📄 jtag_avr_spy.doc
字号:
DocumentationThe jtag avr spy dumps the JTAG ICE traffic to RS232 inan array.The JTAG is nothing else then a synchronous protocollike a shift register (e.g. 74HCT164) : the TAP controller in this case is a bit more intelligent. This means that in order to read data you have to clock in(= write) data with the JTAG clk. So you have to create a 2way communication.The TAP controller uses a state machine to guide the data intoright register set. The instruction register can be seenas an address decoder to address the right register set.The data register shifts the data into and out of thisselected register set.I used some letters to clarify that the TAP controlleris writing the instruction/data register and which datais to be read or written.I made an assumption that the pause state - mentioned in thedatasheet - willnot be reached. In that case I used aquestion mark.How is it organised ?Spy toolEvery time a new sequence has been started up then the jtagspy outputs in the first column a letter : I for instructionregister and D for data register.In the second column there will be an I for data to be shiftedin and O for data to be shifted out of the selected register. Thishappens at the same time.The jtag spy immediately outputs the hexadecimal byte without anyspaces.Data into an instruction register cannot be higher than 4 bits (seems to be a requirement of the JTAG).This is a jtag reference point that there is just one hexadecimalbyte. So you can see that there is just one command to get or seta value/register/data/memory.This tool resides into the AVR ATmega16 but with some minor changesyou can run it on any avr.Host toolTheodore Roth wrote a complete set to initiate the JTAG ICE box : thejtagice-0.0.2.tar.gz. This excellent tool complements the jtag spyto what it is. You can read more details in the software.The resultNormally spoken you have to use 2 serial ports but for some reason itdoesnot work very well on my machine. So I had to use 2 GNU/Linux systems :one on which I captured the output of the spy tool and one to run thetool of Ted.I captured some of the results with redirection of the /dev/ttySx to text(as ofcourse the unix way, thanks Karl) so I can show you some resultsbut not all of it.The way it si doneI did some analysis on the results : you can find this in the resultdirectory.Armand
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -