Skip to content

Add nrf52840 HIC #1015

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 16 commits into
base: develop
Choose a base branch
from
Open

Conversation

mbrossard
Copy link
Contributor

@mbrossard mbrossard commented Mar 17, 2023

Based on the nRF52820 HIC and efforts by @maxd-nordic.

@mbrossard mbrossard force-pushed the feature/nrf52840_hic branch from 56cda97 to 2155b42 Compare March 23, 2023 02:06
@maxd-nordic
Copy link

In case you'd like to keep the factory bootloader on the nrf52840 dongle: This contains an nrf52840_if build with flash offset 0x1000. You can program the HEX file with the nRF Connect Programmer app. PCA10059_daplink.zip

@rkyurpan256
Copy link

rkyurpan256 commented Feb 21, 2025

Hello all,

Here is my short statement on the pull request:
The results demonstrate that the proposed modifications are functional, stable, and ready to be merged as much as my experience can show.

The long story:
I have tested and I am using the changes from the current pull request to perform target programming and debugging. Here is description on what was done.

Two devices have been used as DAPLink debug probes.

nRF52840 Dongle by Nordic Semiconductor [1]

The dongle was used with the default pinout assignment from the pull request (see /docs/hic/nrf52840.md from the feature branch)

nRF52840 MDK USB Dongle by Makerdiary [2]

The Makerdiary's dongle was used with overridden pinout assignment to mach the dongle pinout [3] and the pin assignment used in their DAPLink firmware [4]

Pinout Assignment Pinout View
SignalI/OSymbolPin
SWD interface
SWCLKOP0.055
SWDIOI/OP0.066
nRSTOP0.044
UART interface
UART TXIP0.2014
UART RXOP0.2113
Pinout view

NOTE: Makerdiary's dongle has UF2 bootloader and the application start address is at 0x1000, which is the same as the application start address on Nordic's dongle.

Setup

I am using multiple of both dongles on two setups:

  1. Windows system
  2. Ubuntu system

both setups are using pyOCD version 0.35.1 (due to the RTT not working on top version, although it was fixed, but there is one line patch provided by a user which works unlike the official fix... this is another story).

Both dongles are targeting devices with nRF52832 SoC [5] on them.

Usage

Both types of dongles are used as debug probes for the following:

  1. Firmware upload - pyocd load --target nrf52832 <image.hex>
  2. Chip erasure - pyocd erase --target nrf52832 <--chip, --mass>
  3. Using the target's Debug Access Port to write into its UICR registers - pyocd commander --target nrf52832 <-N, -c some commands>
  4. On-chip debugging via Cortex-Debug VS Code extension - pyocd gdbserver --target nrf52832 ...
  5. Real Time Transfer terminal usage - pyocd rtt --target nrf52832

Conclusion

The testing and usage of both Nordic Semiconductor's nRF52840 Dongle and Makerdiary's nRF52840 MDK USB Dongle as DAPLink debug probes have been successful. Throughout various programming and debugging operations in the described setups.
Overall, the changes present in the current pull request prove to be functional and ready to be used in real world scenario.


References and Sources

[1] Nordic Semiconductor. (n.d.). nRF52840 Dongle.

[2] Makerdiary. (n.d.). nRF52840 Micro Dev Kit USB Dongle.

[3] Makerdiary. (n.d.). nRF52840 Micro Dev Kit USB Dongle pinout.

[4] Makerdiary. (n.d.). Using DAPLink Firmware.

[5] Nordic Semiconductor. (n.d.). nRF52832 SoC.

Edit: fixed some typos

@mbrossard mbrossard force-pushed the feature/nrf52840_hic branch 2 times, most recently from ac1be54 to 6463d4d Compare February 25, 2025 02:03
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy