Iar User Guide
Iar User Guide
for MSP430™
User's Guide
Preface ....................................................................................................................................... 5
1 Get Started Now! ................................................................................................................. 7
1.1 Software Installation ........................................................................................................ 8
1.2 Flashing the LED ............................................................................................................ 8
1.3 Important MSP430 Documents on the CD-ROM and Web ............................................................ 9
2 Development Flow ............................................................................................................. 10
2.1 Overview .................................................................................................................... 11
2.2 Using KickStart ............................................................................................................ 11
2.2.1 Project Settings ................................................................................................... 12
2.2.2 Additional Project Settings for MSP430L092 and MSP430C092 .......................................... 13
2.2.3 Creating a Project From Scratch ............................................................................... 15
2.2.4 Additional Project Settings for LPMx.5 Debugging ........................................................... 16
2.2.5 Password Protection for MSP430 Devices .................................................................... 17
2.2.6 Using an Existing IAR V1.x, V2.x, or V3.x Project ........................................................... 18
2.2.7 Stack Management and .xcl Files .............................................................................. 18
2.2.8 How to Generate Texas Instruments .TXT (and Other Format) Files ..................................... 18
2.2.9 Overview of Example Programs ................................................................................ 18
2.3 Using C-SPY ............................................................................................................... 18
2.3.1 Breakpoint Types ................................................................................................. 19
2.3.2 Using Breakpoints ................................................................................................ 20
2.3.3 Using Single Step ................................................................................................ 21
2.3.4 Using Watch Windows ........................................................................................... 21
A Frequently Asked Questions ............................................................................................... 23
A.1 Hardware ................................................................................................................... 24
A.2 Program Development (Assembler, C-Compiler, Linker) ............................................................ 24
A.3 Debugging (C-SPY) ....................................................................................................... 26
B FET-Specific Menus ........................................................................................................... 30
B.1 Menus ....................................................................................................................... 31
B.1.1 Emulator → Device Information ................................................................................ 31
B.1.2 Emulator → Release JTAG on Go ............................................................................. 31
B.1.3 Emulator → Resynchronize JTAG ............................................................................. 31
B.1.4 Emulator → Init New Device .................................................................................... 31
B.1.5 Emulator → Secure - Blow JTAG Fuse ....................................................................... 31
B.1.6 Emulator → Breakpoint Usage ................................................................................. 31
B.1.7 Emulator → Advanced → Clock Control ...................................................................... 31
B.1.8 Emulator → Advanced → Emulation Mode ................................................................... 31
B.1.9 Emulator → Advanced → Memory Dump ..................................................................... 32
B.1.10 Emulator → Advanced → Breakpoint Combiner ............................................................ 32
B.1.11 Emulator → State Storage Control ........................................................................... 32
B.1.12 Emulator → State Storage Window ........................................................................... 32
B.1.13 Emulator → Sequencer Control ............................................................................... 32
B.1.14 Emulator → "Power on" Reset ................................................................................ 32
B.1.15 Emulator → GIE on/off ......................................................................................... 32
B.1.16 Emulator → Leave Target Running ........................................................................... 32
List of Figures
1-1. Activate Project .............................................................................................................. 8
1-2. Activate Project in Workspace Overview ................................................................................ 9
2-1. L092 Mode ................................................................................................................. 13
2-2. C092 Emulation Mode .................................................................................................... 14
2-3. C092 Password ............................................................................................................ 14
2-4. Enable LPMx.5 ............................................................................................................. 16
2-5. LPMx.5 Notifications ...................................................................................................... 17
2-6. JTAG Password ........................................................................................................... 17
List of Tables
2-1. Device Architecture, Breakpoints and Other Emulation Features................................................... 19
CAUTION
This is an example of a caution statement.
A caution statement describes a situation that could potentially damage your
software or equipment.
WARNING
This is an example of a warning statement.
A warning statement describes a situation that could potentially
cause harm to you.
The information in a caution or a warning is provided for your protection. Read each caution and warning
carefully.
FCC Warning
This equipment is intended for use in a laboratory test environment only. It generates, uses, and can
radiate radio frequency energy and has not been tested for compliance with the limits of computing
devices pursuant to subpart J of part 15 of FCC rules, which are designed to provide reasonable
protection against radio-frequency interference. Operation of this equipment in other environments may
cause interference with radio communications, in which case, the user is required to take whatever
measures may be required to correct this interference at his own expense.
