drivers/bcm2835gpio: fix usage messages
[openocd.git] / contrib / rpc_examples / ocd_rpc_example.py
1 #!/usr/bin/env python3
2 """
3 OpenOCD RPC example, covered by GNU GPLv3 or later
4 Copyright (C) 2014 Andreas Ortmann (ortmann@finf.uni-hannover.de)
5
6
7 Example output:
8 ./ocd_rpc_example.py
9 echo says hi!
10
11 target state: halted
12 target halted due to debug-request, current mode: Thread
13 xPSR: 0x01000000 pc: 0x00000188 msp: 0x10000fd8
14
15 variable @ 0x10000000: 0x01c9c380
16
17 variable @ 0x10000000: 0xdeadc0de
18
19 memory (before): ['0xdeadc0de', '0x00000011', '0xaaaaaaaa', '0x00000023',
20 '0x00000042', '0x0000ffff']
21
22 memory (after): ['0x00000001', '0x00000000', '0xaaaaaaaa', '0x00000023',
23 '0x00000042', '0x0000ffff']
24 """
25
26 import socket
27 import itertools
28
29 def strToHex(data):
30 return map(strToHex, data) if isinstance(data, list) else int(data, 16)
31
32 def hexify(data):
33 return "<None>" if data is None else ("0x%08x" % data)
34
35 def compareData(a, b):
36 for i, j, num in zip(a, b, itertools.count(0)):
37 if i != j:
38 print("difference at %d: %s != %s" % (num, hexify(i), hexify(j)))
39
40
41 class OpenOcd:
42 COMMAND_TOKEN = '\x1a'
43 def __init__(self, verbose=False):
44 self.verbose = verbose
45 self.tclRpcIp = "127.0.0.1"
46 self.tclRpcPort = 6666
47 self.bufferSize = 4096
48
49 self.sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
50
51 def __enter__(self):
52 self.sock.connect((self.tclRpcIp, self.tclRpcPort))
53 return self
54
55 def __exit__(self, type, value, traceback):
56 try:
57 self.send("exit")
58 finally:
59 self.sock.close()
60
61 def send(self, cmd):
62 """Send a command string to TCL RPC. Return the result that was read."""
63 data = (cmd + OpenOcd.COMMAND_TOKEN).encode("utf-8")
64 if self.verbose:
65 print("<- ", data)
66
67 self.sock.send(data)
68 return self._recv()
69
70 def _recv(self):
71 """Read from the stream until the token (\x1a) was received."""
72 data = bytes()
73 while True:
74 chunk = self.sock.recv(self.bufferSize)
75 data += chunk
76 if bytes(OpenOcd.COMMAND_TOKEN, encoding="utf-8") in chunk:
77 break
78
79 if self.verbose:
80 print("-> ", data)
81
82 data = data.decode("utf-8").strip()
83 data = data[:-1] # strip trailing \x1a
84
85 return data
86
87 def readVariable(self, address):
88 raw = self.send("ocd_mdw 0x%x" % address).split(": ")
89 return None if (len(raw) < 2) else strToHex(raw[1])
90
91 def readMemory(self, wordLen, address, n):
92 self.send("array unset output") # better to clear the array before
93 self.send("mem2array output %d 0x%x %d" % (wordLen, address, n))
94
95 output = [*map(int, self.send("ocd_echo $output").split(" "))]
96 d = dict([tuple(output[i:i + 2]) for i in range(0, len(output), 2)])
97
98 return [d[k] for k in sorted(d.keys())]
99
100 def writeVariable(self, address, value):
101 assert value is not None
102 self.send("mww 0x%x 0x%x" % (address, value))
103
104 def writeMemory(self, wordLen, address, n, data):
105 array = " ".join(["%d 0x%x" % (a, b) for a, b in enumerate(data)])
106
107 self.send("array unset 1986ве1т") # better to clear the array before
108 self.send("array set 1986ве1т { %s }" % array)
109 self.send("array2mem 1986ве1т 0x%x %s %d" % (wordLen, address, n))
110
111 if __name__ == "__main__":
112
113 def show(*args):
114 print(*args, end="\n\n")
115
116 with OpenOcd() as ocd:
117 ocd.send("reset")
118
119 show(ocd.send("ocd_echo \"echo says hi!\"")[:-1])
120 show(ocd.send("capture \"ocd_halt\"")[:-1])
121
122 # Read the first few words at the RAM region (put starting adress of RAM
123 # region into 'addr')
124 addr = 0x10000000
125
126 value = ocd.readVariable(addr)
127 show("variable @ %s: %s" % (hexify(addr), hexify(value)))
128
129 ocd.writeVariable(addr, 0xdeadc0de)
130 show("variable @ %s: %s" % (hexify(addr), hexify(ocd.readVariable(addr))))
131
132 data = [1, 0, 0xaaaaaaaa, 0x23, 0x42, 0xffff]
133 wordlen = 32
134 n = len(data)
135
136 read = ocd.readMemory(wordlen, addr, n)
137 show("memory (before):", list(map(hexify, read)))
138
139 ocd.writeMemory(wordlen, addr, n, data)
140
141 read = ocd.readMemory(wordlen, addr, n)
142 show("memory (after):", list(map(hexify, read)))
143
144 compareData(read, data)
145
146 ocd.send("resume")

Linking to existing account procedure

If you already have an account and want to add another login method you MUST first sign in with your existing account and then change URL to read https://review.openocd.org/login/?link to get to this page again but this time it'll work for linking. Thank you.

SSH host keys fingerprints

1024 SHA256:YKx8b7u5ZWdcbp7/4AeXNaqElP49m6QrwfXaqQGJAOk gerrit-code-review@openocd.zylin.com (DSA)
384 SHA256:jHIbSQa4REvwCFG4cq5LBlBLxmxSqelQPem/EXIrxjk gerrit-code-review@openocd.org (ECDSA)
521 SHA256:UAOPYkU9Fjtcao0Ul/Rrlnj/OsQvt+pgdYSZ4jOYdgs gerrit-code-review@openocd.org (ECDSA)
256 SHA256:A13M5QlnozFOvTllybRZH6vm7iSt0XLxbA48yfc2yfY gerrit-code-review@openocd.org (ECDSA)
256 SHA256:spYMBqEYoAOtK7yZBrcwE8ZpYt6b68Cfh9yEVetvbXg gerrit-code-review@openocd.org (ED25519)
+--[ED25519 256]--+
|=..              |
|+o..   .         |
|*.o   . .        |
|+B . . .         |
|Bo. = o S        |
|Oo.+ + =         |
|oB=.* = . o      |
| =+=.+   + E     |
|. .=o   . o      |
+----[SHA256]-----+
2048 SHA256:0Onrb7/PHjpo6iVZ7xQX2riKN83FJ3KGU0TvI0TaFG4 gerrit-code-review@openocd.zylin.com (RSA)