13
SNIU028A – February 2016 – Revised April 2016
Copyright © 2016, Texas Instruments Incorporated
Contents
15.2.19
Memory Fine Base Address High Register 16 (MFBAHR16)
...........................................
15.2.20
Program Flash Control Register (PFLASHCTRL)
........................................................
15.2.21
Data Flash Control Register (DFLASHCTRL)
.............................................................
15.2.22
Flash Interlock Register (FLASHILOCK)
...................................................................
16
Control System Module
.....................................................................................................
16.1
Address Decoder (DEC)
.................................................................................................
16.1.1
Memory Mapping Basics
.......................................................................................
16.1.2
Why Change Memory Map?
..................................................................................
16.1.3
How do Memory Map Registers Work?
......................................................................
16.1.4
RONLY Bit
.......................................................................................................
16.1.5
Boot ROM Memory Initialization
..............................................................................
16.1.6
Erasing the Programming Flash
..............................................................................
16.1.7
Waiting for Flash Operations to Finish
.......................................................................
16.1.8
Flash Interlock Register
........................................................................................
16.1.9
Clearing RDONLY Bit
..........................................................................................
16.1.10
Switching from User Mode to Supervisor Mode
...........................................................
16.1.11
Erasing Data Flash
............................................................................................
16.1.12
Writing to Data Flash
.........................................................................................
16.1.13
Erasing Program Flash
.......................................................................................
16.1.14
Writing to Program Flash
.....................................................................................
16.2
Memory Management Controller (MMC)
..............................................................................
16.3
System Management (SYS)
.............................................................................................
16.4
Central Interrupt Module (CIM)
..........................................................................................
16.4.1
Interrupt Handling by CPU
.....................................................................................
16.4.2
Interrupt Generation at Peripheral
............................................................................
16.4.3
CIM Interrupt Management (CIM)
............................................................................
16.4.4
CIM Input Channel Management
.............................................................................
16.4.5
CIM Prioritization
................................................................................................
16.4.6
CIM Operation
...................................................................................................
16.4.7
Register Map
....................................................................................................
16.5
SYS – System Module Registers Reference
..........................................................................
16.5.1
Clock Control Register (CLKCNTL)
..........................................................................
16.5.2
System Exception Control Register (SYSECR)
............................................................
16.5.3
System Exception Status Register (SYSESR)
..............................................................
16.5.4
Abort Exception Status Register (ABRTESR)
..............................................................
16.5.5
Global Status Register (GLBSTAT)
..........................................................................
16.5.6
Device Identification Register (DEV)
.........................................................................
16.5.7
System Software Interrupt Flag Register (SSIF)
...........................................................
16.5.8
System Software Interrupt Request Register (SSIR)
......................................................
16.5.9
References
......................................................................................................
17
Flash Memory Programming, Integrity, and Security
.............................................................
17.1
Quick Start Summary
.....................................................................................................
17.1.1
ROM Bootstrap and Program Flash Checksum
............................................................
17.1.2
Firmware Development Setup
................................................................................
17.1.3
Production Setup
...............................................................................................
17.2
Flash Memory Operations
...............................................................................................
17.2.1
UCD3138 Memory Maps
......................................................................................
17.2.2
Flash Programming in ROM Mode
...........................................................................
17.2.3
Clearing the Flash
..............................................................................................
17.2.4
3138 Family Members with Multiple Flash Blocks
..........................................................
17.3
Flash Management for Firmware Development
......................................................................
17.3.1
Best Practice for Firmware Development
....................................................................
17.3.2
Firmware Development with "Backdoors"
...................................................................