SPRUJF2A March 2026 – March 2026 AM13E23019
Table 1-5 lists the memory-mapped registers for the FLNONMAINECC registers. All register offset addresses not listed in Table 1-5 should be considered as reserved locations and the register contents should not be modified.
| Offset | Acronym | Register Name | Section |
|---|---|---|---|
| 60100800h | BCR_CONFIG_ID | Predetermined Bootcode config signature ID | Section 1.4.2.1 |
| 60100804h | BOOTCFG0 | Controls enable/disable of AHB-AP, ET-AP, PWR-AP. Values: DEBUG_EN, DEBUG_EN_PW, DEBUG_NS_EN, DEBUG_NS_EN_PW, DEBUG_DIS; Serial Wire Debug Port mode. Disabling this will disable all Debug ports including CFG_AP, SEC_AP. When disabled no DSSM commands are serviced | Section 1.4.2.2 |
| 60100808h | BOOTCFG1 | Controls BSL pin invocation capability. Values: BSL_PIN_INVOKE_EN, BSL_PIN_INVOKE_DIS; Controls debug access release until INITDONE is issued | Section 1.4.2.3 |
| 6010080Ch | BOOTCFG2 | Controls CSC policy in SYSCTL. YES enables CSC policy checking; Controls flash bank swap policy in SYSCTL | Section 1.4.2.4 |
| 60100810h | BOOTCFG3 | Fast boot mode configuration - Skips certain boot time checks when enabled; Bootloader mode enable/disable control. Must be enabled for BSL functionality | Section 1.4.2.5 |
| 60100814h | BOOTCFG4 | Mass erase mode configuration. Values: BC_CFG_MASS_ERASE_EN(0xAABB), BC_CFG_MASS_ERASE_EN_PW(0xCCDD), BC_CFG_MASS_ERASE_DIS(0x5522); Factory reset mode configuration. Values: BC_CFG_FACTORY_RESET_EN(0xAABB), BC_CFG_FACTORY_RESET_EN_PW(0xCCDD), BC_CFG_FACTORY_RESET_DIS(0x5522) | Section 1.4.2.6 |
| 60100818h | MASS_ERASE_0 | Password for DSSM_BC_MASS_ERASE_REQUEST command - Word 0 | Section 1.4.2.7 |
| 6010081Ch | MASS_ERASE_1 | Password for DSSM_BC_MASS_ERASE_REQUEST command - Word 1 | Section 1.4.2.8 |
| 60100820h | MASS_ERASE_2 | Password for DSSM_BC_MASS_ERASE_REQUEST command - Word 2 | Section 1.4.2.9 |
| 60100824h | MASS_ERASE_3 | Password for DSSM_BC_MASS_ERASE_REQUEST command - Word 3 | Section 1.4.2.10 |
| 60100828h | MASS_ERASE_4 | Password for DSSM_BC_MASS_ERASE_REQUEST command - Word 4 | Section 1.4.2.11 |
| 6010082Ch | MASS_ERASE_5 | Password for DSSM_BC_MASS_ERASE_REQUEST command - Word 5 | Section 1.4.2.12 |
| 60100830h | MASS_ERASE_6 | Password for DSSM_BC_MASS_ERASE_REQUEST command - Word 6 | Section 1.4.2.13 |
| 60100834h | MASS_ERASE_7 | Password for DSSM_BC_MASS_ERASE_REQUEST command - Word 7 | Section 1.4.2.14 |
| 60100838h | FACTORY_RESET_0 | Password for factory reset command - Word 0 | Section 1.4.2.15 |
| 6010083Ch | FACTORY_RESET_1 | Password for factory reset command - Word 1 | Section 1.4.2.16 |
| 60100840h | FACTORY_RESET_2 | Password for factory reset command - Word 2 | Section 1.4.2.17 |
| 60100844h | FACTORY_RESET_3 | Password for factory reset command - Word 3 | Section 1.4.2.18 |
| 60100848h | FACTORY_RESET_4 | Password for factory reset command - Word 4 | Section 1.4.2.19 |
| 6010084Ch | FACTORY_RESET_5 | Password for factory reset command - Word 5 | Section 1.4.2.20 |
| 60100850h | FACTORY_RESET_6 | Password for factory reset command - Word 6 | Section 1.4.2.21 |
| 60100854h | FACTORY_RESET_7 | Password for factory reset command - Word 7 | Section 1.4.2.22 |
| 60100858h | DEBUG_LOCK_0 | Password for debug access authentication - Word 0 | Section 1.4.2.23 |
| 6010085Ch | DEBUG_LOCK_1 | Password for debug access authentication - Word 1 | Section 1.4.2.24 |
| 60100860h | DEBUG_LOCK_2 | Password for debug access authentication - Word 2 | Section 1.4.2.25 |
| 60100864h | DEBUG_LOCK_3 | Password for debug access authentication - Word 3 | Section 1.4.2.26 |
| 60100868h | DEBUG_LOCK_4 | Password for debug access authentication - Word 4 | Section 1.4.2.27 |
