STM32_Prog_DB_0x497.xml 38 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062
  1. <?xml version="1.0" encoding="UTF-8"?>
  2. <Root xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="SCHVerif.xsd">
  3. <Device>
  4. <DeviceID>0x497</DeviceID>
  5. <Vendor>STMicroelectronics</Vendor>
  6. <Type>MCU</Type>
  7. <CPU>Cortex-M0+/M4</CPU>
  8. <Name>STM32WLxx</Name>
  9. <Series>STM32WL</Series>
  10. <Description>ARM 32-bit Cortex-M0+ and ARM 32-bit Cortex-M4 dual core based device</Description>
  11. <Configurations>
  12. <!-- JTAG_SWD Interface -->
  13. <Interface name="JTAG_SWD">
  14. <Configuration number="0x0"> <!-- Single Core -->
  15. <DBANK reference="0x0"> <ReadRegister address="0x1FFF7550" mask="0x00000100" value="0x0"/> </DBANK>
  16. </Configuration>
  17. <Configuration number="0x1"> <!-- Dual Core -->
  18. <DBANK reference="0x0"> <ReadRegister address="0x1FFF7550" mask="0x00000100" value="0x00000100"/> </DBANK>
  19. </Configuration>
  20. </Interface>
  21. <!-- Bootloader Interface -->
  22. <Interface name="Bootloader"/>
  23. </Configurations>
  24. <!-- Peripherals -->
  25. <Peripherals>
  26. <!-- Embedded SRAM -->
  27. <Peripheral>
  28. <Name>Embedded SRAM</Name>
  29. <Type>Storage</Type>
  30. <Description/>
  31. <ErasedValue>0x00</ErasedValue>
  32. <Access>RWE</Access>
  33. <!-- 192 KB -->
  34. <Configuration>
  35. <Parameters address="0x20000000" name="SRAM" size="0x3000"/>
  36. <Description/>
  37. <Organization>Single</Organization>
  38. <Bank name="Bank 1">
  39. <Field>
  40. <Parameters address="0x20000000" name="SRAM" occurence="0x1" size="0x3000"/>
  41. </Field>
  42. </Bank>
  43. </Configuration>
  44. </Peripheral>
  45. <!-- Embedded Flash -->
  46. <Peripheral>
  47. <Name>Embedded Flash</Name>
  48. <Type>Storage</Type>
  49. <Description>The Flash memory interface manages CPU AHB I-Code and D-Code accesses to the Flash memory. It implements the erase and program Flash memory operations and the read and write protection mechanisms</Description>
  50. <ErasedValue>0xFF</ErasedValue>
  51. <Access>RWE</Access>
  52. <FlashSize address="0x1FFF75E0" default="0x40000"/>
  53. <BootloaderVersion address="0x1FFF3EFE"/>
  54. <!-- 1024KB Single Bank -->
  55. <Configuration>
  56. <Parameters address="0x08000000" name=" 256 Kbytes Embedded Flash" size="0x40000"/>
  57. <Description/>
  58. <Organization>Single</Organization>
  59. <Allignement>0x8</Allignement>
  60. <Bank name="Bank 1">
  61. <Field>
  62. <Parameters address="0x08000000" name="sector0" occurence="0x80" size="0x800"/>
  63. </Field>
  64. </Bank>
  65. </Configuration>
  66. </Peripheral>
  67. <!-- OTP -->
  68. <Peripheral>
  69. <Name>OTP</Name>
  70. <Type>Storage</Type>
  71. <Description>The Data OTP memory block. It contains the one time programmable bits.</Description>
  72. <ErasedValue>0xFF</ErasedValue>
  73. <Access>RW</Access>
  74. <!-- 1 KBytes single bank -->
  75. <Configuration>
  76. <Parameters address="0x1FFF7000" name=" 1 KBytes Data OTP" size="0x400"/>
  77. <Description/>
  78. <Organization>Single</Organization>
  79. <Allignement>0x8</Allignement>
  80. <Bank name="OTP">
  81. <Field>
  82. <Parameters address="0x1FFF7000" name="OTP" occurence="0x1" size="0x400"/>
  83. </Field>
  84. </Bank>
  85. </Configuration>
  86. </Peripheral>
  87. <!-- Mirror Option Bytes -->
  88. <Peripheral>
  89. <Name>MirrorOptionBytes</Name>
  90. <Type>Storage</Type>
  91. <Description>Mirror Option Bytes contains the extra area.</Description>
  92. <ErasedValue>0xFF</ErasedValue>
  93. <Access>RW</Access>
  94. <!-- 104 Bytes single bank -->
  95. <Configuration>
  96. <Parameters address="0x1FFF7800" name=" 104 Bytes Data MirrorOptionBytes" size="0x68"/>
  97. <Description/>
  98. <Organization>Single</Organization>
  99. <Allignement>0x4</Allignement>
  100. <Bank name="MirrorOptionBytes">
  101. <Field>
  102. <Parameters address="0x1FFF7800" name="MirrorOptionBytes" occurence="0x1" size="0x68"/>
  103. </Field>
  104. </Bank>
  105. </Configuration>
  106. </Peripheral>
  107. <!-- Option Bytes -->
  108. <Peripheral>
  109. <Name>Option Bytes</Name>
  110. <Type>Configuration</Type>
  111. <Description/>
  112. <Access>RW</Access>
  113. <Bank interface="JTAG_SWD">
  114. <Parameters address="0x58004020" name="Bank 1" size="0x60"/>
  115. <Category>
  116. <Name>Read Out Protection</Name>
  117. <Field>
  118. <Parameters address="0x58004020" name="RDP" size="0x4"/>
  119. <AssignedBits>
  120. <Bit>
  121. <Name>RDP</Name>
  122. <Description>Read protection option byte. The read protection is used to protect the software code stored in Flash memory.</Description>
  123. <BitOffset>0x0</BitOffset>
  124. <BitWidth>0x8</BitWidth>
  125. <Access>RW</Access>
  126. <Values>
  127. <Val value="0xAA">Level 0, no protection</Val>
  128. <Val value="0xBB">or any value other than 0xAA and 0xCC: Level 1, read protection</Val>
  129. <Val value="0xCC">Level 2, chip protection</Val>
  130. </Values>
  131. </Bit>
  132. </AssignedBits>
  133. </Field>
  134. </Category>
  135. <Category>
  136. <Name>BOR Level</Name>
  137. <Field>
  138. <Parameters address="0x58004020" name="USER" size="0x4"/>
  139. <AssignedBits>
  140. <Bit>
  141. <Name>BOR_LEV</Name>
  142. <Description>These bits contain the supply level threshold that activates/releases the reset. They can be written to program a new BOR level value into Flash memory</Description>
  143. <BitOffset>0x9</BitOffset>
  144. <BitWidth>0x3</BitWidth>
  145. <Access>RW</Access>
  146. <Values>
  147. <Val value="0x0">BOR Level 0 reset level threshold is around 1.7 V</Val>
  148. <Val value="0x1">BOR Level 1 reset level threshold is around 2.0 V</Val>
  149. <Val value="0x2">BOR Level 2 reset level threshold is around 2.2 V</Val>
  150. <Val value="0x3">BOR Level 3 reset level threshold is around 2.5 V</Val>
  151. <Val value="0x4">BOR Level 4 reset level threshold is around 2.8 V</Val>
  152. </Values>
  153. </Bit>
  154. </AssignedBits>
  155. </Field>
  156. </Category>
  157. <Category>
  158. <Name>User Configuration</Name>
  159. <Field>
  160. <Parameters address="0x58004020" name="USER" size="0x4"/>
  161. <AssignedBits>
  162. <Bit>
  163. <Name>nBOOT0</Name>
  164. <Description/>
  165. <BitOffset>0x1B</BitOffset>
  166. <BitWidth>0x1</BitWidth>
  167. <Access>RW</Access>
  168. <Values>
  169. <Val value="0x0">nBOOT0=0</Val>
  170. <Val value="0x1">nBOOT0=1</Val>
  171. </Values>
  172. </Bit>
  173. <Bit>
  174. <Name>nBOOT1</Name>
  175. <Description>Together with the BOOT0 pin or option bit nBOOT0, this bit selects boot mode from the user Flash memory, SRAM1 or system Flash memory . Refer to Reference Manual: Boot configuration Section.</Description>
  176. <BitOffset>0x17</BitOffset>
  177. <BitWidth>0x1</BitWidth>
  178. <Access>RW</Access>
  179. <Values>
  180. <Val value="0x0"/>
  181. <Val value="0x1"/>
  182. </Values>
  183. </Bit>
  184. <Bit>
  185. <Name>nSWBOOT0</Name>
  186. <Description/>
  187. <BitOffset>0x1A</BitOffset>
  188. <BitWidth>0x1</BitWidth>
  189. <Access>RW</Access>
  190. <Values>
  191. <Val value="0x0">BOOT0 taken from the option bit nBOOT0</Val>
  192. <Val value="0x1">BOOT0 taken from PH3/BOOT0 pin</Val>
  193. </Values>
  194. </Bit>
  195. <Bit>
  196. <Name>SRAM_RST</Name>
  197. <Description/>
  198. <BitOffset>0x19</BitOffset>
  199. <BitWidth>0x1</BitWidth>
  200. <Access>RW</Access>
  201. <Values>
  202. <Val value="0x0">SRAM1 and SRAM2 are erased when a system reset occurs</Val>
  203. <Val value="0x1">SRAM1 and SRAM2 are not erased when a system reset occurs</Val>
  204. </Values>
  205. </Bit>
  206. <Bit>
  207. <Name>SRAM2_PE</Name>
  208. <Description/>
  209. <BitOffset>0x18</BitOffset>
  210. <BitWidth>0x1</BitWidth>
  211. <Access>RW</Access>
  212. <Values>
  213. <Val value="0x0">SRAM2 parity check enable</Val>
  214. <Val value="0x1">SRAM2 parity check disable</Val>
  215. </Values>
  216. </Bit>
  217. <Bit>
  218. <Name>nRST_STOP</Name>
  219. <Description/>
  220. <BitOffset>0xC</BitOffset>
  221. <BitWidth>0x1</BitWidth>
  222. <Access>RW</Access>
  223. <Values>
  224. <Val value="0x0">Reset generated when entering the Stop mode</Val>
  225. <Val value="0x1">No reset generated when entering the Stop mode</Val>
  226. </Values>
  227. </Bit>
  228. <Bit>
  229. <Name>nRST_STDBY</Name>
  230. <Description/>
  231. <BitOffset>0xD</BitOffset>
  232. <BitWidth>0x1</BitWidth>
  233. <Access>RW</Access>
  234. <Values>
  235. <Val value="0x0">Reset generated when entering the Standby mode</Val>
  236. <Val value="0x1">No reset generated when entering the Standby mode</Val>
  237. </Values>
  238. </Bit>
  239. <Bit>
  240. <Name>nRST_SHDW</Name>
  241. <Description/>
  242. <BitOffset>0xE</BitOffset>
  243. <BitWidth>0x1</BitWidth>
  244. <Access>RW</Access>
  245. <Values>
  246. <Val value="0x0">Reset generated when entering the Shutdown mode</Val>
  247. <Val value="0x1">No reset generated when entering the Shutdown mode</Val>
  248. </Values>
  249. </Bit>
  250. <Bit>
  251. <Name>WWDG_SW</Name>
  252. <Description/>
  253. <BitOffset>0x13</BitOffset>
  254. <BitWidth>0x1</BitWidth>
  255. <Access>RW</Access>
  256. <Values>
  257. <Val value="0x0">Hardware window watchdog</Val>
  258. <Val value="0x1">Software window watchdog</Val>
  259. </Values>
  260. </Bit>
