urc.set_instruction('SAMPLE/PRELOAD')
urc.shift_ir()

# shift data through
urc.shift_dr()
outval = urc.get_dr_out_boundary_dict()

print
for (x,(port,fn)) in enumerate([
        ('PR66A','DL UP'),
        ('PR66B','L0'),
        ('PR68A','Poll'),
        ('PR68B','PLL'),
        ('PR69A',''),
        ('PR69B',''),
        ('PR71A',''),
        ('PR71B','')
       ]):
   print "LED%d %8s %2d (%s)" % (x, fn, 1-outval[port],port)

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
UrJTAG-development mailing list
UrJTAG-development@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/urjtag-development

Reply via email to