| 6010086Ch | DEBUG_LOCK_5 | Password for debug access authentication - Word 5 | Section 1.4.2.28 |
| 60100870h | DEBUG_LOCK_6 | Password for debug access authentication - Word 6 | Section 1.4.2.29 |
| 60100874h | DEBUG_LOCK_7 | Password for debug access authentication - Word 7 | Section 1.4.2.30 |
| 60100878h | DEBUG_NS_LOCK_0 | Password for non-secure debug access - Word 0 | Section 1.4.2.31 |
| 6010087Ch | DEBUG_NS_LOCK_1 | Password for non-secure debug access - Word 1 | Section 1.4.2.32 |
| 60100880h | DEBUG_NS_LOCK_2 | Password for non-secure debug access - Word 2 | Section 1.4.2.33 |
| 60100884h | DEBUG_NS_LOCK_3 | Password for non-secure debug access - Word 3 | Section 1.4.2.34 |
| 60100888h | DEBUG_NS_LOCK_4 | Password for non-secure debug access - Word 4 | Section 1.4.2.35 |
| 6010088Ch | DEBUG_NS_LOCK_5 | Password for non-secure debug access - Word 5 | Section 1.4.2.36 |
| 60100890h | DEBUG_NS_LOCK_6 | Password for non-secure debug access - Word 6 | Section 1.4.2.37 |
| 60100894h | DEBUG_NS_LOCK_7 | Password for non-secure debug access - Word 7 | Section 1.4.2.38 |
| 60100898h | RESERVED_REG0 | ||
| 6010089Ch | RESERVED_REG1 | ||
| 601008A0h | RESERVED_REG2 | ||
| 601008A4h | RESERVED_REG3 | ||
| 601008A8h | RESERVED_REG4 | ||
| 601008ACh | RESERVED_REG5 | Reserved - Word 5 | |
| 601008B0h | RESERVED_REG6 | Reserved - Word 6 | |
| 601008B4h | RESERVED_REG7 | Reserved - Word 7 | |
| 601008B8h | SECURE_BOOT_MODE | Controls application authentication; Reserved field | |
| 601008BCh | USER_SECURE_APP_START_ADDR | Starting address for secure application | Section 1.4.2.40 |
| 601008C0h | USER_SECURE_APP_LENGTH | Length of secure application | Section 1.4.2.41 |
| 601008C4h | USER_SECURE_APP_CRC_0 | Secure application CRC - Word 0 | Section 1.4.2.42 |
| 601008C8h | RESERVED_REG8 | Reserved field - Word 1 | |
| 601008CCh | RESERVED_REG9 | Reserved field - Word 2 | |
| 601008D0h | RESERVED_REG10 | Reserved field - Word 3 | |
| 601008D4h | RESERVED_REG11 | Reserved field - Word 4 | |
| 601008D8h | RESERVED_REG12 | Reserved field - Word 5 | |
| 601008DCh | RESERVED_REG13 | Reserved field - Word 6 | |
| 601008E0h | RESERVED_REG14 | Reserved field - Word 7 | |
| 601008E4h | BANK0_NM_USER_CONFIG | User Config Non Main Flash Static Write Protection. WEP_DISABLE=0xAABB; Reserved field | |
| 601008E8h | BANK0_WRITE_ERASE_PROTECTION_A | Write protection for first 32 sectors | Section 1.4.2.44 |
| 601008ECh | BANK0_WRITE_ERASE_PROTECTION_B | Write Protection for 512KB-64KB | Section 1.4.2.45 |
| 601008F0h | BANK0_SECURITY_PROTECTION_A | Security protection for first 32 sectors | Section 1.4.2.46 |
| 601008F4h | BANK0_SECURITY_PROTECTION_B | Security protection for 512KB-64KB | Section 1.4.2.47 |
| 601008F8h | BANK0_PRIVILEGE_PROTECTION_A | Privilege protection for first 32 sectors | Section 1.4.2.48 |
| 601008FCh | BANK0_PRIVILEGE_PROTECTION_B | Privilege protection for 512KB-64KB | Section 1.4.2.49 |
| 60100900h | BANK0_RESERVED | Reserved field for BANK0 alignment | |
| 60100904h | BANK1_WRITE_ERASE_PROTECTION_A | Write protection for first 32 sectors | Section 1.4.2.50 |
| 60100908h | BANK1_WRITE_ERASE_PROTECTION_B | Write Protection for 512KB-64KB | Section 1.4.2.51 |
| 6010090Ch | BANK1_SECURITY_PROTECTION_A | Security protection for first 32 sectors | Section 1.4.2.52 |
| 60100910h | BANK1_SECURITY_PROTECTION_B | Security protection for 512KB-64KB | Section 1.4.2.53 |
| 60100914h | BANK1_PRIVILEGE_PROTECTION_A | Privilege protection for first 32 sectors | Section 1.4.2.54 |
| 60100918h | BANK1_PRIVILEGE_PROTECTION_B | Privilege protection for 512KB-64KB | Section 1.4.2.55 |
| 6010091Ch | BANK1_RESERVED | Reserved field for BANK1 | |
| 60100920h | RESERVED_REG15 | Reserved field | |
| 60100924h | RESERVED_REG16 | Reserved field | |
| 60100928h | RESERVED_REG17 | Reserved field | |
| 6010092Ch | RESERVED_REG18 | Reserved field | |
| 60100930h | BOOTCLK0 | Clock configuration; PLL multiplier value; PLL divider value; PLL clock source configuration | Section 1.4.2.56 |
| 60100934h | BOOTCLK1 | CPU delay cycles for PLL settling time; CPU delay cycles for XTAL monitoring; Reserved configuration field 0 | |
| 60100938h | RESERVED_REG_0 | Reserved configuration field 0; Reserved configuration field 1 | |
| 6010093Ch | RESERVED_REG_1 | Reserved configuration field 2; Reserved configuration field 3 | |
| 60100940h | RESERVED_REG_2 | Reserved configuration field 4; Reserved configuration field 5 | |
| 60100944h | RESERVED_REG_3 | Reserved configuration field 6; Reserved configuration field 7 | |
| 60100948h | RESERVED_REG_4 | Reserved configuration field 8; Reserved configuration field 9 | |
| 6010094Ch | CRC | JAMCRC of BCR config structure | Section 1.4.2.58 |
| 60100C00h | BSL_CONFIG_ID | Predetermined Bootloader config signature ID | Section 1.4.2.59 |
| 60100C04h | BSLPINCFG0 | UART receive pin number configuration; UART receive pin multiplexer selection; UART transmit pin number configuration; UART transmit pin multiplexer selection | Section 1.4.2.60 |
| 60100C08h | BSLPINCFG1 | I2C data pin number configuration; I2C data pin multiplexer selection; I2C clock pin number configuration; I2C clock pin multiplexer selection | Section 1.4.2.61 |
| 60100C0Ch | BSLPINCFG2 | MCAN receive pin number configuration; MCAN receive pin multiplexer selection; MCAN transmit pin number configuration; MCAN transmit pin multiplexer selection | Section 1.4.2.62 |
| 60100C10h | BSLCONFIG0 | BSL invoke pin configuration data 0; BSL invoke pin configuration data 1; Memory readout control. ENABLE allows memory read operations | Section 1.4.2.63 |
| 60100C14h | PASSWORD_0 | BSL access password - Word 0 | Section 1.4.2.64 |
| 60100C18h | PASSWORD_1 | BSL access password - Word 1 | Section 1.4.2.65 |
| 60100C1Ch | PASSWORD_2 | BSL access password - Word 2 | Section 1.4.2.66 |
| 60100C20h | PASSWORD_3 | BSL access password - Word 3 | Section 1.4.2.67 |
| 60100C24h | PASSWORD_4 | BSL access password - Word 4 | Section 1.4.2.68 |
| 60100C28h | PASSWORD_5 | BSL access password - Word 5 | Section 1.4.2.69 |
| 60100C2Ch | PASSWORD_6 | BSL access password - Word 6 | Section 1.4.2.70 |
| 60100C30h | PASSWORD_7 | BSL access password - Word 7 | Section 1.4.2.71 |
| 60100C34h | APP_REV_POINTER | Pointer to application version information in MAIN flash | Section 1.4.2.72 |
| 60100C38h | BSLCONFIG1 | Security alert response: Factory Reset/Disable BSL/Ignore; UART communication speed selection for ROM BSL | Section 1.4.2.73 |
| 60100C3Ch | I2C_SLAVE_ADDR | I2C slave address for ROM BSL I2C interface; Reserved field; Reserved field | |
| 60100C40h | RESERVED_REG_0 | Reserved field; Reserved field; Reserved field; Reserved field | |
| 60100C44h | RESERVED_REG_1 | Reserved field; Reserved field; Reserved field; Reserved field | |
| 60100C48h | RESERVED_REG_2 | Reserved field; Reserved field; Reserved field; Reserved field | |
| 60100C4Ch | CRC | JAMCRC of BSL configuration structure |
Complex bit access types are encoded to fit into small table cells. Table 1-6 shows the codes that are used for access types in this section.
| Access Type | Code | Description |
|---|---|---|
| Read Type | ||
| R | R | Read |
| Write Type | ||
| W | W | Write |
| Reset or Default Value | ||
| -n | Value after reset or the default value | |
BCR_CONFIG_ID is shown in Table 1-7.