  261. <Bit>
  262. <Name>IWGD_STDBY</Name>
  263. <Description/>
  264. <BitOffset>0x12</BitOffset>
  265. <BitWidth>0x1</BitWidth>
  266. <Access>RW</Access>
  267. <Values>
  268. <Val value="0x0">Independent watchdog counter frozen in Standby mode</Val>
  269. <Val value="0x1">Independent watchdog counter running in Standby mode</Val>
  270. </Values>
  271. </Bit>
  272. <Bit>
  273. <Name>IWDG_STOP</Name>
  274. <Description/>
  275. <BitOffset>0x11</BitOffset>
  276. <BitWidth>0x1</BitWidth>
  277. <Access>RW</Access>
  278. <Values>
  279. <Val value="0x0">Independent watchdog counter frozen in Stop mode</Val>
  280. <Val value="0x1">Independent watchdog counter running in Stop mode</Val>
  281. </Values>
  282. </Bit>
  283. <Bit>
  284. <Name>IWDG_SW</Name>
  285. <Description/>
  286. <BitOffset>0x10</BitOffset>
  287. <BitWidth>0x1</BitWidth>
  288. <Access>RW</Access>
  289. <Values>
  290. <Val value="0x0">Hardware independent watchdog</Val>
  291. <Val value="0x1">Software independent watchdog</Val>
  292. </Values>
  293. </Bit>
  294. <Bit>
  295. <Name>BOOT_LOCK</Name>
  296. <Description/>
  297. <BitOffset>0x1E</BitOffset>
  298. <BitWidth>0x1</BitWidth>
  299. <Access>RW</Access>
  300. <Values>
  301. <Val value="0x0">CPU1 CM4 Boot lock disabled</Val>
  302. <Val value="0x1">CPU1 CM4 Boot lock enabled</Val>
  303. </Values>
  304. </Bit>
  305. <Bit config="1">
  306. <Name>C2BOOT_LOCK</Name>
  307. <Description/>
  308. <BitOffset>0x1F</BitOffset>
  309. <BitWidth>0x1</BitWidth>
  310. <Access>RW</Access>
  311. <Values>
  312. <Val value="0x0">CPU2 CM0+ Boot lock disabled</Val>
  313. <Val value="0x1">CPU2 CM0+ Boot lock enabled</Val>
  314. </Values>
  315. </Bit>
  316. </AssignedBits>
  317. </Field>
  318. <Field>
  319. <Parameters address="0x5800403C" name="FLASH_IPCCBR" size="0x1"/>
  320. <AssignedBits>
  321. <Bit config="1">
  322. <Name>IPCCDBA</Name>
  323. <Description>IPCC mailbox data buffer base address</Description>
  324. <BitOffset>0x0</BitOffset>
  325. <BitWidth>0xE</BitWidth>
  326. <Access>RW</Access>
  327. </Bit>
  328. </AssignedBits>
  329. </Field>
  330. </Category>
  331. <Category>
  332. <Name>Security Configuration Option bytes ESE</Name>
  333. <Field>
  334. <Parameters address="0x58004020" name="FLASH_OPTR" size="0x4"/>
  335. <AssignedBits>
  336. <Bit>
  337. <Name>ESE</Name>
  338. <Description/>
  339. <BitOffset>0x8</BitOffset>
  340. <BitWidth>0x1</BitWidth>
  341. <Access>RW</Access>
  342. <Values>
  343. <Val value="0x0">Security disabled</Val>
  344. <Val value="0x1">Security enabled</Val>
  345. </Values>
  346. </Bit>
  347. </AssignedBits>
  348. </Field>
  349. </Category>
  350. <Category>
  351. <Name>PCROP Protection</Name>
  352. <Field>
  353. <Parameters address="0x58004024" name="PCROP1ASR" size="0x4"/>
  354. <AssignedBits>
  355. <Bit>
  356. <Name>PCROP1A_STRT</Name>
  357. <Description>PCROP1A_STRT[7:0] contain the first included 1kB page readout protected of the Flash area zone A</Description>
  358. <BitOffset>0x0</BitOffset>
  359. <BitWidth>0x8</BitWidth>
  360. <Access>RW</Access>
  361. <Equation multiplier="0x400" offset="0x08000000"/>
  362. </Bit>
  363. </AssignedBits>
  364. </Field>
  365. <Field>
  366. <Parameters address="0x58004028" name="PCROP1AER" size="0x4"/>
  367. <AssignedBits>
  368. <Bit>
  369. <Name>PCROP1A_END</Name>
  370. <Description>PCROP1A_END[7:0] contain the last included 1kB page readout protected of the Flash area zone A</Description>
  371. <BitOffset>0x0</BitOffset>
  372. <BitWidth>0x8</BitWidth>
  373. <Access>RW</Access>
  374. <Equation multiplier="0x400" offset="0x08000000"/>
  375. </Bit>
  376. <Bit>
  377. <Name>PCROP_RDP</Name>
  378. <Description/>
  379. <BitOffset>0x1F</BitOffset>
  380. <BitWidth>0x1</BitWidth>
  381. <Access>RW</Access>
  382. <Values>
  383. <Val value="0x0">PCROP zone is kept when RDP is decreased</Val>
  384. <Val value="0x1">PCROP zone is erased when RDP is decreased</Val>
  385. </Values>
  386. </Bit>
  387. </AssignedBits>
  388. </Field>
  389. <Field>
  390. <Parameters address="0x58004034" name="PCROP1BSR" size="0x4"/>
  391. <AssignedBits>
  392. <Bit>
  393. <Name>PCROP1B_STRT</Name>
  394. <Description>PCROP1B_STRT[7:0] contain the first included 1kB page readout protected of the Flash area zone B</Description>
  395. <BitOffset>0x0</BitOffset>
  396. <BitWidth>0x8</BitWidth>
  397. <Access>RW</Access>
  398. <Equation multiplier="0x400" offset="0x08000000"/>
  399. </Bit>
  400. </AssignedBits>
  401. </Field>
  402. <Field>
  403. <Parameters address="0x58004038" name="PCROP1BER" size="0x4"/>
  404. <AssignedBits>
  405. <Bit>
  406. <Name>PCROP1B_END</Name>
  407. <Description>PCROP1B_END[7:0] contain the last included 1kB page readout protected of the Flash area zone B</Description>
  408. <BitOffset>0x0</BitOffset>
  409. <BitWidth>0x8</BitWidth>
  410. <Access>RW</Access>
  411. <Equation multiplier="0x400" offset="0x08000000"/>
  412. </Bit>
  413. </AssignedBits>
  414. </Field>
  415. </Category>
  416. <Category>
  417. <Name>Write Protection</Name>
  418. <Field>
  419. <Parameters address="0x5800402C" name="FLASH_WRP1AR" size="0x4"/>
  420. <AssignedBits>
  421. <Bit>
  422. <Name>WRP1A_STRT</Name>
  423. <Description>WRP1A_STRT[6:0] contain the first included 2kB page write protected of the Flash area zone A.</Description>
  424. <BitOffset>0x0</BitOffset>
  425. <BitWidth>0x7</BitWidth>
  426. <Access>RW</Access>
  427. <Equation multiplier="0x800" offset="0x08000000"/>
  428. </Bit>
  429. <Bit>
  430. <Name>WRP1A_END</Name>
  431. <Description>WRP1A_END[6:0] contain the last included 2kB page write protected of the Flash area zone A.</Description>
  432. <BitOffset>0x10</BitOffset>
  433. <BitWidth>0x7</BitWidth>
  434. <Access>RW</Access>
  435. <Equation multiplier="0x800" offset="0x08000000"/>
  436. </Bit>
  437. </AssignedBits>
  438. </Field>
  439. <Field>
  440. <Parameters address="0x58004030" name="FLASH_WRP1BR" size="0x4"/>
  441. <AssignedBits>
  442. <Bit>
  443. <Name>WRP1B_STRT</Name>
  444. <Description>WRP1B_STRT[6:0] contain the first included 2kB page write protected of the Flash area zone B.</Description>
  445. <BitOffset>0x0</BitOffset>
  446. <BitWidth>0x7</BitWidth>
  447. <Access>RW</Access>
  448. <Equation multiplier="0x800" offset="0x08000000"/>
  449. </Bit>
  450. <Bit>
  451. <Name>WRP1B_END</Name>
  452. <Description>WRP1B_END[6:0] contain the last included 2kB page write protected of the Flash area zone B.</Description>
  453. <BitOffset>0x10</BitOffset>
  454. <BitWidth>0x7</BitWidth>
  455. <Access>RW</Access>
  456. <Equation multiplier="0x800" offset="0x08000000"/>
  457. </Bit>
  458. </AssignedBits>
  459. </Field>
  460. </Category>
  461. </Bank>
  462. <Bank interface="JTAG_SWD">
  463. <Parameters address="0x58004080" name="Bank 2" size="0x8"/>
  464. <Category>
  465. <Name>Security Configuration Option bytes</Name>
  466. <Field>
  467. <Parameters address="0x58004080" name="FLASH_SFR" size="0x4"/>
  468. <AssignedBits>
  469. <Bit config="1">
  470. <Name>SFSA</Name>
  471. <Description>This bit can only be accessed by software when HDPADIS = 0. When FSD=0: system and Flash secure. SFSA[6:0] contain the start address of the first 2 kB page of the secure Flash area.</Description>
  472. <BitOffset>0x0</BitOffset>
  473. <BitWidth>0x7</BitWidth>
  474. <Access>RW</Access>
  475. </Bit>
  476. <Bit config="1">
  477. <Name>FSD</Name>
  478. <Description/>
  479. <BitOffset>0x7</BitOffset>
  480. <BitWidth>0x1</BitWidth>
  481. <Access>RW</Access>
  482. <Values>
  483. <Val value="0x0">System and Flash secure. This bit can only be accessed when HDPADIS = 0</Val>
  484. <Val value="0x1">System and Flash non-secure. This bit can only be accessed when HDPADIS = 0</Val>
  485. </Values>
  486. </Bit>
  487. <Bit config="1">
  488. <Name>DDS</Name>
  489. <Description/>
  490. <BitOffset>0xC</BitOffset>
  491. <BitWidth>0x1</BitWidth>
  492. <Access>RW</Access>
  493. <Values>
  494. <Val value="0x0">CPU2 debug access enabled (when also enabled by C2SWDBGEN)</Val>
  495. <Val value="0x1">CPU2 debug access disabled (when also enabled by C2SWDBGEN)</Val>
  496. </Values>
  497. </Bit>
  498. <Bit config="1">
  499. <Name>HDPSA</Name>
  500. <Description>HDPSA[6:0] contain the start address of the first 2 kB page of the User Flash hide protection area. This bit field can only be accessed by software when HDPADIS = 0. When FSD=0 and HDPAD = 0: User Flash hide protection area enabled.</Description>
  501. <BitOffset>0x10</BitOffset>
  502. <BitWidth>0x7</BitWidth>
  503. <Access>RW</Access>
  504. </Bit>
  505. <Bit config="1">
  506. <Name>HDPAD</Name>
  507. <Description>User Flash hide protection area disabled. This bit can only be accessed by software when HDPADIS = 0</Description>
  508. <BitOffset>0x17</BitOffset>
  509. <BitWidth>0x1</BitWidth>
  510. <Access>RW</Access>
  511. <Values>
  512. <Val value="0x0">User Flash hide protection area access enabled.</Val>
  513. <Val value="0x1">User Flash hide protection area access disabled.</Val>
  514. </Values>
  515. </Bit>
  516. <Bit config="1">
  517. <Name>SUBGHSPISD</Name>
  518. <Description>SPI3 security disable. This bit can only be accessed by software when HDPADIS = 0. FSD=1: SPI3 security is disabled</Description>
  519. <BitOffset>0x1F</BitOffset>
