This post has been edited 1 times, last edit by 'bobc' (Apr 19th 2011, 1:19pm). I found a workaround to debug Keil software with H-JTAG(free). How to configure KEIL(uVision3.51) with JTAG? In Keil, open Project>Options for target>Debug>Use RDI interface Driver>Settings>Browser and search for Yr. H-JTAG.dll in approprite folder. With a cheap Olimex Wiggler it could work like a true debugger(tracing, stepping and so on). But watch out, unless You're a pro, practice a lot. I actually used the H-JTAG v. 9 and - beside that Segger couldn't either download or debug my code- I was able to download my code via the RS232 interface and later correct the code until it was errorfree and, again download the correct code. Don't fret, there's always a workaround cheap JTAG stuff Godd luck « Last Edit: July 02, 2009, 08:44:04 08:44 by robban » Logged. This is the question. In the ARM toolset there are: 1. Display functions. SPI and I2C functions. CAN functions. Elemental IO functions. Send profile data (??). If you are interested in more details what is available, on the NI site there is 374931b.pdf file 'Getting Started with the LabVIEW Embedded module for ARM. I'm quoting from this doc: 'New Memory Access VIs The Embedded Module for ARM Microcontrollers now includes a Memory Access palette, which includes the following VIs: • CCG Mem Peek 8 • CCG Mem Peek 16 • CCG Mem Peek 32 • CCG Mem Poke 8 • CCG Mem Poke 16 • CCG Mem Poke 32 Use these VIs to read and write values to specific memory addresses.' J-flash Keygen![]() [SOLVED]License required for J-Flash ARM with SAM-ICE? Hi there, I am using an Atmel SAM-ICE with IAR Kickstart edition. Convert mp4 to mjpeg 320x240. I can download to Flash using the IAR IDE, but not with the J-Link ARM program. Dec 05, 2012 [SOLVED]License required for J-Flash ARM with SAM-ICE? Hi there, I am using an Atmel SAM-ICE with IAR Kickstart edition. I can download to Flash using the IAR IDE, but not with the J-Link ARM program. Returns a KeyGenerator object that generates secret keys for the specified algorithm. This method traverses the list of registered security Providers, starting with the most preferred Provider. A new KeyGenerator object encapsulating the KeyGeneratorSpi implementation from the first Provider that supports the specified algorithm is returned.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |