Jump to content
Tuts 4 You
secursig

CPU32 Embedded Reversing JTAG

Rate this topic

Recommended Posts

secursig

Anyone have any experience working with ABATRON BDI2000 or BDI3000 on 683XX based architecture targets? These are the ones that use the CPU32 instruction set. I also have other JTAG pods that support CPU32, but the support for it is kind of dead these days since over thing has gone the way of ARM. The ABATRON I could never do much with except use the single hardware breakpoint, dump registers and memory. Still pretty useful, but it sucks having to clear the breakpoint and re-add it every time you want to step over any call in code. Soft breakpoints are not an option usually because the target devices usually boot from a rom or bootloader in flash which of course is not directly writeable like SRAM. other targets actually run the main code from ROM or flash so you have the same problem. I'm curious to know any experience anyone has had with debugging targets running from ROM or what your approach was, and which JTAG you used.

 

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×
×
  • Create New...