Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Tuesday April 24 2018, @04:51PM   Printer-friendly
from the on-the-wire dept.

Anyone who’s ever written more than a dozen or so lines of code knows that debugging is a part of life in our world. Anyone who’s written code for microcontrollers knows that physical debugging is a part of our life as well. Atmel processors uses a serial communications protocol called debugWire, which is a simpler version of JTAG and allows full read/write access to all registers and allows one to single step, break, etc. [Nerd Ralph], a prominent fixture here at Hackaday has dug into the AVR debugWire protocol and enlightened us with some valuable information.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 4, Insightful) by jmorris on Wednesday April 25 2018, @02:42AM (1 child)

    by jmorris (4844) on Wednesday April 25 2018, @02:42AM (#671483)

    We shouldn't have to be reverse engineering DebugWire. But Atmel decided to be dicks about it and now the brand is merged into a bigger, less hacker friendly blob it probably won't get any better. Look at a datasheet, they fully documented the older protocols in great detail but DebugWire they decided to hold closed and try to milk sheckels from developers with... and lock them to their Windows dev tools.

    Starting Score:    1  point
    Moderation   +2  
       Insightful=2, Total=2
    Extra 'Insightful' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   4  
  • (Score: 2) by jimtheowl on Wednesday April 25 2018, @03:04AM

    by jimtheowl (5929) on Wednesday April 25 2018, @03:04AM (#671490)
    I agree, but I'm not going to knock Atmel too much as I think they have had an overall very positive influence for hackers. It is common for the engineers to have to 'negotiate' something with management that they can leave out for the sake of ensuring the future flow of 'sheckels'.

    If they do get significantly less hacker friendly, there are plenty of alternatives. For instance I am just about to attempt to burn Mecrisp FORTH on a cheap F103C8T6 ARM STM32.
    That is the performance version based on the ARM Cortex-M3.
    https://en.wikipedia.org/wiki/STM32#STM32_F1