STM32_Prog_DB_0x494.xml 32 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948
  1. <?xml version="1.0" encoding="UTF-8"?>
  2. <Root xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="SCHVerif.xsd">
  3. <Device>
  4. <DeviceID>0x494</DeviceID>
  5. <Vendor>STMicroelectronics</Vendor>
  6. <Type>MCU</Type>
  7. <CPU>Cortex-M0+/M4</CPU>
  8. <Name>STM32WB15xx</Name>
  9. <Series>STM32WB</Series>
  10. <Description>ARM 32-bit Cortex-M0+ and ARM 32-bit Cortex-M4 dual core based device</Description>
  11. <Configurations>
  12. <!-- JTAG_SWD Interface -->
  13. <Interface name="JTAG_SWD"/>
  14. <!-- Bootloader Interface -->
  15. <Interface name="Bootloader"/>
  16. </Configurations>
  17. <!-- Peripherals -->
  18. <Peripherals>
  19. <!-- Embedded SRAM -->
  20. <Peripheral>
  21. <Name>Embedded SRAM</Name>
  22. <Type>Storage</Type>
  23. <Description/>
  24. <ErasedValue>0x00</ErasedValue>
  25. <Access>RWE</Access>
  26. <!-- 12 KB SRAM1-->
  27. <Configuration>
  28. <Parameters address="0x20000000" name="SRAM" size="0x3000"/>
  29. <Description/>
  30. <Organization>Single</Organization>
  31. <Bank name="Bank 1">
  32. <Field>
  33. <Parameters address="0x20000000" name="SRAM" occurence="0x1" size="0x3000"/>
  34. </Field>
  35. </Bank>
  36. </Configuration>
  37. </Peripheral>
  38. <!-- Embedded Flash -->
  39. <Peripheral>
  40. <Name>Embedded Flash</Name>
  41. <Type>Storage</Type>
  42. <Description>The Flash memory interface manages CPU AHB I-Code and D-Code accesses to the Flash memory. It implements the erase and program Flash memory operations and the read and write protection mechanisms</Description>
  43. <ErasedValue>0x00</ErasedValue>
  44. <Access>RWE</Access>
  45. <FlashSize address="0x1FFF75E0" default="0x50000"/>
  46. <!-- 320 KB Single Bank -->
  47. <Configuration>
  48. <Parameters address="0x08000000" name=" 320 Kbytes Embedded Flash" size="0x50000"/>
  49. <Description/>
  50. <Organization>Single</Organization>
  51. <Allignement>0x8</Allignement>
  52. <Bank name="Bank 1">
  53. <Field>
  54. <Parameters address="0x08000000" name="sector0" occurence="0xA0" size="0x800"/>
  55. </Field>
  56. </Bank>
  57. </Configuration>
  58. </Peripheral>
  59. <!-- OTP -->
  60. <Peripheral>
  61. <Name>OTP</Name>
  62. <Type>Storage</Type>
  63. <Description>The Data OTP memory block. It contains the one time programmable bits.</Description>
  64. <ErasedValue>0xFF</ErasedValue>
  65. <Access>RW</Access>
  66. <!-- 1 KBytes -->
  67. <Configuration>
  68. <Parameters address="0x1FFF7000" name=" 1 KBytes Data OTP" size="0x400"/>
  69. <Description/>
  70. <Organization>Single</Organization>
  71. <Allignement>0x4</Allignement>
  72. <Bank name="OTP">
  73. <Field>
  74. <Parameters address="0x1FFF7000" name="OTP" occurence="0x1" size="0x400"/>
  75. </Field>
  76. </Bank>
  77. </Configuration>
  78. </Peripheral>
  79. <!-- Mirror Option Bytes -->
  80. <Peripheral>
  81. <Name>MirrorOptionBytes</Name>
  82. <Type>Storage</Type>
  83. <Description>Mirror Option Bytes contains the extra area.</Description>
  84. <ErasedValue>0xFF</ErasedValue>
  85. <Access>RW</Access>
  86. <!-- 128 Bytes single bank -->
  87. <Configuration>
  88. <Parameters address="0x1FFF7800" name=" 128 Bytes Data MirrorOptionBytes" size="0x80"/>
  89. <Description/>
  90. <Organization>Single</Organization>
  91. <Allignement>0x4</Allignement>
  92. <Bank name="MirrorOptionBytes">
  93. <Field>
  94. <Parameters address="0x1FFF7800" name="MirrorOptionBytes" occurence="0x1" size="0x80"/>
  95. </Field>
  96. </Bank>
  97. </Configuration>
  98. </Peripheral>
  99. <!-- Option Bytes -->
  100. <Peripheral>
  101. <Name>Option Bytes</Name>
  102. <Type>Configuration</Type>
  103. <Description/>
  104. <Access>RW</Access>
  105. <Bank interface="JTAG_SWD">
  106. <Parameters address="0x58004020" name="Bank 1" size="0x68"/>
  107. <Category>
  108. <Name>Read Out Protection</Name>
  109. <Field>
  110. <Parameters address="0x58004020" name="RDP" size="0x4"/>