  520. <BitWidth>0x1</BitWidth>
  521. <Access>RW</Access>
  522. <Values>
  523. <Val value="0x0">FSD=0 and SUBGHSPISD=0: SPI3 security enabled</Val>
  524. <Val value="0x1">FSD=0 and SUBGHSPISD=1: SPI3 security disabled</Val>
  525. </Values>
  526. </Bit>
  527. </AssignedBits>
  528. </Field>
  529. <Field>
  530. <Parameters address="0x58004084" name="FLASH_SRRVR" size="0x4"/>
  531. <AssignedBits>
  532. <Bit config="1">
  533. <Name>C2OPT</Name>
  534. <Description/>
  535. <BitOffset>0x1F</BitOffset>
  536. <BitWidth>0x1</BitWidth>
  537. <Access>RW</Access>
  538. <Values>
  539. <Val value="0x0">SBRV will address SRAM1 or SRAM2, from start address 0x2000 0000 + SBRV.</Val>
  540. <Val value="0x1">SBRV will address Flash memory, from start address 0x0800 0000 + SBRV.</Val>
  541. </Values>
  542. </Bit>
  543. <Bit config="1">
  544. <Name>NBRSD</Name>
  545. <Description/>
  546. <BitOffset>0x1E</BitOffset>
  547. <BitWidth>0x1</BitWidth>
  548. <Access>RW</Access>
  549. <Values>
  550. <Val value="0x0">SRAM1 is secure if FSD=0 and non-secure otherwise. This bit can only be accessed when HDPADIS = 0</Val>
  551. <Val value="0x1">SRAM1 is non-secure if FSD=0 and secure otherwise. This bit can only be accessed when HDPADIS = 0</Val>
  552. </Values>
  553. </Bit>
  554. <Bit config="1">
  555. <Name>SNBRSA</Name>
  556. <Description>SNBRSA[4:0] contain the start address of the first 1 kB page of the secure &quot;non-backup&quot; SRAM1 area. To keep the tool working you have to set a value greater or equal to 0xC</Description>
  557. <BitOffset>0x19</BitOffset>
  558. <BitWidth>0x5</BitWidth>
  559. <Access>RW</Access>
  560. </Bit>
  561. <Bit config="1">
  562. <Name>BRSD</Name>
  563. <Description/>
  564. <BitOffset>0x17</BitOffset>
  565. <BitWidth>0x1</BitWidth>
  566. <Access>RW</Access>
  567. <Values>
  568. <Val value="0x0">SRAM2 is secure if FSD=0 and non-secure otherwise. This bit can only be accessed when HDPADIS = 0</Val>
  569. <Val value="0x1">SRAM2 is non-secure if FSD=0 and secure otherwise. This bit can only be accessed when HDPADIS = 0</Val>
  570. </Values>
  571. </Bit>
  572. <Bit config="1">
  573. <Name>SBRSA</Name>
  574. <Description>SBRSA[4:0] contain the start address of the first 1 kB page of the secure backup SRAM2 area. To keep the tool working you have to set a value less than 0x15</Description>
  575. <BitOffset>0x12</BitOffset>
  576. <BitWidth>0x5</BitWidth>
  577. <Access>RW</Access>
  578. </Bit>
  579. <Bit config="1">
  580. <Name>SBRV</Name>
  581. <Description>SBRV[15:0] contain the word (4B) aligned CPU2 boot reset start address offset within the selected memory area by C2OPT.</Description>
  582. <BitOffset>0x0</BitOffset>
  583. <BitWidth>0x10</BitWidth>
  584. <Access>RW</Access>
  585. </Bit>
  586. </AssignedBits>
  587. </Field>
  588. </Category>
  589. </Bank>
  590. <Bank interface="Bootloader">
  591. <Parameters address="0x1FFF7800" name="Bank 1" size="0x68"/>
  592. <Category>
  593. <Name>Read Out Protection</Name>
  594. <Field>
  595. <Parameters address="0x1FFF7800" name="RDP" size="0x4"/>
  596. <AssignedBits>
  597. <Bit>
  598. <Name>RDP</Name>
  599. <Description>Read protection option byte. The read protection is used to protect the software code stored in Flash memory.</Description>
  600. <BitOffset>0x0</BitOffset>
  601. <BitWidth>0x8</BitWidth>
  602. <Access>RW</Access>
  603. <Values>
  604. <Val value="0xAA">Level 0, no protection</Val>
  605. <Val value="0xBB">or any value other than 0xAA and 0xCC: Level 1, read protection</Val>
  606. <Val value="0xCC">Level 2, chip protection</Val>
  607. </Values>
  608. </Bit>
  609. </AssignedBits>
  610. </Field>
  611. </Category>
  612. <Category>
  613. <Name>BOR Level</Name>
  614. <Field>
  615. <Parameters address="0x1FFF7800" name="USER" size="0x4"/>
  616. <AssignedBits>
  617. <Bit>
  618. <Name>BOR_LEV</Name>
  619. <Description>These bits contain the supply level threshold that activates/releases the reset. They can be written to program a new BOR level value into Flash memory</Description>
  620. <BitOffset>0x9</BitOffset>
  621. <BitWidth>0x3</BitWidth>
  622. <Access>RW</Access>
  623. <Values>
  624. <Val value="0x0">BOR Level 0 reset level threshold is around 1.7 V</Val>
  625. <Val value="0x1">BOR Level 1 reset level threshold is around 2.0 V</Val>
  626. <Val value="0x2">BOR Level 2 reset level threshold is around 2.2 V</Val>
  627. <Val value="0x3">BOR Level 3 reset level threshold is around 2.5 V</Val>
  628. <Val value="0x4">BOR Level 4 reset level threshold is around 2.8 V</Val>
  629. </Values>
  630. </Bit>
  631. </AssignedBits>
  632. </Field>
  633. </Category>
