![Texas Instruments eZ-FET Emulation IP User Manual Download Page 14](http://html.mh-extra.com/html/texas-instruments/ez-fet-emulation-ip/ez-fet-emulation-ip_user-manual_1094522014.webp)
Debug Probes Hardware and Software
14
SLAU647L – July 2015 – Revised February 2018
Copyright © 2015–2018, Texas Instruments Incorporated
MSP Debuggers
5.4
Unlimited Software Breakpoints in Flash, FRAM, and RAM
All MSP430 debug tools support the use of software breakpoints in Flash, FRAM, and RAM. Software
breakpoints let the user set an unlimited number of breakpoints during an active debug session.
Without software breakpoints enabled, the number of breakpoints that can be set is limited to the number
of hardware breakpoints available by the specific MSP MCU. All MSP debug tools prefer the use of
hardware breakpoints as much as possible. However, if the MSP breakpoint logic runs out of hardware
breakpoints, software breakpoints are used automatically (if enabled in the IDE).
NOTE:
When the debug session is closed, all software breakpoints are erased and the original
memory content is restored.
For more details about the software breakpoints and their IDE-specific use, see the
Breakpoint Types
section in
IAR Embedded Workbench Version v7+ for MSP430 User's
and
Code Composer Studio v7.x for MSP430 User's Guide
.
For a practical example of different breakpoint types, see
Enhanced Emulation Module (EEM) With Code Composer Studio Version 6
.
5.5
JTAG Access Protection (Fuse Blow)
Different MSP430 devices implement different methods to prevent JTAG debug access to the MSP430
target device.
NOTE:
Only the MSP-FET and the MSP-FET430UIF support JTAG access protection to disable
JTAG access.
For more details how the JTAG access protection mechanism is implemented see the "JTAG
Access Protection" section in
MSP430 Programming With the JTAG Interface
JTAG fuse
•
Available on 1xx, 2xx, and 4xx families (except FRxx and I20xx devices)
•
Applying a high voltage to test the TEST pin of the MSP430 target device blows an actual physical
polyfuse and disables the JTAG interface.
JTAG lock without password (eFuse/"soft" fuse)
•
Available on 5xx, 6xx, and FRxx families
•
A certain lock pattern is written into the MSP430 target memory to disable the JTAG interface.
JTAG lock with password
•
Available only FRxx families
•
A user-defined password can disable JTAG access to the MSP430 target device.
•
Using CCS, EW430, or the MSP Flasher, applying the configured password to the MSP430 target
restores JTAG access
Memory protection by custom startup code (SUC)
•
Available on only the i20xx family (for example, the MSP430i2040 device)
•
Custom startup code can enable or disable JTAG access to the MSP430i20xx target device.
DAP (Debug Access Port) lock
•
Available on MSP432P401x family – Locks JTAG/SWD connection to MSP432P401x device
•
Execute a Factory Reset to unlock the Debug Access port.