Return to the Summary Table.
Predetermined Bootcode config signature ID
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | BCR_CONFIG_ID | R/W | 0h | Predetermined Bootcode config signature ID |
BOOTCFG0 is shown in Table 1-8.
Return to the Summary Table.
Controls enable/disable of AHB-AP, ET-AP, PWR-AP. Values: DEBUG_EN, DEBUG_EN_PW, DEBUG_NS_EN, DEBUG_NS_EN_PW, DEBUG_DIS; Serial Wire Debug Port mode. Disabling this will disable all Debug ports including CFG_AP, SEC_AP. When disabled no DSSM commands are serviced
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-16 | SWDP_MODE | R/W | 0h | Serial Wire Debug Port mode. Disabling this will disable all Debug ports including CFG_AP, SEC_AP. When disabled no DSSM commands are serviced
|
| 15-0 | DEBUG_ACCESS | R/W | 0h | Controls enable/disable of AHB-AP, ET-AP, PWR-AP. Values: DEBUG_EN, DEBUG_EN_PW, DEBUG_NS_EN, DEBUG_NS_EN_PW, DEBUG_DIS
|
BOOTCFG1 is shown in Table 1-9.
Return to the Summary Table.
Controls BSL pin invocation capability. Values: BSL_PIN_INVOKE_EN, BSL_PIN_INVOKE_DIS; Controls debug access release until INITDONE is issued
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-16 | DEBUG_HOLD | R/W | 0h | Controls debug access release until INITDONE is issued |
| 15-0 | BSL_PIN_INVOKE | R/W | 0h | Controls BSL pin invocation capability. Values: BSL_PIN_INVOKE_EN, BSL_PIN_INVOKE_DIS
|
BOOTCFG2 is shown in Table 1-10.
Return to the Summary Table.
Controls CSC policy in SYSCTL. YES enables CSC policy checking; Controls flash bank swap policy in SYSCTL
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-16 | FLASH_BANK_SWAP_POLICY | R/W | 0h | Controls flash bank swap policy in SYSCTL |
| 15-0 | CSC_EXISTS | R/W | 0h | Controls CSC policy in SYSCTL. YES enables CSC policy checking
|
BOOTCFG3 is shown in Table 1-11.
Return to the Summary Table.
Fast boot mode configuration - Skips certain boot time checks when enabled; Bootloader mode enable/disable control. Must be enabled for BSL functionality
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-16 | BOOTLOADER_MODE | R/W | 0h | Bootloader mode enable/disable control. Must be enabled for BSL functionality |
| 15-0 | FAST_BOOT_MODE | R/W | 0h | Fast boot mode configuration - Skips certain boot time checks when enabled |
BOOTCFG4 is shown in Table 1-12.
Return to the Summary Table.
Mass erase mode configuration. Values: BC_CFG_MASS_ERASE_EN(0xAABB), BC_CFG_MASS_ERASE_EN_PW(0xCCDD), BC_CFG_MASS_ERASE_DIS(0x5522); Factory reset mode configuration. Values: BC_CFG_FACTORY_RESET_EN(0xAABB), BC_CFG_FACTORY_RESET_EN_PW(0xCCDD), BC_CFG_FACTORY_RESET_DIS(0x5522)
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-16 | FACTORY_RESET_MODE | R/W | 0h | Factory reset mode configuration. Values: BC_CFG_FACTORY_RESET_EN(0xAABB), BC_CFG_FACTORY_RESET_EN_PW(0xCCDD), BC_CFG_FACTORY_RESET_DIS(0x5522)
|
| 15-0 | MASS_ERASE_MODE | R/W | 0h | Mass erase mode configuration. Values: BC_CFG_MASS_ERASE_EN(0xAABB), BC_CFG_MASS_ERASE_EN_PW(0xCCDD), BC_CFG_MASS_ERASE_DIS(0x5522)
|
MASS_ERASE_0 is shown in Table 1-13.
Return to the Summary Table.
Password for DSSM_BC_MASS_ERASE_REQUEST command - Word 0
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | MASS_ERASE_0 | R/W | 0h | Password for DSSM_BC_MASS_ERASE_REQUEST command - Word 0 |
MASS_ERASE_1 is shown in Table 1-14.
Return to the Summary Table.
Password for DSSM_BC_MASS_ERASE_REQUEST command - Word 1
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | MASS_ERASE_1 | R/W | 0h | Password for DSSM_BC_MASS_ERASE_REQUEST command - Word 1 |
MASS_ERASE_2 is shown in Table 1-15.
Return to the Summary Table.
Password for DSSM_BC_MASS_ERASE_REQUEST command - Word 2
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | MASS_ERASE_2 | R/W | 0h | Password for DSSM_BC_MASS_ERASE_REQUEST command - Word 2 |
MASS_ERASE_3 is shown in Table 1-16.
Return to the Summary Table.
Password for DSSM_BC_MASS_ERASE_REQUEST command - Word 3
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | MASS_ERASE_3 | R/W | 0h | Password for DSSM_BC_MASS_ERASE_REQUEST command - Word 3 |
MASS_ERASE_4 is shown in Table 1-17.
Return to the Summary Table.
Password for DSSM_BC_MASS_ERASE_REQUEST command - Word 4
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | MASS_ERASE_4 | R/W | 0h | Password for DSSM_BC_MASS_ERASE_REQUEST command - Word 4 |
MASS_ERASE_5 is shown in Table 1-18.
Return to the Summary Table.
Password for DSSM_BC_MASS_ERASE_REQUEST command - Word 5
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | MASS_ERASE_5 | R/W | 0h | Password for DSSM_BC_MASS_ERASE_REQUEST command - Word 5 |
MASS_ERASE_6 is shown in Table 1-19.
Return to the Summary Table.
Password for DSSM_BC_MASS_ERASE_REQUEST command - Word 6
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | MASS_ERASE_6 | R/W | 0h | Password for DSSM_BC_MASS_ERASE_REQUEST command - Word 6 |
MASS_ERASE_7 is shown in Table 1-20.
Return to the Summary Table.
Password for DSSM_BC_MASS_ERASE_REQUEST command - Word 7
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | MASS_ERASE_7 | R/W | 0h | Password for DSSM_BC_MASS_ERASE_REQUEST command - Word 7 |
FACTORY_RESET_0 is shown in Table 1-21.
Return to the Summary Table.
Password for factory reset command - Word 0
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | FACTORY_RESET_0 | R/W | 0h | Password for factory reset command - Word 0 |
FACTORY_RESET_1 is shown in Table 1-22.
Return to the Summary Table.
Password for factory reset command - Word 1
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | FACTORY_RESET_1 | R/W | 0h | Password for factory reset command - Word 1 |
FACTORY_RESET_2 is shown in Table 1-23.
Return to the Summary Table.
Password for factory reset command - Word 2
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | FACTORY_RESET_2 | R/W | 0h | Password for factory reset command - Word 2 |
FACTORY_RESET_3 is shown in Table 1-24.
Return to the Summary Table.
Password for factory reset command - Word 3
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | FACTORY_RESET_3 | R/W | 0h | Password for factory reset command - Word 3 |
FACTORY_RESET_4 is shown in Table 1-25.
Return to the Summary Table.
Password for factory reset command - Word 4
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | FACTORY_RESET_4 | R/W | 0h | Password for factory reset command - Word 4 |
FACTORY_RESET_5 is shown in Table 1-26.
Return to the Summary Table.
Password for factory reset command - Word 5
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | FACTORY_RESET_5 | R/W | 0h | Password for factory reset command - Word 5 |
FACTORY_RESET_6 is shown in Table 1-27.
Return to the Summary Table.
Password for factory reset command - Word 6
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | FACTORY_RESET_6 | R/W | 0h | Password for factory reset command - Word 6 |
FACTORY_RESET_7 is shown in Table 1-28.
Return to the Summary Table.
Password for factory reset command - Word 7
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | FACTORY_RESET_7 | R/W | 0h | Password for factory reset command - Word 7 |
DEBUG_LOCK_0 is shown in Table 1-29.
Return to the Summary Table.
Password for debug access authentication - Word 0
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | DEBUG_LOCK_0 | R/W | 0h | Password for debug access authentication - Word 0 |
DEBUG_LOCK_1 is shown in Table 1-30.
Return to the Summary Table.
Password for debug access authentication - Word 1
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | DEBUG_LOCK_1 | R/W | 0h | Password for debug access authentication - Word 1 |
DEBUG_LOCK_2 is shown in Table 1-31.
Return to the Summary Table.
Password for debug access authentication - Word 2
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | DEBUG_LOCK_2 | R/W | 0h | Password for debug access authentication - Word 2 |
DEBUG_LOCK_3 is shown in Table 1-32.
Return to the Summary Table.
Password for debug access authentication - Word 3
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | DEBUG_LOCK_3 | R/W | 0h | Password for debug access authentication - Word 3 |
DEBUG_LOCK_4 is shown in Table 1-33.
Return to the Summary Table.