This chapter provides instruction on installing the software, and shows how to run the demonstration
programs.
Alternatively, right click to activate a project in the Workspace Overview tab (see Figure 1-2).
4. Click Project → Options → FET Debugger → Setup → Connection to select the appropriate port:
Texas Instruments LPT-IF for the parallel FET Interface (MSP-FET430PIF) or Texas Instruments USB-
IF for the USB Interface (MSP-FET430UIF) or for the eZ430.
5. Click Project → Rebuild All to build and link the source code. You can view the source code by double-
clicking on the project, and then double-clicking on the displayed source file.
6. Click Project → Debug to start the C-SPY debugger. C-SPY erases the device flash and then
downloads the application object file to the device flash.
See FAQ Debugging #1 if C-SPY is unable to communicate with the device.
7. Click Debug → Go to start the application. The LED should flash.
8. Click Debug → Stop Debugging to stop debugging, to exit C-SPY, and to return to the Workbench.
9. Click File → Exit to exit the Workbench.
Congratulations, you have just built and tested an MSP430 application!
Development Flow
This chapter describes how to use KickStart to develop application software and how to use C-SPY to
debug it.
2.1 Overview
Applications are developed in assembler or C using the Workbench, and they are debugged using C-SPY.
C-SPY is seamlessly integrated into the Workbench. However, it is more convenient to make the
distinction between the code development environment (Workbench) and the debugger (C-SPY). C-SPY
can be configured to operate with the FET (that is, an actual MSP430 device) or with a software simulator
of the device. KickStart refers to the Workbench and C-SPY collectively. The KickStart software tools are
a product of IAR.
Documentation for the MSP430 family and KickStart is extensive. The CD-ROM supplied with this tool
contains a large amount of documentation describing the MSP430. The MSP430 home page
(www.ti.com/msp430) is another source of MSP430 information. The components of KickStart (workbench
and debugger, assembler, compiler, linker) are fully documented in <Installation Root>\Embedded
Workbench x.x\common\doc and <Installation Root>\Embedded Workbench\430\doc. .htm files located
throughout the KickStart directory tree contain the most up-to-date information and supplement the PDF
files. In addition, KickStart documentation is available online via Help.
Read Me First files from IAR and TI and this document can be accessed using Start → Programs → IAR
Systems → IAR Embedded Workbench KickStart for MSP430 V3.
The following steps can be used to quickly configure a project. Note that the General Options tab does not
have a Factory Settings button.
1. Specify the target device (General Options → Target → Device).
2. Enable an assembler project or a C or assembler project (General Options → Target → Assembler-
only project).
3. Enable the generation of an executable output file (General Options → Output → Output file →
Executable).
4. Accept the factory settings for the compiler (C/C++ Compiler → Factory Settings).
5. Accept the factory settings for the assembler (Assembler → Factory Settings).
6. Accept the factory settings for the linker (Linker → Factory Settings).
7. Accept the factory settings for C-SPY (Debugger → Factory Settings).
8. Debug on the hardware (Debugger → Setup → Driver → FET Debugger).
9. Specify the active parallel port used to interface to the FET if not LPT1 (FET Debugger → Setup →
Connection → Texas Instruments LPT-IF) or specify the USB port (FET Debugger → Setup →
Connection → Texas Instruments USB-IF).
NOTE: Avoid the use of absolute path names when referencing files.
Instead, use the relative pathname keywords $TOOLKIT_DIR$ and $PROJ_DIR$. See the
IAR documentation for a description of these keywords. The use of relative path names
permits projects to be moved easily, and projects do not require modification when IAR
systems are upgraded (for example, from KickStart or Baseline to Full).
8. Save the workspace (File → Save Workspace). Specify a workspace name and click Save.
9. Configure the project options (Project → Options). For each of the subcategories (General Options,
C/C++ Compiler, Assembler, Linker, Debugger), accept the default Factory Settings with the following
exceptions:
• Specify the target device (General Options → Target → Device).
• Enable an assembler project or a C or assembler project (General Options → Target →
Assembler-only project).
• Enable the generation of an executable output file (General Options → Output → Output file →
Executable).