  634. <Category>
  635. <Name>User Configuration</Name>
  636. <Field>
  637. <Parameters address="0x1FFF7800" name="USER" size="0x4"/>
  638. <AssignedBits>
  639. <Bit>
  640. <Name>nBOOT0</Name>
  641. <Description/>
  642. <BitOffset>0x1B</BitOffset>
  643. <BitWidth>0x1</BitWidth>
  644. <Access>RW</Access>
  645. <Values>
  646. <Val value="0x0">nBOOT0=0</Val>
  647. <Val value="0x1">nBOOT0=1</Val>
  648. </Values>
  649. </Bit>
  650. <Bit>
  651. <Name>nBOOT1</Name>
  652. <Description>Together with the BOOT0 pin or option bit nBOOT0, this bit selects boot mode from the user Flash memory, SRAM1 or system Flash memory . Refer to Reference Manual: Boot configuration Section.</Description>
  653. <BitOffset>0x17</BitOffset>
  654. <BitWidth>0x1</BitWidth>
  655. <Access>RW</Access>
  656. <Values>
  657. <Val value="0x0"/>
  658. <Val value="0x1"/>
  659. </Values>
  660. </Bit>
  661. <Bit>
  662. <Name>nSWBOOT0</Name>
  663. <Description/>
  664. <BitOffset>0x1A</BitOffset>
  665. <BitWidth>0x1</BitWidth>
  666. <Access>RW</Access>
  667. <Values>
  668. <Val value="0x0">BOOT0 taken from the option bit nBOOT0</Val>
  669. <Val value="0x1">BOOT0 taken from PH3/BOOT0 pin</Val>
  670. </Values>
  671. </Bit>
  672. <Bit>
  673. <Name>SRAM_RST</Name>
  674. <Description/>
  675. <BitOffset>0x19</BitOffset>
  676. <BitWidth>0x1</BitWidth>
  677. <Access>RW</Access>
  678. <Values>
  679. <Val value="0x0">SRAM1 and SRAM2 are erased when a system reset occurs</Val>
  680. <Val value="0x1">SRAM1 and SRAM2 are not erased when a system reset occurs</Val>
  681. </Values>
  682. </Bit>
  683. <Bit>
  684. <Name>SRAM2_PE</Name>
  685. <Description/>
  686. <BitOffset>0x18</BitOffset>
  687. <BitWidth>0x1</BitWidth>
  688. <Access>RW</Access>
  689. <Values>
  690. <Val value="0x0">SRAM2 parity check enable</Val>
  691. <Val value="0x1">SRAM2 parity check disable</Val>
  692. </Values>
  693. </Bit>
  694. <Bit>
  695. <Name>nRST_STOP</Name>
  696. <Description/>
  697. <BitOffset>0xC</BitOffset>
  698. <BitWidth>0x1</BitWidth>
  699. <Access>RW</Access>
  700. <Values>
  701. <Val value="0x0">Reset generated when entering the Stop mode</Val>
  702. <Val value="0x1">No reset generated when entering the Stop mode</Val>
  703. </Values>
  704. </Bit>
  705. <Bit>
  706. <Name>nRST_STDBY</Name>
  707. <Description/>
  708. <BitOffset>0xD</BitOffset>
  709. <BitWidth>0x1</BitWidth>
  710. <Access>RW</Access>
  711. <Values>
  712. <Val value="0x0">Reset generated when entering the Standby mode</Val>
  713. <Val value="0x1">No reset generated when entering the Standby mode</Val>
  714. </Values>
  715. </Bit>
  716. <Bit>
  717. <Name>nRST_SHDW</Name>
  718. <Description/>
  719. <BitOffset>0xE</BitOffset>
  720. <BitWidth>0x1</BitWidth>
  721. <Access>RW</Access>
  722. <Values>
  723. <Val value="0x0">Reset generated when entering the Shutdown mode</Val>
  724. <Val value="0x1">No reset generated when entering the Shutdown mode</Val>
  725. </Values>
  726. </Bit>
  727. <Bit>
  728. <Name>WWDG_SW</Name>
  729. <Description/>
  730. <BitOffset>0x13</BitOffset>
  731. <BitWidth>0x1</BitWidth>
  732. <Access>RW</Access>
  733. <Values>
  734. <Val value="0x0">Hardware window watchdog</Val>
  735. <Val value="0x1">Software window watchdog</Val>
  736. </Values>
  737. </Bit>
  738. <Bit>
  739. <Name>IWGD_STDBY</Name>
  740. <Description/>
  741. <BitOffset>0x12</BitOffset>
  742. <BitWidth>0x1</BitWidth>
  743. <Access>RW</Access>
  744. <Values>
  745. <Val value="0x0">Independent watchdog counter frozen in Standby mode</Val>
  746. <Val value="0x1">Independent watchdog counter running in Standby mode</Val>
  747. </Values>
  748. </Bit>
  749. <Bit>
  750. <Name>IWDG_STOP</Name>
  751. <Description/>
  752. <BitOffset>0x11</BitOffset>
  753. <BitWidth>0x1</BitWidth>
  754. <Access>RW</Access>
  755. <Values>
  756. <Val value="0x0">Independent watchdog counter frozen in Stop mode</Val>
  757. <Val value="0x1">Independent watchdog counter running in Stop mode</Val>
  758. </Values>
  759. </Bit>
  760. <Bit>
  761. <Name>IWDG_SW</Name>
  762. <Description/>
  763. <BitOffset>0x10</BitOffset>
  764. <BitWidth>0x1</BitWidth>
  765. <Access>RW</Access>
  766. <Values>
  767. <Val value="0x0">Hardware independent watchdog</Val>
  768. <Val value="0x1">Software independent watchdog</Val>
  769. </Values>
  770. </Bit>
  771. <Bit>
  772. <Name>BOOT_LOCK</Name>
  773. <Description/>
  774. <BitOffset>0x1E</BitOffset>
  775. <BitWidth>0x1</BitWidth>
  776. <Access>RW</Access>
  777. <Values>
  778. <Val value="0x0">CPU1 CM4 Boot lock disabled</Val>
  779. <Val value="0x1">CPU1 CM4 Boot lock enabled</Val>
  780. </Values>