Password for debug access authentication - Word 4
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | DEBUG_LOCK_4 | R/W | 0h | Password for debug access authentication - Word 4 |
DEBUG_LOCK_5 is shown in Table 1-34.
Return to the Summary Table.
Password for debug access authentication - Word 5
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | DEBUG_LOCK_5 | R/W | 0h | Password for debug access authentication - Word 5 |
DEBUG_LOCK_6 is shown in Table 1-35.
Return to the Summary Table.
Password for debug access authentication - Word 6
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | DEBUG_LOCK_6 | R/W | 0h | Password for debug access authentication - Word 6 |
DEBUG_LOCK_7 is shown in Table 1-36.
Return to the Summary Table.
Password for debug access authentication - Word 7
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | DEBUG_LOCK_7 | R/W | 0h | Password for debug access authentication - Word 7 |
DEBUG_NS_LOCK_0 is shown in Table 1-37.
Return to the Summary Table.
Password for non-secure debug access - Word 0
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | DEBUG_NS_LOCK_0 | R/W | 0h | Password for non-secure debug access - Word 0 |
DEBUG_NS_LOCK_1 is shown in Table 1-38.
Return to the Summary Table.
Password for non-secure debug access - Word 1
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | DEBUG_NS_LOCK_1 | R/W | 0h | Password for non-secure debug access - Word 1 |
DEBUG_NS_LOCK_2 is shown in Table 1-39.
Return to the Summary Table.
Password for non-secure debug access - Word 2
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | DEBUG_NS_LOCK_2 | R/W | 0h | Password for non-secure debug access - Word 2 |
DEBUG_NS_LOCK_3 is shown in Table 1-40.
Return to the Summary Table.
Password for non-secure debug access - Word 3
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | DEBUG_NS_LOCK_3 | R/W | 0h | Password for non-secure debug access - Word 3 |
DEBUG_NS_LOCK_4 is shown in Table 1-41.
Return to the Summary Table.
Password for non-secure debug access - Word 4
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | DEBUG_NS_LOCK_4 | R/W | 0h | Password for non-secure debug access - Word 4 |
DEBUG_NS_LOCK_5 is shown in Table 1-42.
Return to the Summary Table.
Password for non-secure debug access - Word 5
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | DEBUG_NS_LOCK_5 | R/W | 0h | Password for non-secure debug access - Word 5 |
DEBUG_NS_LOCK_6 is shown in Table 1-43.
Return to the Summary Table.
Password for non-secure debug access - Word 6
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | DEBUG_NS_LOCK_6 | R/W | 0h | Password for non-secure debug access - Word 6 |
DEBUG_NS_LOCK_7 is shown in Table 1-44.
Return to the Summary Table.
Password for non-secure debug access - Word 7
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | DEBUG_NS_LOCK_7 | R/W | 0h | Password for non-secure debug access - Word 7 |
SECURE_BOOT_MODE is shown in Table 1-45.
Return to the Summary Table.
Controls application authentication; Reserved field
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-16 | RESERVED | R | 0h | Reserved field |
| 15-0 | SECURE_BOOT_MODE | R/W | 0h | Controls application authentication
|
USER_SECURE_APP_START_ADDR is shown in Table 1-46.
Return to the Summary Table.
Starting address for secure application
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | USER_SECURE_APP_START_ADDR | R/W | 0h | Starting address for secure application |
USER_SECURE_APP_LENGTH is shown in Table 1-47.
Return to the Summary Table.
Length of secure application
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | USER_SECURE_APP_LENGTH | R/W | 0h | Length of secure application |
USER_SECURE_APP_CRC_0 is shown in Table 1-48.
Return to the Summary Table.
Secure application CRC - Word 0
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | USER_SECURE_APP_CRC_0 | R/W | 0h | Secure application CRC - Word 0 |
BANK0_NM_USER_CONFIG is shown in Table 1-49.
Return to the Summary Table.
User Config Non Main Flash Static Write Protection. WEP_DISABLE=0xAABB; Reserved field
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-16 | RESERVED | R | 0h | Reserved field |
| 15-0 | BANK0_NM_USER_CONFIG | R/W | 0h | User Config Non Main Flash Static Write Protection. WEP_DISABLE=0xAABB |
BANK0_WRITE_ERASE_PROTECTION_A is shown in Table 1-50.
Return to the Summary Table.
Write protection for first 32 sectors
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | BANK0_WRITE_ERASE_PROTECTION_A | R/W | 0h | Write protection for first 32 sectors |
BANK0_WRITE_ERASE_PROTECTION_B is shown in Table 1-51.
Return to the Summary Table.
Write Protection for 512KB-64KB
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | BANK0_WRITE_ERASE_PROTECTION_B | R/W | 0h | Write Protection for 512KB-64KB |
BANK0_SECURITY_PROTECTION_A is shown in Table 1-52.
