AM62Px MCU+ SDK  10.01.00
Extended OTP Test

Introduction

This example demonstrates how can one read, write and lock the extended OTP eFuses of the device. The row index for lock row is set to an invalid value. The user can determine the rows to be locked based on the device running the example. This is a special example, and is booted by ROM. Because of this it is to be treated like a bootloader application.

The example tries to write the USB VID/PID onto the OTP rows. It also dumps the OTP MMR rows. It makes use of Sciclient API calls to do this, there are wrapper functions provided in the examples for these.

Supported Combinations

Parameter Value
CPU + OS wkup-r5fss0-0 nortos
Toolchain ti-arm-clang
Board am62px-sk
Example folder examples/otp/ext_otp/

Steps to Run the Example

  • When using CCS projects to build, import the CCS project for the required combination and build it using the CCS project menu (see Using SDK with CCS Projects).
  • When using makefiles to build, note the required combination and build using make command (see Using SDK with Makefiles)
  • Set bootmode to UART and flash the binary using the following command from {SDK_INSTALLTION_PATH}/tools/boot
        python uart_uniflash.py -p /dev/ttyUSB0 --cfg=../../examples/otp/ext_otp/am62px-sk/wkup-r5fss0-0_nortos/default_ext_otp_hs_fs.cfg
    
  • Use default_ext_otp_hs_fs.cfg for HS-FS device, default_ext_otp_hs.cfg for HS-SE device
  • Power OFF and change the boot mode to OSPI NOR BOOT MODE
  • Logs should appear at the WKUP_UART0

Sample Output

Shown below is a sample output when the application is run.