From 237d6b89f6947df237f5fef2fed47db7e8efd0c6 Mon Sep 17 00:00:00 2001 From: Jason Kotzin Date: Sun, 15 Aug 2021 22:18:41 -0700 Subject: [PATCH] Updating Readme --- README.md | 64 +++++++++++++++++++++++++++++++++++++++++-------------- 1 file changed, 48 insertions(+), 16 deletions(-) diff --git a/README.md b/README.md index 9f260082..628cc934 100644 --- a/README.md +++ b/README.md @@ -1,22 +1,54 @@ -Black Magic Probe -================= +Jeff Probe +========== -[![Build Status](https://travis-ci.org/blacksphere/blackmagic.svg?branch=master)](https://travis-ci.org/blacksphere/blackmagic) -[![Gitter](https://badges.gitter.im/Join%20Chat.svg)](https://gitter.im/blacksphere/blackmagic?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge) -[![Donate](https://img.shields.io/badge/paypal-donate-blue.svg)](https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=N84QYNAM2JJQG) -[![Kickstarter](https://img.shields.io/badge/kickstarter-back%20us-14e16e.svg)](https://www.kickstarter.com/projects/esden/1bitsy-and-black-magic-probe-demystifying-arm-prog) +This is a fork of the [original Black Magic Probe](https://github.com/blacksphere/blackmagic). -Firmware for the Black Magic Debug Probe. +The original is arguably better, faster and wider supported. However, this +project was a way to offer an affordable version and I'll rely on community +support and pull requests. -The Black Magic Probe is a modern, in-application debugging tool for -embedded microprocessors. It allows you see what is going on 'inside' an -application running on an embedded microprocessor while it executes. It is -able to control and examine the state of the target microprocessor using a -JTAG or Serial Wire Debugging (SWD) port and on-chip debug logic provided -by the microprocessor. The probe connects to a host computer using a -standard USB interface. The user is able to control exactly what happens -using the GNU source level debugging software, GDB. +One urguably better funncton is the ability to do DEBUG and Serial communication +over a single JTAG cable when paired with a device that uses single wire JTAG. + +Normally, the serial header can be used on a target for the serial port, and +shows up as the second serial device on the system, however, we can dynamically +change the pins to use the ones on the JTAG cable with the following command: + +``` bash + $ mon convert_tdio enable +``` + +Compilation +--- + +Newer toolchains can cause issues. I usually work 4_9-2014q4-20141203 found [here.](https://launchpad.net/gcc-arm-embedded/4.9/4.9-2014-q4-major/+download/gcc-arm-none-eabi-4_9-2014q4-20141203-mac.tar.bz2) + +the versionfollowing version + +```bash + $ make clean + $ make PROBE_HOST=jeff CUSTOM_SER=1 + $ dfu-util --device ,1d50:6017 -s 0x00002000:leave -D src/blackmagic.bin +``` + +CUSTOM OPTIONS +--- + +On mac, our device shows up with a serial number /dev/tty.cuJEFF123HDC + +This can be annoy if we want to autocnnect with a gith script. We can override +the use of a serial number by doing a custom compliation such that our device +shows up with the following: /dev/cu.usbmodemJEFF1 and /dev/cu.usbmodemJEFF3 + +```bash + $ make PROBE_HOST=jeff CUSTOM_SER=1 +``` + +More +--- + +More helpful information can be found on the black magic probe [readme](https://github.com/blacksphere/blackmagic/blob/master/README.md#black-magic-probe), which is relevant. See online documentation at https://github.com/blacksphere/blackmagic/wiki -Binaries from the latest automated build are at http://builds.blacksphere.co.nz/blackmagic +Binaries from the latest automated build can be found on the release page.