Go to file
Gareth McMullin e6504e149b cortexm: Implement single register read/write 2019-09-01 20:38:38 +02:00
driver Add udev rules 2019-01-07 13:32:58 +13:00
libopencm3@3eff201a4b Target latest libopencm3 2019-08-14 00:57:15 -07:00
scripts Made script executable with python3. 2019-08-30 15:09:35 +02:00
src cortexm: Implement single register read/write 2019-09-01 20:38:38 +02:00
upgrade Clarify STM32F103x8 Flashsize handling. 2019-09-01 12:11:51 +02:00
.gitignore jtag/swd: Rename defines/make variables to allow removal of weak attribute 2019-07-18 20:54:10 +02:00
.gitmodules Changed libopencm3 url to https. 2012-10-24 07:34:30 +13:00
.travis.yml libftdi: Allow to compile with mingw and cygwin and use recent libftdi1. 2019-01-07 15:31:57 +01:00
COPYING Added README and COPYING 2011-02-07 11:01:10 +13:00
HACKING Replace README and HACKING with references to the Github wiki. 2014-08-01 21:00:25 +12:00
Makefile build: Use a separate NO_LIBOPENCM3 flag to disable libopencm3 2019-08-05 15:24:16 +02:00
README.md Changed the Gitter chat link to Discord. 2019-08-26 17:22:02 -07:00
UsingSWO swlink: Enable UART2 for SWO. 2018-10-03 15:19:33 -07:00

README.md

Black Magic Probe

Build Status Discord Donate Kickstarter

Firmware for the Black Magic Debug Probe.

The Black Magic Probe is a modern, in-application debugging tool for embedded microprocessors. It allows you see what is going on 'inside' an application running on an embedded microprocessor while it executes. It is able to control and examine the state of the target microprocessor using a JTAG or Serial Wire Debugging (SWD) port and on-chip debug logic provided by the microprocessor. The probe connects to a host computer using a standard USB interface. The user is able to control exactly what happens using the GNU source level debugging software, GDB.

See online documentation at https://github.com/blacksphere/blackmagic/wiki

Binaries from the latest automated build are at http://builds.blacksphere.co.nz/blackmagic