SLAU654E November   2015  – February 2019

 

  1.   MSP Flasher
    1.     Trademarks
    2. 1 Introduction
    3. 2 Compatibility
    4. 3 Triggers and Arguments
    5. 4 Exit Specifications
    6. 5 Firmware Update
    7. 6 Segment Erase
    8. 7 Example Cases
      1. 7.1 Loading and Executing Target Code From a TXT File
      2. 7.2 Reading Device Memory
      3. 7.3 Accessing a Device With a Device Activation Code
      4. 7.4 Securing the Target Device
      5. 7.5 Unlocking a Password-Protected Target Device
    9. 8 Using MSP Flasher on Unix
    10. 9 Error Codes
  2.   Revision History

Loading and Executing Target Code From a TXT File

Details:

  • Device: MSP430F5438A
  • Interface: USB
  • Password: N/A
  • File: file.txt (in the same directory as the executable)
  • Erase Type: ERASE_ALL
  • Verification: TRUE
  • VCC: ON

NOTE

To load a TI .txt or Intel .hex file, make sure that the file to be loaded is in the same directory as the executable or that a valid path is specified.

The command line to use in this case is:

MSP430Flasher -n MSP430F5438A -w file.txt -v -z [VCC] (-i USB) (-e ERASE_ALL)

NOTE

Triggers -p and -l are not used, because the device does not require a password. Triggers -i and -e may be used but are unnecessary, because USB and ERASE_ALL are the default settings for these parameters, respectively.

Figure 1 shows the console output on entering the previous command line into Windows command prompt if the selected device is connected through the specified COM port.

fig01_loading_executing_txt_file.jpgFigure 1. Loading and Executing Target Code From a .txt File