  781. </Bit>
  782. <Bit>
  783. <Name>C2BOOT_LOCK</Name>
  784. <Description/>
  785. <BitOffset>0x1F</BitOffset>
  786. <BitWidth>0x1</BitWidth>
  787. <Access>RW</Access>
  788. <Values>
  789. <Val value="0x0">CPU2 CM0+ Boot lock disabled</Val>
  790. <Val value="0x1">CPU2 CM0+ Boot lock enabled</Val>
  791. </Values>
  792. </Bit>
  793. </AssignedBits>
  794. </Field>
  795. <Field>
  796. <Parameters address="0x1FFF7868" name="FLASH_IPCCBR" size="0x4"/>
  797. <AssignedBits>
  798. <Bit>
  799. <Name>IPCCDBA</Name>
  800. <Description>IPCC mailbox data buffer base address</Description>
  801. <BitOffset>0x0</BitOffset>
  802. <BitWidth>0xE</BitWidth>
  803. <Access>RW</Access>
  804. </Bit>
  805. </AssignedBits>
  806. </Field>
  807. </Category>
  808. <!--<Category>
  809. <Name>Security Configuration Option bytes</Name>
  810. <Field>
  811. <Parameters name="FLASH_OPTR" size="0x4" address="0x1FFF8000"/>
  812. <AssignedBits>
  813. <Bit>
  814. <Name>ESE</Name>
  815. <Description/>
  816. <BitOffset>0x8</BitOffset>
  817. <BitWidth>0x1</BitWidth>
  818. <Access>R</Access>
  819. <Values>
  820. <Val value="0x0">Security disabled</Val>
  821. <Val value="0x1">Security enabled</Val>
  822. </Values>
  823. </Bit>
  824. </AssignedBits>
  825. </Field>
  826. <Field>
  827. <Parameters name="FLASH_SFR" size="0x4" address="0x1FFF8070"/>
  828. <AssignedBits>
  829. <Bit>
  830. <Name>SFSA</Name>
  831. <Description>Secure Flash start address</Description>
  832. <BitOffset>0x0</BitOffset>
  833. <BitWidth>0x7</BitWidth>
  834. <Access>RW</Access>
  835. </Bit>
  836. <Bit>
  837. <Name>FSD</Name>
  838. <Description/>
  839. <BitOffset>0x7</BitOffset>
  840. <BitWidth>0x1</BitWidth>
  841. <Access>RW</Access>
  842. <Values>
  843. <Val value="0x0">System and Flash secure</Val>
  844. <Val value="0x1">System and Flash non-secure</Val>
  845. </Values>
  846. </Bit>
  847. <Bit>
  848. <Name>DDS</Name>
  849. <Description/>
  850. <BitOffset>0xC</BitOffset>
  851. <BitWidth>0x1</BitWidth>
  852. <Access>RW</Access>
  853. <Values>
  854. <Val value="0x0">CPU2 debug access enabled</Val>
  855. <Val value="0x1">CPU2 debug access disabled</Val>
  856. </Values>
  857. </Bit>
  858. <Bit>
  859. <Name>HDPSA</Name>
  860. <Description>HDPSA[6:0] contain the start address of the first 2 kB page of the User Flash Sticky hide protection area. This bit field can only be accessed by software when HDPADIS = 0. When FSD=0 and HDPAD = 0: User Flash Sticky hide protection area enabled.</Description>
  861. <BitOffset>0x10</BitOffset>
  862. <BitWidth>0x7</BitWidth>
  863. <Access>RW</Access>
  864. </Bit>
  865. <Bit>
  866. <Name>HDPAD</Name>
  867. <Description>User Flash Sticky hide protection area disabled. This bit can only be accessed by software when HDPADIS = 0</Description>
  868. <BitOffset>0x17</BitOffset>
  869. <BitWidth>0x1</BitWidth>
  870. <Access>RW</Access>
  871. </Bit>
  872. <Bit>
  873. <Name>SUBGHSPISD</Name>
  874. <Description>SPI3 security disable. This bit can only be accessed by software when HDPADIS = 0. FSD=1: SPI3 security is disabled</Description>
  875. <BitOffset>0x1F</BitOffset>
  876. <BitWidth>0x1</BitWidth>
  877. <Access>RW</Access>
  878. <Values>
  879. <Val value="0x0">FSD=0 and SPI3SD=0: SPI3 security enabled</Val>
  880. <Val value="0x1">FSD=0 and SPI3SD=1: SPI3 security disabled</Val>
  881. </Values>
  882. </Bit>
  883. </AssignedBits>
  884. </Field>
  885. <Field>
  886. <Parameters name="FLASH_SRRVR" size="0x4" address="0x1FFF8078"/>
  887. <AssignedBits>
  888. <Bit>
  889. <Name>C2OPT</Name>
  890. <Description/>
  891. <BitOffset>0x1F</BitOffset>
  892. <BitWidth>0x1</BitWidth>
  893. <Access>RW</Access>
  894. <Values>
  895. <Val value="0x0">SBRV will address SRAM2</Val>
  896. <Val value="0x1">SBRV will address Flash</Val>
  897. </Values>
  898. </Bit>
  899. <Bit>
  900. <Name>NBRSD</Name>
  901. <Description/>
  902. <BitOffset>0x1E</BitOffset>
  903. <BitWidth>0x1</BitWidth>
  904. <Access>RW</Access>
  905. <Values>
  906. <Val value="0x0">SRAM2b is secure if FSD=0 and non-secure otherwise</Val>
  907. <Val value="0x1">SRAM2b is non-secure if FSD=0 and secure otherwise</Val>
  908. </Values>
  909. </Bit>
  910. <Bit>
  911. <Name>SNBRSA</Name>
  912. <Description/>
  913. <BitOffset>0x19</BitOffset>
  914. <BitWidth>0x5</BitWidth>
  915. <Access>RW</Access>
  916. </Bit>
  917. <Bit>
  918. <Name>BRSD</Name>
  919. <Description/>
  920. <BitOffset>0x17</BitOffset>
  921. <BitWidth>0x1</BitWidth>
  922. <Access>RW</Access>
  923. <Values>
  924. <Val value="0x0">SRAM2a is secure if FSD=0 and non-secure otherwise</Val>
  925. <Val value="0x1">SRAM2b is non-secure if FSD=0 and secure otherwise</Val>
