29386aee14
While scanning the USB bus for devices, stm32_scan() can find a device that it doesn't have permissions to access it, dfu/usb class raises an exception and stm32_scan() stops the scan completely. This fix resolves the scan issue, by allowing the scan loop to continue. While at it, there are cosmetic fixes related with tabs/spaces and readability. Signed-off-by: Nikolay Dimitrov <nikolay.dimitrov@retrohub.org> |
||
---|---|---|
.. | ||
stubs | ||
README | ||
bootprog.py | ||
dfu-convert.py | ||
dfu.py | ||
gdb.py | ||
get_openocd_nrf51_ids.py | ||
hexprog.py | ||
stm32_mem.py | ||
swolisten.c |
README
This directory contains some useful scripts for working on the Black Magic Debug project. bootprog.py - Production programmer using the STM32 SystemMemory bootloader. hexprog.py - Write an Intel hex file to a target using the GDB protocol. stm32_mem.py - Access STM32 Flash memory using USB DFU class interface. stubs/ - Source code for the microcode strings included in hexprog.py.