  111. <AssignedBits>
  112. <Bit>
  113. <Name>RDP</Name>
  114. <Description>Read protection option byte. The read protection is used to protect the software code stored in Flash memory.</Description>
  115. <BitOffset>0x0</BitOffset>
  116. <BitWidth>0x8</BitWidth>
  117. <Access>RW</Access>
  118. <Values>
  119. <Val value="0xAA">Level 0, no protection</Val>
  120. <Val value="0xBB">or any value other than 0xAA and 0xCC: Level 1, read protection</Val>
  121. <Val value="0xCC">Level 2, chip protection</Val>
  122. </Values>
  123. </Bit>
  124. </AssignedBits>
  125. </Field>
  126. </Category>
  127. <Category>
  128. <Name>BOR Level</Name>
  129. <Field>
  130. <Parameters address="0x58004020" name="USER" size="0x4"/>
  131. <AssignedBits>
  132. <Bit>
  133. <Name>BOR_LEV</Name>
  134. <Description>These bits contain the supply level threshold that activates/releases the reset. They can be written to program a new BOR level value into Flash memory</Description>
  135. <BitOffset>0x9</BitOffset>
  136. <BitWidth>0x3</BitWidth>
  137. <Access>RW</Access>
  138. <Values>
  139. <Val value="0x0">BOR Level 0 reset level threshold is around 1.7 V</Val>
  140. <Val value="0x1">BOR Level 1 reset level threshold is around 2.0 V</Val>
  141. <Val value="0x2">BOR Level 2 reset level threshold is around 2.2 V</Val>
  142. <Val value="0x3">BOR Level 3 reset level threshold is around 2.5 V</Val>
  143. <Val value="0x4">BOR Level 4 reset level threshold is around 2.8 V</Val>
  144. </Values>
  145. </Bit>
  146. </AssignedBits>
  147. </Field>
  148. </Category>
  149. <Category>
  150. <Name>User Configuration</Name>
  151. <Field>
  152. <Parameters address="0x58004020" name="USER" size="0x4"/>
  153. <AssignedBits>
  154. <Bit>
  155. <Name>nBOOT0</Name>
  156. <Description/>
  157. <BitOffset>0x1B</BitOffset>
  158. <BitWidth>0x1</BitWidth>
  159. <Access>RW</Access>
  160. <Values>
  161. <Val value="0x0">nBOOT0=0</Val>
  162. <Val value="0x1">nBOOT0=1</Val>
  163. </Values>
  164. </Bit>
  165. <Bit>
  166. <Name>nBOOT1</Name>
  167. <Description/>
  168. <BitOffset>0x17</BitOffset>
  169. <BitWidth>0x1</BitWidth>
  170. <Access>RW</Access>
  171. <Values>
  172. <Val value="0x0">Boot from code area if BOOT0=0 otherwise system Flash</Val>
  173. <Val value="0x1">Boot from code area if BOOT0=0 otherwise embedded SRAM</Val>
  174. </Values>
  175. </Bit>
  176. <Bit>
  177. <Name>nSWBOOT0</Name>
  178. <Description/>
  179. <BitOffset>0x1A</BitOffset>
  180. <BitWidth>0x1</BitWidth>
  181. <Access>RW</Access>
  182. <Values>
  183. <Val value="0x0">BOOT0 taken from the option bit nBOOT0</Val>
  184. <Val value="0x1">BOOT0 taken from PH3/BOOT0 pin</Val>
  185. </Values>
  186. </Bit>
  187. <Bit>
  188. <Name>SRAM2RST</Name>
  189. <Description/>
  190. <BitOffset>0x19</BitOffset>
  191. <BitWidth>0x1</BitWidth>
  192. <Access>RW</Access>
  193. <Values>
  194. <Val value="0x0">SRAM2 erased when a system reset occurs</Val>
  195. <Val value="0x1">SRAM2 is not erased when a system reset occurs</Val>
  196. </Values>
  197. </Bit>
  198. <Bit>
  199. <Name>SRAM2PE</Name>
  200. <Description/>
  201. <BitOffset>0x18</BitOffset>
  202. <BitWidth>0x1</BitWidth>
  203. <Access>RW</Access>
  204. <Values>
  205. <Val value="0x0">SRAM2 parity check enable</Val>
  206. <Val value="0x1">SRAM2 parity check disable</Val>
  207. </Values>
  208. </Bit>
  209. <Bit>
  210. <Name>nRST_STOP</Name>
  211. <Description/>
  212. <BitOffset>0xC</BitOffset>
  213. <BitWidth>0x1</BitWidth>
  214. <Access>RW</Access>
  215. <Values>
  216. <Val value="0x0">Reset generated when entering the Stop mode</Val>
  217. <Val value="0x1">No reset generated when entering the Stop mode</Val>
  218. </Values>
  219. </Bit>
  220. <Bit>
  221. <Name>nRST_STDBY</Name>
  222. <Description/>
  223. <BitOffset>0xD</BitOffset>
  224. <BitWidth>0x1</BitWidth>
  225. <Access>RW</Access>
  226. <Values>
  227. <Val value="0x0">Reset generated when entering the Standby mode</Val>
  228. <Val value="0x1">No reset generated when entering the Standby mode</Val>
  229. </Values>
  230. </Bit>
  231. <Bit>
  232. <Name>nRSTSHDW</Name>
  233. <Description/>
  234. <BitOffset>0xE</BitOffset>
  235. <BitWidth>0x1</BitWidth>
  236. <Access>RW</Access>
  237. <Values>
  238. <Val value="0x0">Reset generated when entering the Shutdown mode</Val>
  239. <Val value="0x1">No reset generated when entering the Shutdown mode</Val>
  240. </Values>
  241. </Bit>
  242. <Bit>
  243. <Name>WWDGSW</Name>
  244. <Description/>
  245. <BitOffset>0x13</BitOffset>
  246. <BitWidth>0x1</BitWidth>
  247. <Access>RW</Access>
  248. <Values>
  249. <Val value="0x0">Hardware window watchdog</Val>
  250. <Val value="0x1">Software window watchdog</Val>
  251. </Values>
  252. </Bit>
  253. <Bit>
  254. <Name>IWGDSTDBY</Name>
  255. <Description/>
  256. <BitOffset>0x12</BitOffset>
  257. <BitWidth>0x1</BitWidth>
  258. <Access>RW</Access>
  259. <Values>
  260. <Val value="0x0">Independent watchdog counter frozen in Standby mode</Val>
  261. <Val value="0x1">Independent watchdog counter running in Standby mode</Val>
  262. </Values>
  263. </Bit>
  264. <Bit>
  265. <Name>IWDGSTOP</Name>
  266. <Description/>
  267. <BitOffset>0x11</BitOffset>
  268. <BitWidth>0x1</BitWidth>
  269. <Access>RW</Access>
  270. <Values>
  271. <Val value="0x0">Independent watchdog counter frozen in Stop mode</Val>
  272. <Val value="0x1">Independent watchdog counter running in Stop mode</Val>
  273. </Values>
  274. </Bit>
  275. <Bit>
  276. <Name>IWDGSW</Name>
  277. <Description/>
  278. <BitOffset>0x10</BitOffset>
  279. <BitWidth>0x1</BitWidth>
  280. <Access>RW</Access>
  281. <Values>
  282. <Val value="0x0">Hardware independent watchdog</Val>
  283. <Val value="0x1">Software independent watchdog</Val>
  284. </Values>
  285. </Bit>
  286. </AssignedBits>
  287. </Field>
  288. <Field>
  289. <Parameters address="0x5800403C" name="FLASH_IPCCBR" size="0x4"/>
  290. <AssignedBits>
  291. <Bit>
  292. <Name>IPCCDBA</Name>
  293. <Description>IPCC mailbox data buffer base address</Description>
  294. <BitOffset>0x0</BitOffset>
  295. <BitWidth>0xE</BitWidth>
  296. <Access>RW</Access>
  297. </Bit>
  298. </AssignedBits>
  299. </Field>
  300. </Category>
  301. <Category>
  302. <Name>Security Configuration</Name>
  303. <Field>
  304. <Parameters address="0x58004020" name="FLASH_OPTR" size="0x4"/>
  305. <AssignedBits>
  306. <Bit>
  307. <Name>ESE</Name>
  308. <Description>System Security Enabled flag</Description>
  309. <BitOffset>0x8</BitOffset>
  310. <BitWidth>0x1</BitWidth>
  311. <Access>R</Access>
  312. <Values>
  313. <Val value="0x0">Security disabled</Val>
  314. <Val value="0x1">Security enabled</Val>
  315. </Values>
  316. </Bit>
  317. </AssignedBits>
  318. </Field>
  319. <Field>
  320. <Parameters address="0x58004080" name="FLASH_SFR" size="0x4"/>
  321. <AssignedBits>
  322. <Bit>
  323. <Name>SFSA</Name>
  324. <Description>Secure Flash Start Address</Description>
  325. <BitOffset>0x0</BitOffset>
  326. <BitWidth>0x8</BitWidth>
  327. <Access>RW</Access>
  328. </Bit>
  329. <Bit>
  330. <Name>FSD</Name>
  331. <Description>Flash Security Disable</Description>
  332. <BitOffset>0x8</BitOffset>
  333. <BitWidth>0x1</BitWidth>
  334. <Access>RW</Access>
  335. <Values>
  336. <Val value="0x0">System and Flash secure</Val>
  337. <Val value="0x1">System and Flash non-secure</Val>
  338. </Values>
  339. </Bit>
  340. <Bit>
  341. <Name>DDS</Name>
  342. <Description>Disable CPU2 Debug access</Description>
  343. <BitOffset>0xC</BitOffset>
  344. <BitWidth>0x1</BitWidth>
  345. <Access>RW</Access>
  346. <Values>
  347. <Val value="0x0">CPU2 debug access enabled</Val>
  348. <Val value="0x1">CPU2 debug access disabled</Val>
  349. </Values>
  350. </Bit>
  351. </AssignedBits>
  352. </Field>
  353. <Field>
  354. <Parameters address="0x58004084" name="FLASH_SRRVR" size="0x4"/>
  355. <AssignedBits>
  356. <Bit>