Return to the Summary Table.
Security protection for first 32 sectors
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | BANK0_SECURITY_PROTECTION_A | R/W | 0h | Security protection for first 32 sectors |
BANK0_SECURITY_PROTECTION_B is shown in Table 1-53.
Return to the Summary Table.
Security protection for 512KB-64KB
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | BANK0_SECURITY_PROTECTION_B | R/W | 0h | Security protection for 512KB-64KB |
BANK0_PRIVILEGE_PROTECTION_A is shown in Table 1-54.
Return to the Summary Table.
Privilege protection for first 32 sectors
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | BANK0_PRIVILEGE_PROTECTION_A | R/W | 0h | Privilege protection for first 32 sectors |
BANK0_PRIVILEGE_PROTECTION_B is shown in Table 1-55.
Return to the Summary Table.
Privilege protection for 512KB-64KB
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | BANK0_PRIVILEGE_PROTECTION_B | R/W | 0h | Privilege protection for 512KB-64KB |
BANK1_WRITE_ERASE_PROTECTION_A is shown in Table 1-56.
Return to the Summary Table.
Write protection for first 32 sectors
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | BANK1_WRITE_ERASE_PROTECTION_A | R/W | 0h | Write protection for first 32 sectors |
BANK1_WRITE_ERASE_PROTECTION_B is shown in Table 1-57.
Return to the Summary Table.
Write Protection for 512KB-64KB
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | BANK1_WRITE_ERASE_PROTECTION_B | R/W | 0h | Write Protection for 512KB-64KB |
BANK1_SECURITY_PROTECTION_A is shown in Table 1-58.
Return to the Summary Table.
Security protection for first 32 sectors
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | BANK1_SECURITY_PROTECTION_A | R/W | 0h | Security protection for first 32 sectors |
BANK1_SECURITY_PROTECTION_B is shown in Table 1-59.
Return to the Summary Table.
Security protection for 512KB-64KB
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | BANK1_SECURITY_PROTECTION_B | R/W | 0h | Security protection for 512KB-64KB |
BANK1_PRIVILEGE_PROTECTION_A is shown in Table 1-60.
Return to the Summary Table.
Privilege protection for first 32 sectors
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | BANK1_PRIVILEGE_PROTECTION_A | R/W | 0h | Privilege protection for first 32 sectors |
BANK1_PRIVILEGE_PROTECTION_B is shown in Table 1-61.
Return to the Summary Table.
Privilege protection for 512KB-64KB
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | BANK1_PRIVILEGE_PROTECTION_B | R/W | 0h | Privilege protection for 512KB-64KB |
BOOTCLK0 is shown in Table 1-62.
Return to the Summary Table.
Clock configuration; PLL multiplier value; PLL divider value; PLL clock source configuration
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-24 | SYSPLL_SOURCE | R/W | 0h | PLL clock source configuration
|
| 23-16 | SYSPLL_CONFIG_RDIV | R/W | 0h | PLL divider value |
| 15-8 | SYSPLL_CONFIG_QDIV | R/W | 0h | PLL multiplier value |
| 7-0 | SYSPLL_CONFIG | R/W | 0h | Clock configuration
|
BOOTCLK1 is shown in Table 1-63.
Return to the Summary Table.
CPU delay cycles for PLL settling time; CPU delay cycles for XTAL monitoring; Reserved configuration field 0
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-16 | RESVD_0 | R/W | 0h | Reserved configuration field 0 |
| 15-8 | XTAL_STARTUP_MONITOR_TIME | R/W | 0h | CPU delay cycles for XTAL monitoring |
| 7-0 | SYSPLL_SETTLING_TIME | R/W | 0h | CPU delay cycles for PLL settling time |
CRC is shown in Table 1-64.
Return to the Summary Table.
JAMCRC of BCR config structure
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | CRC | R/W | 0h | CRC-32 of BCR config structure |
BSL_CONFIG_ID is shown in Table 1-65.
Return to the Summary Table.
Predetermined Bootloader config signature ID
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | BSL_CONFIG_ID | R/W | 0h | Predetermined Bootloader config signature ID |
BSLPINCFG0 is shown in Table 1-66.
Return to the Summary Table.
UART receive pin number configuration; UART receive pin multiplexer selection; UART transmit pin number configuration; UART transmit pin multiplexer selection
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-24 | UART_TXD_PF_MUX_SEL | R/W | 0h | UART transmit pin multiplexer selection |
| 23-16 | UART_TXD_PAD_NUM | R/W | 0h | UART transmit pin number configuration |
| 15-8 | UART_RXD_PF_MUX_SEL | R/W | 0h | UART receive pin multiplexer selection |
| 7-0 | UART_RXD_PAD_NUM | R/W | 0h | UART receive pin number configuration |
BSLPINCFG1 is shown in Table 1-67.
