• Menu
  • Product
  • Email
  • PDF
  • Order now
  • MSP Flasher user's guide

    • SLAU654E November   2015  – February 2019

       

  • CONTENTS
  • SEARCH
  • MSP Flasher user's guide
  1.   MSP Flasher
    1.     Trademarks
    2. 1 Introduction
    3. 2 Compatibility
    4. 3 Triggers and Arguments
    5. 4 Exit Specifications
    6. 5 Firmware Update
    7. 6 Segment Erase
    8. 7 Example Cases
      1. 7.1 Loading and Executing Target Code From a TXT File
      2. 7.2 Reading Device Memory
      3. 7.3 Accessing a Device With a Device Activation Code
      4. 7.4 Securing the Target Device
      5. 7.5 Unlocking a Password-Protected Target Device
    9. 8 Using MSP Flasher on Unix
    10. 9 Error Codes
  2.   Revision History
  3. IMPORTANT NOTICE
search No matches found.
  • Full reading width
    • Full reading width
    • Comfortable reading width
    • Expanded reading width
  • Card for each section
  • Card with all content

 

USER'S GUIDE

MSP Flasher user's guide

MSP Flasher

MSP Flasher is a user-friendly shell-based interface that provides easy access to MSP devices through JTAG or Spy-Bi-Wire (SBW) by porting the most common functions of the MSP Debug Stack to the command line.

Trademarks

eZ430, LaunchPad, eZ430-Chronos, MSP430, MSP432, SimpleLink are registered trademarks of Texas Instruments.

OS X is a registered trademark of Apple Inc.

Ubuntu is a registered trademark of Canonical Ltd.

Windows is a registered trademark of Microsoft Corporation.

All other trademarks are the property of their respective owners.

1 Introduction

The typical MSP Flasher execution flow consists of the following steps. Optional steps can be activated or deactivated by using special triggers or parameters (see Section 3).

  1. Initialize FET debugger
  2. Perform FET recovery (if a corrupted FET firmware is detected)
  3. Update FET firmware (if a mismatch between firmware and MSP Debug Stack versions is detected)
  4. Power up the target MSP device
  5. Configure the target MSP for JTAG or SBW communication
  6. Connect to the target MSP and display device information
  7. Optional: Erase (parts of) the target device memory
  8. Optional: Load target code into the device from a TXT or HEX file
  9. Optional: Verify target code transfer
  10. Optional: Read device memory and write it to a TXT or HEX file
  11. Optional: Reset the device
  12. Optional: Lock JTAG access
  13. Optional: Reset the device
  14. Optional: Power down the device
  15. Optional: Start target code execution
  16. Disconnect from the target MSP device
  17. Close the FET connection

Status reports are written to a text file named log.txt. This file is saved in the Log folder under the folder where the MSP Flasher executable resides. If the Log folder does not exist, it is automatically created. New instances are appended to the log file, and old logs are never overwritten.

NOTE

For a GUI-based alternative to MSP Flasher, see UniFlash. As of version 4.0, UniFlash features a command line interface with MSP Flasher compatibility mode.

2 Compatibility

MSP Flasher supports the following operating systems:

  • Windows® 7 32 bit or 64 bit
  • Windows 8 32 bit or 64 bit
  • Windows 10 32 bit or 64 bit
  • Ubuntu® 12.04 32 bit or 64 bit
  • Ubuntu 14.04 32 bit or 64 bit
  • Ubuntu 16.04 32 bit or 64 bit
  • OS X® 10.9 or newer

NOTE

MSP Flasher for Linux does not support eZ430™ development tools. This includes the Value Line LaunchPad™ development kit with eZ430 onboard emulation, eZ430-Chronos™ development tool, and older MSP-EXP430 experimenter boards with eZ430 onboard emulation.

MSP Flasher requires a hardware interface to communicate with MSP target devices. The following TI flash emulation tools (FETs) are supported:

  • MSP-FET
  • MSP-FET430UIF
  • eZ-FET and eZ-FET lite
  • eZ430 (including LaunchPad development kits)

NOTE

Do not disconnect the JTAG or emulator USB cable while MSP Flasher is running. Wait until MSP Flasher execution is finished before disconnecting the debugger or target device.

NOTE

To differentiate between multiple eZ430 tools (for example, two or more Value Line LaunchPad tools connected to the same host PC), connect each tool individually or use the unique identifier that is reported by MSP Flasher.
("Found USB FET @ HID0xxx:COMxxx").

Use this identifier with the –I switch whenever more than one eZ430 debugger is connected.

 

Texas Instruments

© Copyright 1995-2025 Texas Instruments Incorporated. All rights reserved.
Submit documentation feedback | IMPORTANT NOTICE | Trademarks | Privacy policy | Cookie policy | Terms of use | Terms of sale