  357. <Name>C2OPT</Name>
  358. <Description>CPU2 boot reset vector memory selection</Description>
  359. <BitOffset>0x1F</BitOffset>
  360. <BitWidth>0x1</BitWidth>
  361. <Access>RW</Access>
  362. <Values>
  363. <Val value="0x0">SBRV will address SRAM1 or SRAM2</Val>
  364. <Val value="0x1">SBRV will address Flash</Val>
  365. </Values>
  366. </Bit>
  367. <Bit>
  368. <Name>BRSD_B</Name>
  369. <Description>Backup SRAM2b security disable</Description>
  370. <BitOffset>0x1E</BitOffset>
  371. <BitWidth>0x1</BitWidth>
  372. <Access>RW</Access>
  373. <Values>
  374. <Val value="0x0">SRAM2b is secure</Val>
  375. <Val value="0x1">SRAM2b is non-secure</Val>
  376. </Values>
  377. </Bit>
  378. <Bit>
  379. <Name>SBRSA_B</Name>
  380. <Description>SBRSA_B[1:0] contains the start address of the first 1K page of the secure non-backup SRAM2b area.</Description>
  381. <BitOffset>0x19</BitOffset>
  382. <BitWidth>0x2</BitWidth>
  383. <Access>RW</Access>
  384. </Bit>
  385. <Bit>
  386. <Name>BRSD_A</Name>
  387. <Description>Backup SRAM2a security disable</Description>
  388. <BitOffset>0x17</BitOffset>
  389. <BitWidth>0x1</BitWidth>
  390. <Access>RW</Access>
  391. <Values>
  392. <Val value="0x0">SRAM2a is secure</Val>
  393. <Val value="0x1">SRAM2a is non-secure</Val>
  394. </Values>
  395. </Bit>
  396. <Bit>
  397. <Name>SBRSA_A</Name>
  398. <Description>SBRSA_A[4:0] contains the start address of the first 1K page of the secure backup SRAM2a area.</Description>
  399. <BitOffset>0x12</BitOffset>
  400. <BitWidth>0x5</BitWidth>
  401. <Access>RW</Access>
  402. </Bit>
  403. <Bit>
  404. <Name>SBRV</Name>
  405. <Description>Contains the word aligned CPU2 boot reset start address offset within the selected. memory area by C2OPT.</Description>
  406. <BitOffset>0x0</BitOffset>
  407. <BitWidth>0x11</BitWidth>
  408. <Access>RW</Access>
  409. </Bit>
  410. </AssignedBits>
  411. </Field>
  412. </Category>
  413. <Category>
  414. <Name>PCROP Protection</Name>
  415. <Field>
  416. <Parameters address="0x58004024" name="PCROP1ASR" size="0x4"/>
  417. <AssignedBits>
  418. <Bit>
  419. <Name>PCROP1A_STRT</Name>
  420. <Description>Flash Area 1 PCROP start address</Description>
  421. <BitOffset>0x0</BitOffset>
  422. <BitWidth>0x9</BitWidth>
  423. <Access>RW</Access>
  424. <Equation multiplier="0x800" offset="0x08000000"/>
  425. </Bit>
  426. </AssignedBits>
  427. </Field>
  428. <Field>
  429. <Parameters address="0x58004028" name="PCROP1AER" size="0x4"/>
  430. <AssignedBits>
  431. <Bit>
  432. <Name>PCROP1A_END</Name>
  433. <Description>Flash Area 1 PCROP End address. Deactivation of PCROP can be done by enabling PCROP_RDP and changing RDP. from level 1 to level 0.</Description>
  434. <BitOffset>0x0</BitOffset>
  435. <BitWidth>0x9</BitWidth>
  436. <Access>RW</Access>
  437. <Equation multiplier="0x800" offset="0x08000800"/>
  438. </Bit>
  439. <Bit>
  440. <Name>PCROP_RDP</Name>
  441. <Description/>
  442. <BitOffset>0x1F</BitOffset>
  443. <BitWidth>0x1</BitWidth>
  444. <Access>RW</Access>
  445. <Values>
  446. <Val value="0x0">PCROP zone is kept when RDP is decreased</Val>
  447. <Val value="0x1">PCROP zone is erased when RDP is decreased</Val>
  448. </Values>
  449. </Bit>
  450. </AssignedBits>
  451. </Field>
  452. <Field>
  453. <Parameters address="0x58004034" name="PCROP1BSR" size="0x4"/>
  454. <AssignedBits>
  455. <Bit>
  456. <Name>PCROP1B_STRT</Name>
  457. <Description>Flash Area 2 PCROP start address</Description>
  458. <BitOffset>0x0</BitOffset>
  459. <BitWidth>0x9</BitWidth>
  460. <Access>RW</Access>
  461. <Equation multiplier="0x800" offset="0x08000000"/>
  462. </Bit>
  463. </AssignedBits>
  464. </Field>
  465. <Field>
  466. <Parameters address="0x58004038" name="PCROP1BER" size="0x4"/>
  467. <AssignedBits>
  468. <Bit>
  469. <Name>PCROP1B_END</Name>
  470. <Description>Flash Area 2 PCROP End address. Deactivation of PCROP can be done by enabling PCROP_RDP and changing RDP. from level 1 to level 0.</Description>
