Hi, Trimming out the PORT_GROUPING attribute allowed the rest of the Lattice BSDL to be parsed. I have a patch that adds the device to the database (not sure if you pull commits from Github or not) here: https://github.com/shuckc/urjtag/commit/a131efaef0dca84a5b8a7860d3158e13f4493f62
Programming the chip using .SVF files output from the vendor tool chain worked, as did reading the BSR. My interest was to build some automated hardware regression tests after programming, so I added a function 'get_dr_out_boundary_dict' to the Python bindings. This returns the contents of the BSR register as a dictionary, keyed by the pin names - sample below. Commit is: https://github.com/shuckc/urjtag/commit/12086b4d2b76ad52c792b33975e92bb8756a42f7 Would be happy to rework as required to get either upstream if you are willing. Chris $ ./jtagRead.py Connected to libftdi driver. IR length: 8 Chain length: 1 Device Id: 00000001000000010010000001000011 (0x01012043) Manufacturer: Lattice Semiconductors (0x043) Part(0): LFE3_35EA (0x1012) Stepping: 0 Filename: /usr/share/urjtag/lattice/lfe3-35ea/lfe3_35ea_fpbga484 LED0 DL UP 1 (PR66A) LED1 L0 1 (PR66B) LED2 Poll 1 (PR68A) LED3 PLL 1 (PR68B) LED4 0 (PR69A) LED5 0 (PR69B) LED6 0 (PR71A) LED7 0 (PR71B) $ cat jtagRead.py #!/usr/bin/python import urjtag urc = urjtag.chain() urc.cable("FT2232", "vid=0x0403", "pid=0x6010", "interface=0") urc.tap_detect() # setup chain to part0, sample pins urc.part(0) urc.set_instruction('SAMPLE/PRELOAD') urc.shift_ir() # shift data through urc.shift_dr() outval = urc.get_dr_out_boundary_dict() print for (x,(port,fn)) in enumerate([ ('PR66A','DL UP'), ('PR66B','L0'), ('PR68A','Poll'), ('PR68B','PLL'), ('PR69A',''), ('PR69B',''), ('PR71A',''), ('PR71B','') ]): print "LED%d %8s %2d (%s)" % (x, fn, 1-outval[port],port) ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ UrJTAG-development mailing list UrJTAG-development@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/urjtag-development