Swift Geek (Sebastian Grzywna)
Swift Geek (Sebastian Grzywna)
@niztor could you post dump of code options and part number it displays for SH79F084A? I think it might come handy for reference
@gashtaan [I was waiting](https://github.com/gashtaan/sinowealth-8051-dumper/issues/2#issuecomment-1435658535) for you to mention other opcodes, especially erase ones, and I'm only aware of one write opcode (0x42) that likely writes just to code options area....
@gashtaan I definitely don't have smarts required to reverse the way you did it, but if it's too much work for you then that's fine. I would have never figured...
It's the same protocol and target devices, just different "programmer"
@carlossless is mass-erase exposed in software as well? If so I would love see capture of that too. Though I don't see any security capabilities in SH68F88 die, so I...
Snippet from one of the datasheets, I was basing this on: > The mass erase operation will erase all the contents of program code, code option, code protect bit and...
There appears to be consistent sinolink glitch on TDI line, 2 samples long, after capture of 8bit+1bit sync/wait (TDO/MISO is delayed by one cycle sometimes). Noticeable especially with 0xFF when...
Looks like we are writing at least to some IB_* SFR registers **IB_CON1:** > 0xE6: Erase the selected block > 0x6E: Write to the selected block Would `0x4B` be mass...
Since official programmer is now known to use STM32F2, I was thinking about recreating it in some way, though if logic analyzer captures could be made for JTAG debug session...
Is that sequence described somewhere? If it behaves just like ISP pin straps, then in eg. BYK816 bootloader it points into completely random place. I only found reference to USB...