  471. <BitOffset>0x0</BitOffset>
  472. <BitWidth>0x9</BitWidth>
  473. <Access>RW</Access>
  474. <Equation multiplier="0x800" offset="0x08000800"/>
  475. </Bit>
  476. </AssignedBits>
  477. </Field>
  478. </Category>
  479. <Category>
  480. <Name>Write Protection</Name>
  481. <Field>
  482. <Parameters address="0x5800402C" name="FLASH_WRP1AR" size="0x4"/>
  483. <AssignedBits>
  484. <Bit>
  485. <Name>WRP1A_STRT</Name>
  486. <Description>The address of the first page of the Bank 1 WRP first area.</Description>
  487. <BitOffset>0x0</BitOffset>
  488. <BitWidth>0x8</BitWidth>
  489. <Access>RW</Access>
  490. <Equation multiplier="0x800" offset="0x08000000"/>
  491. </Bit>
  492. <Bit>
  493. <Name>WRP1A_END</Name>
  494. <Description>The address of the last page of the Bank 1 WRP first area.</Description>
  495. <BitOffset>0x10</BitOffset>
  496. <BitWidth>0x8</BitWidth>
  497. <Access>RW</Access>
  498. <Equation multiplier="0x800" offset="0x08000000"/>
  499. </Bit>
  500. </AssignedBits>
  501. </Field>
  502. <Field>
  503. <Parameters address="0x58004030" name="FLASH_WRP1BR" size="0x4"/>
  504. <AssignedBits>
  505. <Bit>
  506. <Name>WRP1B_STRT</Name>
  507. <Description>The address of the first page of the Bank 1 WRP second area.</Description>
  508. <BitOffset>0x0</BitOffset>
  509. <BitWidth>0x8</BitWidth>
  510. <Access>RW</Access>
  511. <Equation multiplier="0x800" offset="0x08000000"/>
  512. </Bit>
  513. <Bit>
  514. <Name>WRP1B_END</Name>
  515. <Description>The address of the last page of the Bank 1 WRP second area.</Description>
  516. <BitOffset>0x10</BitOffset>
  517. <BitWidth>0x8</BitWidth>
  518. <Access>RW</Access>
  519. <Equation multiplier="0x800" offset="0x08000000"/>
  520. </Bit>
  521. </AssignedBits>
  522. </Field>
  523. </Category>
  524. </Bank>
  525. <Bank interface="Bootloader">
  526. <Parameters address="0x1FFF7800" name="Bank 1" size="0x80"/>
  527. <Category>
  528. <Name>Read Out Protection</Name>
  529. <Field>
  530. <Parameters address="0x1FFF7800" name="RDP" size="0x4"/>
  531. <AssignedBits>
  532. <Bit>
  533. <Name>RDP</Name>
  534. <Description>Read protection option byte. The read protection is used to protect the software code stored in Flash memory.</Description>
  535. <BitOffset>0x0</BitOffset>
  536. <BitWidth>0x8</BitWidth>
  537. <Access>RW</Access>
  538. <Values>
  539. <Val value="0xAA">Level 0, no protection</Val>
  540. <Val value="0xBB">or any value other than 0xAA and 0xCC: Level 1, read protection</Val>
  541. <Val value="0xCC">Level 2, chip protection</Val>
  542. </Values>
  543. </Bit>
  544. </AssignedBits>
  545. </Field>
  546. </Category>
  547. <Category>
  548. <Name>BOR Level</Name>
  549. <Field>
  550. <Parameters address="0x1FFF7800" name="USER" size="0x4"/>
  551. <AssignedBits>
  552. <Bit>
  553. <Name>BOR_LEV</Name>
  554. <Description>These bits contain the supply level threshold that activates/releases the reset. They can be written to program a new BOR level value into Flash memory</Description>
  555. <BitOffset>0x9</BitOffset>
  556. <BitWidth>0x3</BitWidth>
  557. <Access>RW</Access>
  558. <Values>
  559. <Val value="0x0">BOR Level 0 reset level threshold is around 1.7 V</Val>
  560. <Val value="0x1">BOR Level 1 reset level threshold is around 2.0 V</Val>
  561. <Val value="0x2">BOR Level 2 reset level threshold is around 2.2 V</Val>
  562. <Val value="0x3">BOR Level 3 reset level threshold is around 2.5 V</Val>
  563. <Val value="0x4">BOR Level 4 reset level threshold is around 2.8 V</Val>
  564. </Values>
  565. </Bit>
  566. </AssignedBits>
  567. </Field>
  568. </Category>
  569. <Category>
  570. <Name>User Configuration</Name>
  571. <Field>
  572. <Parameters address="0x1FFF7800" name="USER" size="0x4"/>
  573. <AssignedBits>
  574. <Bit>
  575. <Name>nBOOT0</Name>
  576. <Description/>
  577. <BitOffset>0x1B</BitOffset>
  578. <BitWidth>0x1</BitWidth>
  579. <Access>RW</Access>
  580. <Values>