Return to the Summary Table.
I2C data pin number configuration; I2C data pin multiplexer selection; I2C clock pin number configuration; I2C clock pin multiplexer selection
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-24 | I2C_SCL_PF_MUX_SEL | R/W | 0h | I2C clock pin multiplexer selection |
| 23-16 | I2C_SCL_PAD_NUM | R/W | 0h | I2C clock pin number configuration |
| 15-8 | I2C_SDA_PF_MUX_SEL | R/W | 0h | I2C data pin multiplexer selection |
| 7-0 | I2C_SDA_PAD_NUM | R/W | 0h | I2C data pin number configuration |
BSLPINCFG2 is shown in Table 1-68.
Return to the Summary Table.
MCAN receive pin number configuration; MCAN receive pin multiplexer selection; MCAN transmit pin number configuration; MCAN transmit pin multiplexer selection
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-24 | MCAN_TX_PF_MUX_SEL | R/W | 0h | MCAN transmit pin multiplexer selection |
| 23-16 | MCAN_TX_PAD_NUM | R/W | 0h | MCAN transmit pin number configuration |
| 15-8 | MCAN_RX_PF_MUX_SEL | R/W | 0h | MCAN receive pin multiplexer selection |
| 7-0 | MCAN_RX_PAD_NUM | R/W | 0h | MCAN receive pin number configuration |
BSLCONFIG0 is shown in Table 1-69.
Return to the Summary Table.
BSL invoke pin configuration data 0; BSL invoke pin configuration data 1; Memory readout control. ENABLE allows memory read operations
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-16 | READOUT | R/W | 0h | Memory readout control. ENABLE allows memory read operations |
| 15-8 | PIN_DATA_1 | R/W | 0h | BSL invoke pin configuration data 1 |
| 7-0 | PIN_DATA_0 | R/W | 0h | BSL invoke pin configuration data 0 |
PASSWORD_0 is shown in Table 1-70.
Return to the Summary Table.
BSL access password - Word 0
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | PASSWORD_0 | R/W | 0h | BSL access password - Word 0 |
PASSWORD_1 is shown in Table 1-71.
Return to the Summary Table.
BSL access password - Word 1
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | PASSWORD_1 | R/W | 0h | BSL access password - Word 1 |
PASSWORD_2 is shown in Table 1-72.
Return to the Summary Table.
BSL access password - Word 2
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | PASSWORD_2 | R/W | 0h | BSL access password - Word 2 |
PASSWORD_3 is shown in Table 1-73.
Return to the Summary Table.
BSL access password - Word 3
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | PASSWORD_3 | R/W | 0h | BSL access password - Word 3 |
PASSWORD_4 is shown in Table 1-74.
Return to the Summary Table.
BSL access password - Word 4
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | PASSWORD_4 | R/W | 0h | BSL access password - Word 4 |
PASSWORD_5 is shown in Table 1-75.
Return to the Summary Table.
BSL access password - Word 5
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | PASSWORD_5 | R/W | 0h | BSL access password - Word 5 |
PASSWORD_6 is shown in Table 1-76.
Return to the Summary Table.
BSL access password - Word 6
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | PASSWORD_6 | R/W | 0h | BSL access password - Word 6 |
PASSWORD_7 is shown in Table 1-77.
Return to the Summary Table.
BSL access password - Word 7
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | PASSWORD_7 | R/W | 0h | BSL access password - Word 7 |
APP_REV_POINTER is shown in Table 1-78.
Return to the Summary Table.
Pointer to application version information in MAIN flash
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-0 | APP_REV_POINTER | R/W | 0h | Pointer to application version information in MAIN flash |
BSLCONFIG1 is shown in Table 1-79.
Return to the Summary Table.
Security alert response: Factory Reset/Disable BSL/Ignore; UART communication speed selection for ROM BSL
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-16 | UART_BAUD_RATE | R/W | 0h | UART communication speed selection for ROM BSL
|
| 15-0 | SECURITY_ALERT_LEVEL | R/W | 0h | Security alert response: Factory Reset/Disable BSL/Ignore
|
I2C_SLAVE_ADDR is shown in Table 1-80.
Return to the Summary Table.
I2C slave address for ROM BSL I2C interface; Reserved field; Reserved field
| Bit | Field | Type | Reset | Description |
|---|---|---|---|---|
| 31-24 | RESERVED | R | 0h | Reserved field |
| 23-16 | RESERVED | R | 0h | Reserved field |
| 15-0 | I2C_SLAVE_ADDR | R/W | 0h | I2C slave address for ROM BSL I2C interface |