It all works fine but when I try to dump 1 meg of flash starting at 0x1FC00000 I only get the first 64K dumped correctly. Everything after 0x1FC10000 is all 00 00 00....
Is this read protected? The first 64K is identical to Mick's bootloader.bin so I'm confident the interface is working correctly.
This is a short version my output from 0x1FC10000
BTVJTAG>flaps -backup:custom /instrlen:5 /fc:01
/window:1FC00000 /start:1FC10000 /length:00000100 /notimestamp /xeloa
=====================================================
FLAPS MIPS EJTAG Flash Utility probes-v1.4
Patched for BT Vision DiT9719 by 007.4
=====================================================
Waiting 1 second..
Selected port = 0x0378
Probing bus ... Done
Instruction Length set to 5
CPU Chip ID: 00001000011000110000000000000001 (08630001)
*** Found a SigmaDesigns SMP8634 Rev A CPU chip ***
- EJTAG IMPCODE ............... : 01000000010000010100000000000000 (40414000)
- EJTAG Version ............... : 2.6
- EJTAG Implementation flags .. : R4k ASID_8 MIPS16 NoDMA MIPS32
Issuing Processor / Peripheral Reset ... Done
Enabling Memory Writes ... Skipped
Halting Processor ... <Processor Entered Debug Mode!> ... Done
Init PrAcc ... Done
Clearing Watchdog ... Done
Done
Flash Vendor ID: 00000000000000000000000000000000 (00000000)
Flash Device ID: 00000000000000000000000000000000 (00000000)
- Flash Chip Window Start .... : 1fc00000
- Flash Chip Window Length ... : 00100000
- Selected Area Start ........ : 1fc10000
- Selected Area Length ....... : 00000100
*** Manually Selected a MX29LV800BTC 512kx16 TopB (1MB) Flash Chip ***
*** You Selected to Backup the CUSTOM.BIN ***
=========================
Backup Routine Started
=========================
Saving CUSTOM.BIN.SAVED to Disk...
[ 1% Backed Up] 1fc10000: 00000000 00000000 00000000 00000000
[ 7% Backed Up] 1fc10010: 00000000 00000000 00000000 00000000
[ 14% Backed Up] 1fc10020: 00000000 00000000 00000000 00000000
[ 20% Backed Up] 1fc10030: 00000000 00000000 00000000 00000000
[ 26% Backed Up] 1fc10040: 00000000 00000000 00000000 00000000
[ 32% Backed Up] 1fc10050: 00000000 00000000 00000000 00000000
[ 39% Backed Up] 1fc10060: 00000000 00000000 00000000 00000000
[ 45% Backed Up] 1fc10070: 00000000 00000000 00000000 00000000
[ 51% Backed Up] 1fc10080: 00000000 00000000 00000000 00000000
[ 57% Backed Up] 1fc10090: 00000000 00000000 00000000 00000000
[ 64% Backed Up] 1fc100a0: 00000000 00000000 00000000 00000000
[ 70% Backed Up] 1fc100b0: 00000000 00000000 00000000 00000000
[ 76% Backed Up] 1fc100c0: 00000000 00000000 00000000 00000000
[ 82% Backed Up] 1fc100d0: 00000000 00000000 00000000 00000000
[ 89% Backed Up] 1fc100e0: 00000000 00000000 00000000 00000000
[ 95% Backed Up] 1fc100f0: 00000000 00000000 00000000 00000000
Done (CUSTOM.BIN.SAVED saved to Disk OK)
bytes written: 256
=========================
Backup Routine Complete
=========================
elapsed time: 0 seconds
*** REQUESTED OPERATION IS COMPLETE ***
Also I have to manually select the flash chip. Anyone know why it is not correctly identified?
Help please!
Cheers
007.4
Not familiar with that hardware or flash utility. Just curious, what speeds do you get over LPT port?
I made this
http://www.t-hack.com/wiki/index.php/EJTAG and used this flash utility
http://www.t-hack.com/wiki/index.php/Dump_X300T_Bootloaderto dump parts of the flash on my SMP8634 based box
http://www.t-hack.com/forum/index.php?topic=859.0. Try that combo if possible.
Where exactly are you starting to read from? Because you said starting at 0x1FC00000, but in the code section it says /start:1FC10000. (I use the same value for "/window:" and "/start:", but admittedly I do not know what the "/window:" command even does.
Also the beginning of the Flash is always mapped to 0xac000000. Try this tool also
http://www.t-hack.com/wiki/index.php/Debrick_SMP863x_DeviceGood Luck.