☞ http://www.hachangho.com/homev30/bbs/zboard.php?id=tech&page=1&sn1=&divpage=1&category=23&sn=off&ss=on&sc=on&select_arrange=headnum&desc=asc&no=200&PHPSESSID=83d882f14ca2d2ba04e0efbe5c3dcf1b
☞ http://blog.naver.com/jonglynn/80041264297
☞ http://blog.naver.com/saytonamul/150030345717
** Simple Attach
sys.cpu cortexr4
sys.o EnReset OFF
sys.o ResBreak OFF
sys.o WaitReset OFF
sys.o TRST OFF
sys.mc DEBUGACCESSPORT 0x0
sys.mc corebase 0x80001000
sys.m attach
ENDDO
** Basic command (1)
B:: area // Window pops up for the result of command
B:: diag 3400 // JTAG Port check
+++++++++++++++++++++++++++
JTAG scan chain diagnosis:
IR_Width = 4
DR_Width = 1
ID_Width = 32
ID_TAP#0 = 0x4ba00477 ARM JTAG-DP DAP
ID_Code = 0x4BA00477
+++++++++++++++++++++++++++
B:: diag 3411 // DAP check
++++++++++++++++++++++++++++++++++
Debug Access Port (DAP) Discovery:
AP = 0x0
IDR = 0x24770002 (MEM-AP APB)
BASE = 0x80000000 (ROM Table at 0x80000000)
0x80001000 Debug Logic: Processor core
0x80002000 Reading this module caused an error
+++++++++++ Message at Error case
B:: do debug // Debug window pops up -> Do step by step
** Basic command (2)
B:: d.test BASE_ADDRESS++OFFSET /random, increase, ...
** Sync.
data.load.efl "*.axf" /nocode
=> Synchronization to the running code
** Dump
d.save.binary FILE_NAME START_ADDRESS--STOP_ADDRESS
=> B:: d.save.binary C:\DUMP_DIR\dump.bin 0x40800000--0x40801000