  581. <Val value="0x0">nBOOT0=0</Val>
  582. <Val value="0x1">nBOOT0=1</Val>
  583. </Values>
  584. </Bit>
  585. <Bit>
  586. <Name>nBOOT1</Name>
  587. <Description/>
  588. <BitOffset>0x17</BitOffset>
  589. <BitWidth>0x1</BitWidth>
  590. <Access>RW</Access>
  591. <Values>
  592. <Val value="0x0">Boot from code area if BOOT0=0 otherwise system Flash</Val>
  593. <Val value="0x1">Boot from code area if BOOT0=0 otherwise embedded SRAM</Val>
  594. </Values>
  595. </Bit>
  596. <Bit>
  597. <Name>nSWBOOT0</Name>
  598. <Description/>
  599. <BitOffset>0x1A</BitOffset>
  600. <BitWidth>0x1</BitWidth>
  601. <Access>RW</Access>
  602. <Values>
  603. <Val value="0x0">BOOT0 taken from the option bit nBOOT0</Val>
  604. <Val value="0x1">BOOT0 taken from PH3/BOOT0 pin</Val>
  605. </Values>
  606. </Bit>
  607. <Bit>
  608. <Name>SRAM2RST</Name>
  609. <Description/>
  610. <BitOffset>0x19</BitOffset>
  611. <BitWidth>0x1</BitWidth>
  612. <Access>RW</Access>
  613. <Values>
  614. <Val value="0x0">SRAM2 erased when a system reset occurs</Val>
  615. <Val value="0x1">SRAM2 is not erased when a system reset occurs</Val>
  616. </Values>
  617. </Bit>
  618. <Bit>
  619. <Name>SRAM2PE</Name>
  620. <Description/>
  621. <BitOffset>0x18</BitOffset>
  622. <BitWidth>0x1</BitWidth>
  623. <Access>RW</Access>
  624. <Values>
  625. <Val value="0x0">SRAM2 parity check enable</Val>
  626. <Val value="0x1">SRAM2 parity check disable</Val>
  627. </Values>
  628. </Bit>
  629. <Bit>
  630. <Name>nRST_STOP</Name>
  631. <Description/>
  632. <BitOffset>0xC</BitOffset>
  633. <BitWidth>0x1</BitWidth>
  634. <Access>RW</Access>
  635. <Values>
  636. <Val value="0x0">Reset generated when entering the Stop mode</Val>
  637. <Val value="0x1">No reset generated when entering the Stop mode</Val>
  638. </Values>
  639. </Bit>
  640. <Bit>
  641. <Name>nRST_STDBY</Name>
  642. <Description/>
  643. <BitOffset>0xD</BitOffset>
  644. <BitWidth>0x1</BitWidth>
  645. <Access>RW</Access>
  646. <Values>
  647. <Val value="0x0">Reset generated when entering the Standby mode</Val>
  648. <Val value="0x1">No reset generated when entering the Standby mode</Val>
  649. </Values>
  650. </Bit>
  651. <Bit>
  652. <Name>nRSTSHDW</Name>
  653. <Description/>
  654. <BitOffset>0xE</BitOffset>
  655. <BitWidth>0x1</BitWidth>
  656. <Access>RW</Access>
  657. <Values>
  658. <Val value="0x0">Reset generated when entering the Shutdown mode</Val>
  659. <Val value="0x1">No reset generated when entering the Shutdown mode</Val>
  660. </Values>
  661. </Bit>
  662. <Bit>
  663. <Name>WWDGSW</Name>
  664. <Description/>
  665. <BitOffset>0x13</BitOffset>
  666. <BitWidth>0x1</BitWidth>
  667. <Access>RW</Access>
  668. <Values>
  669. <Val value="0x0">Hardware window watchdog</Val>
  670. <Val value="0x1">Software window watchdog</Val>
  671. </Values>
  672. </Bit>
  673. <Bit>
  674. <Name>IWGDSTDBY</Name>
  675. <Description/>
  676. <BitOffset>0x12</BitOffset>
  677. <BitWidth>0x1</BitWidth>
  678. <Access>RW</Access>
  679. <Values>
  680. <Val value="0x0">Independent watchdog counter frozen in Standby mode</Val>
  681. <Val value="0x1">Independent watchdog counter running in Standby mode</Val>
  682. </Values>
  683. </Bit>
  684. <Bit>
  685. <Name>IWDGSTOP</Name>
  686. <Description/>
  687. <BitOffset>0x11</BitOffset>
  688. <BitWidth>0x1</BitWidth>
  689. <Access>RW</Access>
  690. <Values>
  691. <Val value="0x0">Independent watchdog counter frozen in Stop mode</Val>
  692. <Val value="0x1">Independent watchdog counter running in Stop mode</Val>
  693. </Values>
  694. </Bit>
  695. <Bit>
  696. <Name>IWDGSW</Name>
  697. <Description/>
  698. <BitOffset>0x10</BitOffset>
  699. <BitWidth>0x1</BitWidth>
  700. <Access>RW</Access>
  701. <Values>
  702. <Val value="0x0">Hardware independent watchdog</Val>
  703. <Val value="0x1">Software independent watchdog</Val>
  704. </Values>
  705. </Bit>
  706. </AssignedBits>
  707. </Field>
  708. <Field>
