欢迎访问ic37.com |
会员登录 免费注册
发布采购

56F8367_09 参数 Datasheet PDF下载

56F8367_09图片预览
型号: 56F8367_09
PDF下载: 下载PDF文件 查看货源
内容描述: 16位数字信号控制器 [16-bit Digital Signal Controllers]
分类和应用: 控制器
文件页数/大小: 182 页 / 1852 K
品牌: FREESCALE [ Freescale ]
 浏览型号56F8367_09的Datasheet PDF文件第128页浏览型号56F8367_09的Datasheet PDF文件第129页浏览型号56F8367_09的Datasheet PDF文件第130页浏览型号56F8367_09的Datasheet PDF文件第131页浏览型号56F8367_09的Datasheet PDF文件第133页浏览型号56F8367_09的Datasheet PDF文件第134页浏览型号56F8367_09的Datasheet PDF文件第135页浏览型号56F8367_09的Datasheet PDF文件第136页  
EXAMPLE 2: In this example, the system clock has been set up with a value of 32MHz, making the FM  
input clock 16MHz. Because that is greater than 12.8MHz, PRDIV8 = FM_CLKDIV[6] = 1. Using the  
following equation yields a DIV value of 9 for a clock of 200kHz, and a DIV value of 10 for a clock of  
181kHz. This translates to an FM_CLKDIV[6:0] value of $49 or $4A, respectively.  
SYS_CLK  
( )  
(2)(8)  
150[kHz]  
200[kHz]  
<
<
(DIV + 1)  
Once the LOCKOUT_RECOVERY instruction has been shifted into the instruction register, the clock  
divider value must be shifted into the corresponding 7-bit data register. After the data register has been  
updated, the user must transition the TAP controller into the RUN-TEST/IDLE state for the lockout  
sequence to commence. The controller must remain in this state until the erase sequence has completed.  
For details, see the JTAG Section in the 56F8300 Peripheral User Manual.  
Note:  
Once the lockout recovery sequence has completed, the user must reset both the JTAG TAP controller  
(by asserting TRST) and the device (by asserting external chip reset) to return to normal unsecured  
operation.  
7.2.4  
Product Analysis  
The recommended method of unsecuring a programmed device for product analysis of field failures is via  
the backdoor key access. The customer would need to supply Technical Support with the backdoor key  
and the protocol to access the backdoor routine in the Flash. Additionally, the KEYEN bit that allows  
backdoor key access must be set.  
An alternative method for performing analysis on a secured microcontroller would be to mass-erase and  
reprogram the Flash with the original code, but modify the security bytes.  
To insure that a customer does not inadvertently lock himself out of the device during programming, it is  
recommended that he program the backdoor access key first, his application code second, and the security  
bytes within the FM configuration field last.  
Part 8 General Purpose Input/Output (GPIO)  
8.1 Introduction  
This section is intended to supplement the GPIO information found in the 56F8300 Peripheral User  
Manual and contains only chip-specific information. This information supercedes the generic information  
in the 56F8300 Peripheral User Manual.  
8.2 Memory Maps  
The width of the GPIO port defines how many bits are implemented in each of the GPIO registers. Based  
on this and the default function of each of the GPIO pins, the reset values of the GPIOx_PUR and  
GPIOx_PER registers will change from port to port. Table 8-3 defines the actual reset values of these  
registers.  
56F8367 Technical Data, Rev. 9  
132  
Freescale Semiconductor  
Preliminary