  926. </Values>
  927. </Bit>
  928. <Bit>
  929. <Name>SBRSA</Name>
  930. <Description/>
  931. <BitOffset>0x12</BitOffset>
  932. <BitWidth>0x5</BitWidth>
  933. <Access>RW</Access>
  934. </Bit>
  935. <Bit>
  936. <Name>SBRV</Name>
  937. <Description/>
  938. <BitOffset>0x0</BitOffset>
  939. <BitWidth>0x10</BitWidth>
  940. <Access>RW</Access>
  941. </Bit>
  942. </AssignedBits>
  943. </Field>
  944. </Category>-->
  945. <Category>
  946. <Name>PCROP Protection</Name>
  947. <Field>
  948. <Parameters address="0x1FFF7808" name="PCROP1ASR" size="0x4"/>
  949. <AssignedBits>
  950. <Bit>
  951. <Name>PCROP1A_STRT</Name>
  952. <Description>PCROP1A_STRT[7:0] contain the first included 1kB page readout protected of the Flash area zone A</Description>
  953. <BitOffset>0x0</BitOffset>
  954. <BitWidth>0x8</BitWidth>
  955. <Access>RW</Access>
  956. <Equation multiplier="0x400" offset="0x08000000"/>
  957. </Bit>
  958. </AssignedBits>
  959. </Field>
  960. <Field>
  961. <Parameters address="0x1FFF7810" name="PCROP1AER" size="0x4"/>
  962. <AssignedBits>
  963. <Bit>
  964. <Name>PCROP1A_END</Name>
  965. <Description>PCROP1A_END[7:0] contain the last included 1kB page readout protected of the Flash area zone A</Description>
  966. <BitOffset>0x0</BitOffset>
  967. <BitWidth>0x8</BitWidth>
  968. <Access>RW</Access>
  969. <Equation multiplier="0x400" offset="0x08000000"/>
  970. </Bit>
  971. <Bit>
  972. <Name>PCROP_RDP</Name>
  973. <Description/>
  974. <BitOffset>0x1F</BitOffset>
  975. <BitWidth>0x1</BitWidth>
  976. <Access>RW</Access>
  977. <Values>
  978. <Val value="0x0">PCROP zone is kept when RDP is decreased</Val>
  979. <Val value="0x1">PCROP zone is erased when RDP is decreased</Val>
  980. </Values>
  981. </Bit>
  982. </AssignedBits>
  983. </Field>
  984. <Field>
  985. <Parameters address="0x1FFF7828" name="PCROP1BSR" size="0x4"/>
  986. <AssignedBits>
  987. <Bit>
  988. <Name>PCROP1B_STRT</Name>
  989. <Description>PCROP1B_STRT[7:0] contain the first included 1kB page readout protected of the Flash area zone B</Description>
  990. <BitOffset>0x0</BitOffset>
  991. <BitWidth>0x8</BitWidth>
  992. <Access>RW</Access>
  993. <Equation multiplier="0x400" offset="0x08000000"/>
  994. </Bit>
  995. </AssignedBits>
  996. </Field>
  997. <Field>
  998. <Parameters address="0x1FFF7830" name="PCROP1BER" size="0x4"/>
  999. <AssignedBits>
  1000. <Bit>
  1001. <Name>PCROP1B_END</Name>
  1002. <Description>PCROP1B_END[7:0] contain the last included 1kB page readout protected of the Flash area zone B</Description>
  1003. <BitOffset>0x0</BitOffset>
  1004. <BitWidth>0x8</BitWidth>
  1005. <Access>RW</Access>
  1006. <Equation multiplier="0x400" offset="0x08000000"/>
  1007. </Bit>
  1008. </AssignedBits>
  1009. </Field>
  1010. </Category>
  1011. <Category>
  1012. <Name>Write Protection</Name>
  1013. <Field>
  1014. <Parameters address="0x1FFF7818" name="FLASH_WRP1AR" size="0x4"/>
  1015. <AssignedBits>
  1016. <Bit>
  1017. <Name>WRP1A_STRT</Name>
  1018. <Description>WRP1A_STRT[6:0] contain the first included 2kB page write protected of the Flash area zone A</Description>
  1019. <BitOffset>0x0</BitOffset>
  1020. <BitWidth>0x7</BitWidth>
  1021. <Access>RW</Access>
  1022. <Equation multiplier="0x800" offset="0x08000000"/>
  1023. </Bit>
  1024. <Bit>
  1025. <Name>WRP1A_END</Name>
  1026. <Description>WRP1A_END[6:0] contain the last included 2kB page write protected of the Flash area zone A</Description>
  1027. <BitOffset>0x10</BitOffset>
  1028. <BitWidth>0x7</BitWidth>
  1029. <Access>RW</Access>
  1030. <Equation multiplier="0x800" offset="0x08000000"/>
  1031. </Bit>
  1032. </AssignedBits>
  1033. </Field>
  1034. <Field>
  1035. <Parameters address="0x1FFF7820" name="FLASH_WRP1BR" size="0x4"/>
  1036. <AssignedBits>
  1037. <Bit>
  1038. <Name>WRP1B_STRT</Name>
  1039. <Description>WRP1B_STRT[6:0] contain the first included 2kB page write protected of the Flash area zone B</Description>
  1040. <BitOffset>0x0</BitOffset>
  1041. <BitWidth>0x7</BitWidth>
  1042. <Access>RW</Access>
  1043. <Equation multiplier="0x800" offset="0x08000000"/>
  1044. </Bit>
  1045. <Bit>
  1046. <Name>WRP1B_END</Name>
  1047. <Description>WRP1B_END[6:0] contain the last included 2kB page write protected of the Flash area zone B</Description>
  1048. <BitOffset>0x10</BitOffset>
  1049. <BitWidth>0x7</BitWidth>
  1050. <Access>RW</Access>
  1051. <Equation multiplier="0x800" offset="0x08000000"/>
  1052. </Bit>
  1053. </AssignedBits>
  1054. </Field>
  1055. </Category>
  1056. </Bank>
  1057. </Peripheral>
  1058. </Peripherals>
  1059. </Device>
  1060. </Root>