  709. <Parameters address="0x1FFF7868" name="FLASH_IPCCBR" size="0x4"/>
  710. <AssignedBits>
  711. <Bit>
  712. <Name>IPCCDBA</Name>
  713. <Description>IPCC mailbox data buffer base address</Description>
  714. <BitOffset>0x0</BitOffset>
  715. <BitWidth>0xE</BitWidth>
  716. <Access>RW</Access>
  717. </Bit>
  718. </AssignedBits>
  719. </Field>
  720. </Category>
  721. <Category>
  722. <Name>Security Configuration</Name>
  723. <Field>
  724. <Parameters address="0x1FFF7800" name="FLASH_OPTR" size="0x4"/>
  725. <AssignedBits>
  726. <Bit>
  727. <Name>ESE</Name>
  728. <Description>System Security Enabled flag</Description>
  729. <BitOffset>0x8</BitOffset>
  730. <BitWidth>0x1</BitWidth>
  731. <Access>R</Access>
  732. <Values>
  733. <Val value="0x0">Security disabled</Val>
  734. <Val value="0x1">Security enabled</Val>
  735. </Values>
  736. </Bit>
  737. </AssignedBits>
  738. </Field>
  739. <Field>
  740. <Parameters address="0x1FFF7870" name="FLASH_SFR" size="0x4"/>
  741. <AssignedBits>
  742. <Bit>
  743. <Name>SFSA</Name>
  744. <Description>Secure Flash Start Address</Description>
  745. <BitOffset>0x0</BitOffset>
  746. <BitWidth>0x8</BitWidth>
  747. <Access>RW</Access>
  748. </Bit>
  749. <Bit>
  750. <Name>FSD</Name>
  751. <Description>Flash Security Disable</Description>
  752. <BitOffset>0x8</BitOffset>
  753. <BitWidth>0x1</BitWidth>
  754. <Access>RW</Access>
  755. <Values>
  756. <Val value="0x0">System and Flash secure</Val>
  757. <Val value="0x1">System and Flash non-secure</Val>
  758. </Values>
  759. </Bit>
  760. <Bit>
  761. <Name>DDS</Name>
  762. <Description>Disable CPU2 Debug access</Description>
  763. <BitOffset>0xC</BitOffset>
  764. <BitWidth>0x1</BitWidth>
  765. <Access>RW</Access>
  766. <Values>
  767. <Val value="0x0">CPU2 debug access enabled</Val>
  768. <Val value="0x1">CPU2 debug access disabled</Val>
  769. </Values>
  770. </Bit>
  771. </AssignedBits>
  772. </Field>
  773. <Field>
  774. <Parameters address="0x1FFF7878" name="FLASH_SRRVR" size="0x4"/>
  775. <AssignedBits>
  776. <Bit>
  777. <Name>C2OPT</Name>
  778. <Description>CPU2 boot reset vector memory selection</Description>
  779. <BitOffset>0x1F</BitOffset>
  780. <BitWidth>0x1</BitWidth>
  781. <Access>RW</Access>
  782. <Values>
  783. <Val value="0x0">SBRV will address SRAM1 or SRAM2</Val>
  784. <Val value="0x1">SBRV will address Flash</Val>
  785. </Values>
  786. </Bit>
  787. <Bit>
  788. <Name>BRSD_B</Name>
  789. <Description>Backup SRAM2b security disable</Description>
  790. <BitOffset>0x1E</BitOffset>
  791. <BitWidth>0x1</BitWidth>
  792. <Access>RW</Access>
  793. <Values>
  794. <Val value="0x0">SRAM2b is secure</Val>
  795. <Val value="0x1">SRAM2b is non-secure</Val>
  796. </Values>
  797. </Bit>
  798. <Bit>
  799. <Name>SBRSA_B</Name>
  800. <Description>SBRSA_B[1:0] contains the start address of the first 1K page of the secure non-backup SRAM2b area.</Description>
  801. <BitOffset>0x19</BitOffset>
  802. <BitWidth>0x2</BitWidth>
  803. <Access>RW</Access>
  804. </Bit>
  805. <Bit>
  806. <Name>BRSD_A</Name>
  807. <Description>Backup SRAM2a security disable</Description>
  808. <BitOffset>0x17</BitOffset>
  809. <BitWidth>0x1</BitWidth>
  810. <Access>RW</Access>
  811. <Values>
  812. <Val value="0x0">SRAM2a is secure</Val>
  813. <Val value="0x1">SRAM2a is non-secure</Val>
  814. </Values>
  815. </Bit>
  816. <Bit>
  817. <Name>SBRSA_A</Name>
  818. <Description>SBRSA_A[4:0] contains the start address of the first 1K page of the secure backup SRAM2a area.</Description>
  819. <BitOffset>0x12</BitOffset>
  820. <BitWidth>0x5</BitWidth>
  821. <Access>RW</Access>
  822. </Bit>
  823. <Bit>
  824. <Name>SBRV</Name>
  825. <Description>Contains the word aligned CPU2 boot reset start address offset within the selected. memory area by C2OPT.</Description>
  826. <BitOffset>0x0</BitOffset>
  827. <BitWidth>0x11</BitWidth>
  828. <Access>RW</Access>
  829. </Bit>
  830. </AssignedBits>
  831. </Field>
