Param Aggarwal 51ac0fe319 Actual pin mappings and the comment differ!
I was stuck trying to debug the issue why my probe would not find any attached targets. This is because I was doing the pin mapping as per the comments, and not the actual code. There is a mismatch!

This PR updates the comment to reflect the values set in code. :)
2017-01-01 14:50:58 +05:30
2012-10-24 07:34:30 +13:00
2016-10-22 13:07:42 -07:00
2011-02-07 11:01:10 +13:00
2015-03-07 11:03:50 -08:00
2016-12-04 10:47:01 +13:00

Black Magic Probe

Build Status Gitter Donate Kickstarter

Firmware for the Black Magic Debug Probe.

The Black Magic Probe is a modern, in-application debugging tool for embedded microprocessors. It allows you see what is going on 'inside' an application running on an embedded microprocessor while it executes. It is able to control and examine the state of the target microprocessor using a JTAG or Serial Wire Debugging (SWD) port and on-chip debug logic provided by the microprocessor. The probe connects to a host computer using a standard USB interface. The user is able to control exactly what happens using the GNU source level debugging software, GDB.

See online documentation at https://github.com/blacksphere/blackmagic/wiki

Binaries from the latest automated build are at http://builds.blacksphere.co.nz/blackmagic

Description
Rework of Jeff black magic probe
Readme 13 MiB
Languages
C 95.5%
Python 3%
Makefile 1.3%
Assembly 0.2%