File tree Expand file tree Collapse file tree 2 files changed +54
-0
lines changed
ports/alif/boards/ALIF_ENSEMBLE Expand file tree Collapse file tree 2 files changed +54
-0
lines changed Original file line number Diff line number Diff line change 1+ {
2+ "deploy" : [
3+ " ./deploy.md"
4+ ],
5+ "docs" : " " ,
6+ "features" : [
7+ " Ethernet"
8+ ],
9+ "images" : [
10+ " ensemble-devkit-gen-2.jpg"
11+ ],
12+ "mcu" : " AE722F80F55D5XX" ,
13+ "product" : " Ensemble E7 DevKit" ,
14+ "thumbnail" : " " ,
15+ "url" : " https://alifsemi.com/support/kits/ensemble-devkit/" ,
16+ "vendor" : " Alif Semiconductor"
17+ }
Original file line number Diff line number Diff line change 1+ ### Alif Security Toolkit
2+
3+ This board can be programmed via the SE UART interface using the Alif Security
4+ Toolkit. MicroPython uses a custom version of the toolkit, which can be downloaded
5+ from [ here] ( https://github.com/micropython/alif-security-toolkit/ ) or cloned:
6+
7+ ``` bash
8+ git clone https://github.com/micropython/alif-security-toolkit/
9+ ```
10+
11+ ---
12+
13+ ### Update the SE Firmware (Optional)
14+
15+ If needed, update the SE firmware to match the version used by MicroPython. Ensure
16+ you have the correct port, part number, and chip revision.
17+
18+ ``` bash
19+ python alif-security-toolkit/toolkit/updateSystemPackage.py --port /dev/ttyACM0 --cfg-part AE722F80F55D5LS --cfg-rev B4
20+ ```
21+
22+ ** Note:** The board must be power-cycled after this step.
23+
24+ ---
25+
26+ ### Deploy MicroPython
27+
28+ Download (or build) the firmware package, unzip it, then deploy it:
29+
30+ ``` bash
31+
32+ python alif-security-toolkit/toolkit/app-write-mram.py --port /dev/ttyACM0 --cfg-part AE722F80F55D5LS --cfg-rev B4 --pad --images file:build-ALIF_ENSEMBLE/application_package.ds
33+ ```
34+
35+ The MicroPython REPL is available on the second USB serial port, eg ` /dev/ttyACM1 ` .
36+
37+ ---
You can’t perform that action at this time.
0 commit comments