欢迎访问ic37.com |
会员登录 免费注册
发布采购

MC9S12P64CFT 参数 Datasheet PDF下载

MC9S12P64CFT图片预览
型号: MC9S12P64CFT
PDF下载: 下载PDF文件 查看货源
内容描述: 微控制器 [Microcontrollers]
分类和应用: 微控制器外围集成电路时钟
文件页数/大小: 566 页 / 7414 K
品牌: FREESCALE [ Freescale ]
 浏览型号MC9S12P64CFT的Datasheet PDF文件第134页浏览型号MC9S12P64CFT的Datasheet PDF文件第135页浏览型号MC9S12P64CFT的Datasheet PDF文件第136页浏览型号MC9S12P64CFT的Datasheet PDF文件第137页浏览型号MC9S12P64CFT的Datasheet PDF文件第139页浏览型号MC9S12P64CFT的Datasheet PDF文件第140页浏览型号MC9S12P64CFT的Datasheet PDF文件第141页浏览型号MC9S12P64CFT的Datasheet PDF文件第142页  
Background Debug Module (S12SBDMV1)  
5.3.3  
Family ID Assignment  
The family ID is an 8-bit value located in the BDM ROM in active BDM (at global address: 0x3_FF0F).  
The read-only value is a unique family ID which is 0xC2 for devices with an HCS12S core.  
5.4  
Functional Description  
The BDM receives and executes commands from a host via a single wire serial interface. There are two  
types of BDM commands: hardware and firmware commands.  
Hardware commands are used to read and write target system memory locations and to enter active  
background debug mode, see Section 5.4.3, “BDM Hardware Commands”. Target system memory  
includes all memory that is accessible by the CPU.  
Firmware commands are used to read and write CPU resources and to exit from active background debug  
mode, see Section 5.4.4, “Standard BDM Firmware Commands”. The CPU resources referred to are the  
accumulator (D), X index register (X), Y index register (Y), stack pointer (SP), and program counter (PC).  
Hardware commands can be executed at any time and in any mode excluding a few exceptions as  
highlighted (see Section 5.4.3, “BDM Hardware Commands”) and in secure mode (see Section 5.4.1,  
“Security”). BDM firmware commands can only be executed when the system is not secure and is in active  
background debug mode (BDM).  
5.4.1  
Security  
If the user resets into special single chip mode with the system secured, a secured mode BDM firmware  
lookup table is brought into the map overlapping a portion of the standard BDM firmware lookup table.  
The secure BDM firmware verifies that the on-chip Flash EEPROM are erased. This being the case, the  
UNSEC and ENBDM bit will get set. The BDM program jumps to the start of the standard BDM firmware  
and the secured mode BDM firmware is turned off and all BDM commands are allowed. If the Flash does  
not verify as erased, the BDM firmware sets the ENBDM bit, without asserting UNSEC, and the firmware  
enters a loop. This causes the BDM hardware commands to become enabled, but does not enable the  
firmware commands. This allows the BDM hardware to be used to erase the Flash.  
BDM operation is not possible in any other mode than special single chip mode when the device is secured.  
The device can only be unsecured via BDM serial interface in special single chip mode. For more  
information regarding security, please see the S12S_9SEC Block Guide.  
5.4.2  
Enabling and Activating BDM  
The system must be in active BDM to execute standard BDM firmware commands. BDM can be activated  
only after being enabled. BDM is enabled by setting the ENBDM bit in the BDM status (BDMSTS)  
register. The ENBDM bit is set by writing to the BDM status (BDMSTS) register, via the single-wire  
interface, using a hardware command such as WRITE_BD_BYTE.  
1
After being enabled, BDM is activated by one of the following :  
Hardware BACKGROUND command  
1. BDM is enabled and active immediately out of special single-chip reset.  
S12P-Family Reference Manual, Rev. 1.13  
138  
Freescale Semiconductor  
 复制成功!