msp430: mspgcc tool chain and iar kickstart question

Do you have a question? Post it now! No Registration Necessary

Translate This Thread From English to

Threaded View
newbie question: i've got a device (a radio control transmitter for
model airplanes/helicopters) with 'f149. the pads for the jtag are
present and we know the fuse is not burned.  i'd like to read the
contents of the flash (the firmware), make some edits, and upload the
changes.

does the mspgcc tool chain include a means to read the flash memory as
well as a disassembler?  can the IAR kickstart do this?  are their
other free tools that might do this?  many thanks.

Re: msp430: mspgcc tool chain and iar kickstart question
Quoted text here. Click to load it

Yes.  The msp430-jtag utility can do that.

Quoted text here. Click to load it

Yes. GDB includes a dissassembler, and the msp43-objdump also
has a disassembler feature.  Neither is particularly well
suited to a reverse engineering effort (if that's where you're
headed).  I have seen 8086 dissassemblers that were intended
for reverse-engineering: they allowed the user to interactively
add labels, comments, and mark regions as code vs. data.

I've never seen such a beast for the '430.

Quoted text here. Click to load it

I would guess so, but I don't know.

Quoted text here. Click to load it

Rowley's CrossWorks has a free trial version, and a personal
license is only US$149:

http://www.rowley.co.uk/msp430/index.htm

--
Grant Edwards                   grante             Yow!  I'm having
                                  at               a tax-deductible
We've slightly trimmed the long signature. Click to see the full one.
Re: msp430: mspgcc tool chain and iar kickstart question
Quoted text here. Click to load it

I should mention that of course GDB can as well...

Quoted text here. Click to load it

                                            msp430-objdump

--
Grant Edwards                   grante             Yow!  My mind is a potato
                                  at               field...
We've slightly trimmed the long signature. Click to see the full one.
Re: msp430: mspgcc tool chain and iar kickstart question

Quoted text here. Click to load it

many thanks for your reply.  that was very helpful. i don't think what
i'm hoping to do would be considered reverse engineering.  there are
bug and desired features that the manufacturer seems unwilling or
unable to fix/add in a timely manner. i'd like to make these tweaks
and additions for my own device and to give freely to anyone who may
be interested if i succeed.

anyway, it sounds like i'll have my bases covered with mspgcc or
kickstart or the commercial product you suggested.  thanks again.

Re: msp430: mspgcc tool chain and iar kickstart question

Quoted text here. Click to load it

it looks like objdump requires the input file to be in a particular
format; e.g.  tekhex, binary, ihex, etc.  google hasn't help me find a
spec for those formats.

Re: msp430: mspgcc tool chain and iar kickstart question
Quoted text here. Click to load it

It expects an .elf file. msp430-objcopy can convert from
various formats (srec, ihex, etc.) to elf.

--
Grant Edwards                   grante             Yow!  My mind is a potato
                                  at               field...
We've slightly trimmed the long signature. Click to see the full one.
Re: msp430: mspgcc tool chain and iar kickstart question

Quoted text here. Click to load it

thanks grant.  before i saw your response, i posted a question about
converting my raw hex dump to one of those formats.  so far, i can
only find a spec for the srec format, so i guess i'll start writing a
converter for it.  thanks.

Re: msp430: mspgcc tool chain and iar kickstart question
Quoted text here. Click to load it

msp430-jtag will create either an ihex or binary file, and
objcopy can convert either.

Quoted text here. Click to load it

How did you get a raw hex dump?

--
Grant Edwards                   grante             Yow!  Are we live or
                                  at               on tape?
We've slightly trimmed the long signature. Click to see the full one.
Re: msp430: mspgcc tool chain and iar kickstart question

Quoted text here. Click to load it

my device and be reflashed via my pc.  i used a serial port monitor to
sniff and record the firmware update that was sent to the device.

Re: msp430: mspgcc tool chain and iar kickstart question
i very much appreciate your help grant.  if you don't mind, let's
continue this discussion on the "msp430: disassembling raw binary"
thread.  thanks.

Re: msp430: mspgcc tool chain and iar kickstart question
Quoted text here. Click to load it

Look up "info binutils" or "man binutils".  I believe it depends on
the BFD package to decode file types.

--
Chuck F (cbfalconer at maineline dot net)
   Available for consulting/temporary embedded and systems.
We've slightly trimmed the long signature. Click to see the full one.

Site Timeline