3.10.14.5
Caution of Secure boot function
shows the area occupied by E2/E2 Lite for debugging on RL78/F24.
These areas(shaded areas) are the space used for debugging. Do not change this area such as user programs and data
placement. If you change it, you will not be able to control it with E2/E2 Lite.
Figure 3-9 Microcomputer resources occupied by RL78/F24
Note:
1
The required area differs according to the state of usage of the pseudo-RRM/pseudo-DMM
function, the start/stop function (only supported by the E2/E2 Lite), and the monitoring point of the
extended function of the E2 (only supported by the E2).
Example (device with 256 Kbytes of on-chip ROM)
Pseudo-RRM/pseudo-DMM function, start/stop function, and monitoring point are not in use:
Monitor program is located at addresses 0x3FF00 to 0x3FFFF (256 bytes).
Pseudo-RRM/pseudo-DMM function, start/stop function, or monitoring point is in use:
Monitor program is located at addresses 0x3FE00 to 0x3FFFF (512 bytes).
Pseudo-RRM/pseudo-DMM function and start/stop function are in use
Monitor program is located at addresses 0x3FD00 to 0x3FFFF (768 bytes).
2
During debugging, the reset vector is rewritten to the address assigned to the monitor program.
3
This area is allocated just below the stack area, so the address of this area depends on whether
the stack is incremented or decremented.
In other words, it consumes 4 bytes extra for the stack area consumed by the user program.
For self-programming, use 12 bytes as a stack area for debugging.