  832. </Category>
  833. <Category>
  834. <Name>PCROP Protection</Name>
  835. <Field>
  836. <Parameters address="0x1FFF7808" name="PCROP1ASR" size="0x4"/>
  837. <AssignedBits>
  838. <Bit>
  839. <Name>PCROP1A_STRT</Name>
  840. <Description>Flash Area 1 PCROP start address</Description>
  841. <BitOffset>0x0</BitOffset>
  842. <BitWidth>0x9</BitWidth>
  843. <Access>RW</Access>
  844. <Equation multiplier="0x800" offset="0x08000000"/>
  845. </Bit>
  846. </AssignedBits>
  847. </Field>
  848. <Field>
  849. <Parameters address="0x1FFF7810" name="PCROP1AER" size="0x4"/>
  850. <AssignedBits>
  851. <Bit>
  852. <Name>PCROP1A_END</Name>
  853. <Description>Flash Area 1 PCROP End address. Deactivation of PCROP can be done by enabling PCROP_RDP and changing RDP. from level 1 to level 0.</Description>
  854. <BitOffset>0x0</BitOffset>
  855. <BitWidth>0x9</BitWidth>
  856. <Access>RW</Access>
  857. <Equation multiplier="0x800" offset="0x08000800"/>
  858. </Bit>
  859. <Bit>
  860. <Name>PCROP_RDP</Name>
  861. <Description/>
  862. <BitOffset>0x1F</BitOffset>
  863. <BitWidth>0x1</BitWidth>
  864. <Access>RW</Access>
  865. <Values>
  866. <Val value="0x0">PCROP zone is kept when RDP is decreased</Val>
  867. <Val value="0x1">PCROP zone is erased when RDP is decreased</Val>
  868. </Values>
  869. </Bit>
  870. </AssignedBits>
  871. </Field>
  872. <Field>
  873. <Parameters address="0x1FFF7828" name="PCROP1BSR" size="0x4"/>
  874. <AssignedBits>
  875. <Bit>
  876. <Name>PCROP1B_STRT</Name>
  877. <Description>Flash Area 2 PCROP start address</Description>
  878. <BitOffset>0x0</BitOffset>
  879. <BitWidth>0x9</BitWidth>
  880. <Access>RW</Access>
  881. <Equation multiplier="0x800" offset="0x08000000"/>
  882. </Bit>
  883. </AssignedBits>
  884. </Field>
  885. <Field>
  886. <Parameters address="0x1FFF7830" name="PCROP1BER" size="0x4"/>
  887. <AssignedBits>
  888. <Bit>
  889. <Name>PCROP1B_END</Name>
  890. <Description>Flash Area 2 PCROP End address. Deactivation of PCROP can be done by enabling PCROP_RDP and changing RDP. from level 1 to level 0.</Description>
  891. <BitOffset>0x0</BitOffset>
  892. <BitWidth>0x9</BitWidth>
  893. <Access>RW</Access>
  894. <Equation multiplier="0x800" offset="0x08000800"/>
  895. </Bit>
  896. </AssignedBits>
  897. </Field>
  898. </Category>
  899. <Category>
  900. <Name>Write Protection</Name>
  901. <Field>
  902. <Parameters address="0x1FFF7818" name="FLASH_WRP1AR" size="0x4"/>
  903. <AssignedBits>
  904. <Bit>
  905. <Name>WRP1A_STRT</Name>
  906. <Description>The address of the first page of the Bank 1 WRP first area</Description>
  907. <BitOffset>0x0</BitOffset>
  908. <BitWidth>0x8</BitWidth>
  909. <Access>RW</Access>
  910. <Equation multiplier="0x800" offset="0x08000000"/>
  911. </Bit>
  912. <Bit>
  913. <Name>WRP1A_END</Name>
  914. <Description>The address of the last page of the Bank 1 WRP first area</Description>
  915. <BitOffset>0x10</BitOffset>
  916. <BitWidth>0x8</BitWidth>
  917. <Access>RW</Access>
  918. <Equation multiplier="0x800" offset="0x08000000"/>
  919. </Bit>
  920. </AssignedBits>
  921. </Field>
  922. <Field>
  923. <Parameters address="0x1FFF7820" name="FLASH_WRP1BR" size="0x4"/>
  924. <AssignedBits>
  925. <Bit>
  926. <Name>WRP1B_STRT</Name>
  927. <Description>The address of the first page of the Bank 1 WRP second area.</Description>
  928. <BitOffset>0x0</BitOffset>
  929. <BitWidth>0x8</BitWidth>
  930. <Access>RW</Access>
  931. <Equation multiplier="0x800" offset="0x08000000"/>
  932. </Bit>
  933. <Bit>
  934. <Name>WRP1B_END</Name>
  935. <Description>The address of the last page of the Bank 1 WRP second area.</Description>
  936. <BitOffset>0x10</BitOffset>
  937. <BitWidth>0x8</BitWidth>
  938. <Access>RW</Access>
  939. <Equation multiplier="0x800" offset="0x08000000"/>
  940. </Bit>
  941. </AssignedBits>
  942. </Field>
  943. </Category>
  944. </Bank>
  945. </Peripheral>
  946. </Peripherals>
  947. </Device>
  948. </Root>