• To debug on the FET (that is, the MSP430), click Debugger → Setup → Driver → FET Debugger.
• Specify the active port used to interface to the FET (FET Debugger → Setup → Connection).
10. Build the project (Project → Rebuild All).
11. Debug the application using C-SPY (Project → Debug). This starts C-SPY, and C-SPY takes control of
the target, erases the target memory, programs the target memory with the application, and resets the
target.
See FAQ Debugging #1 if C-SPY is unable to communicate with the device.
12. Click Debug → Go to start the application.
13. Click Debug → Stop Debugging to stop the application, to exit C-SPY, and to return to the Workbench.
14. Click File → Exit to exit the Workbench.
NOTE: The option "RELEASE JTAG ON GO" is currently not supported in the Embedded
Workbench when LPMx.5 debugging is active.
See the MSP430 device family user's guide for additional LPMx.5 details.
If the LPMx.5 debug mode is enabled a notification is displayed in the Debugger log every time the target
device enters and leaves LPMx.5 mode (see Figure 2-5).
Press the Halt or Reset button in EW430 to wake up the target device from LPMx.5 and stop it at code
start. All breakpoints that were active before LPMx.5 are restored and reactivated automatically.
2.2.8 How to Generate Texas Instruments .TXT (and Other Format) Files
The KickStart linker can be configured to output objects in TI .TXT format for use with the GANG430 and
PRGS430 programmers. Click Project → Options → Linker → Output → Format → Other → msp430-txt.
Intel™ and Motorola™ formats also can be selected.
For more information, see FAQ Program Development #6 in Appendix A.
(1)
The 2-wire JTAG debug interface is also referred to as Spy-Bi-Wire (SBW) interface. Note that this interface is supported only by
the USB emulators (eZ430-xxxx and MSP-FET430UIF USB JTAG emulator) and the MSP-GANG430 production programming
tool. The MSP-FET430PIF parallel port JTAG emulator does not support communication in 2-wire JTAG mode.
Table 2-1. Device Architecture, Breakpoints and Other Emulation Features (continued)
Break- Range LPMx.5
MSP430 4-Wire 2-Wire Clock State Trace
Device points Break- Debugging
Architecture JTAG JTAG (1) Control Sequencer Buffer
(N) points Support
MSP430FE42x2 MSP430 X 2 X
MSP430FW42x MSP430 X 2 X
MSP430F42x0 MSP430 X 2 X
MSP430FG42x0 MSP430 X 2 X
MSP430F43x MSP430 X 8 X X X X
MSP430FG43x MSP430 X 2 X
MSP430F43x1 MSP430 X 2 X
MSP430F44x MSP430 X 8 X X X X
MSP430F44x1 MSP430 X 8 X X X X
MSP430F461x MSP430X X 8 X X X X
MSP430FG461x MSP430X X 8 X X X X
MSP430F461x1 MSP430X X 8 X X X X
MSP430F47x MSP430 X 2 X
MSP430FG47x MSP430 X 2 X
MSP430F47x3 MSP430 X 2 X
MSP430F47x4 MSP430 X 2 X
MSP430F471xx MSP430X X 8 X X X X
MSP430F51x1 MSP430Xv2 X X 3 X X
MSP430F51x2 MSP430Xv2 X X 3 X X
MSP430F521x MSP430Xv2 X X 8 X X X X
MSP430F522x MSP430Xv2 X X 8 X X X X
MSP430F530x MSP430Xv2 X X 3 X X
MSP430F5310 MSP430Xv2 X X 3 X X
MSP430F532x MSP430Xv2 X X 8 X X X X
MSP430F534x MSP430Xv2 X X 8 X X X X
MSP430F54xx MSP430Xv2 X X 8 X X X X
MSP430F54xxA MSP430Xv2 X X 8 X X X X
MSP430F543x MSP430Xv2 X X 8 X X X X
MSP430F550x MSP430Xv2 X X 3 X X
MSP430F5510 MSP430Xv2 X X 3 X X
MSP430F552x MSP430Xv2 X X 8 X X X X
MSP430F563x MSP430Xv2 X X 8 X X X X
MSP430FR57xx MSP430Xv2 X X 3 X X X
MSP430FR59xx MSP430Xv2 X X 3 X X X
MSP430F643x MSP430Xv2 X X 8 X X X X
MSP430F663x MSP430Xv2 X X 8 X X X X X
MSP430F665x MSP430Xv2 X X 8 X X X X
MSP430F67xx MSP430Xv2 X X 3 X X
MSP430L092 MSP430Xv2 X 2 X
In C-SPY:
1. Open the Watch Window (View → Watch).
2. Click Debug → Quick Watch.
3. To watch varword, enter in the Expression box:
(__data16 unsigned int *) varword
4. To watch varchar, enter in the Expression box:
(__data16 unsigned char *) varchar
5. Click the Add Watch button.
6. Close the Quick Watch window.
7. For the created entry in the Watch Window, click on the + symbol to display the contents (or value) of
the watched variable.
To change the format of the displayed variable (default, binary, octal, decimal, hex, char), select the type,
click the right mouse button, and then select the desired format. The value of the displayed variable can
be changed by selecting it, and then entering the new value.
In C, variables can be watched by selecting them and then dragging and dropping them into the Watch
Window.
Because the MSP430 peripherals are memory mapped, it is possible to extend the concept of watching
variables to watching peripherals. Be aware that there may be side effects when peripherals are read and
written by C-SPY (see FAQ Debugging #24).
CPU core registers can be specified for watching by preceding their name with '#' (that is, #PC, #SR, #SP,
#R5, etc.).
Variables watched within the Watch Window are updated only when C-SPY gets control of the device (for
example, following a breakpoint hit, a single step, or a stop or escape).
Although registers can be monitored in the Watch Window, View → Register is the preferred method.
This appendix presents solutions to frequently asked questions regarding program hardware development
and debugging tools.
A.1 Hardware
For a complete list of hardware-related FAQs, see the MSP430 Hardware Tools User's Guide (SLAU278).
14. The CSTARTUP that is implicitly linked with all C applications does not disable the Watchdog
timer. Use WDTCL = WDTPW + WDTHOLD; to explicitly disable the Watchdog. This statement is best
placed in the __low_level_init() function that gets executed before main().
If the Watchdog timer is not disabled, and the Watchdog triggers and resets the device during
CSTARTUP, the source screen goes blank, as C-SPY is not able to locate the source code for
CSTARTUP. Be aware that CSTARTUP can take a significant amount of time to execute if a large
number of initialized global variables are used.
int __low_level_init(void)
{
/* Insert your low-level initializations here */
/*==================================*/
/* Choose if segment initialization */
/* should be done or not. */
/* Return: 0 to omit seg_init */
/* 1 to run seg_init */
/*==================================*/
return (1);
}
15. Compiler optimization can remove unused variables and statements that have no effect and
can affect debugging. Optimization: NONE is supported within Project → Options → C/C++ Compiler
→ Code → Optimizations. Alternatively, variables can be declared volatile.
16. The IAR tutorial assumes a Full or Baseline version of the Workbench. Within a KickStart
system, it is not possible to configure the C compiler to output assembler mnemonics.
17. Existing projects from an IAR 1.x system can be used within the new IAR 2.x or 3.x system; see
the IAR document migration guide for EW430 x.x. This document is located in <Installation
Root>\Embedded Workbench x.x\430\doc\migration.htm
18. Assembler projects must reference the code segment (RSEG CODE) to use the Linker →
Processing → Fill Unused Code Memory mechanism. No special steps are required to use Linker →
Processing → Fill Unused Code Memory with C projects.
19. Ensure that the proper C runtime library is selected for C-only and mixed C and assembly
language projects (Project → General Options → Library Configuration → Library). For assembly-only
projects, the runtime library must not get linked in, otherwise the build fails and a linker error is output
(for example, that the RESET vector is allocated twice).
20. Numerous C and C++ runtime libraries are provided with the Workbench:
cl430d: C, 64-bit doubles
cl430dp: C, 64-bit doubles, position independent
cl430f: C, 32-bit doubles
cl430fp: C, 32-bit doubles, position independent
dl430d: C++, 64-bit doubles
dl430dp: C++, 64-bit doubles, position independent
dl430f: C++, 32-bit doubles
dl430fp: C++, 32-bit doubles, position independent
See the IAR MSP430 C/C++ compiler reference guide for more information on which library to use.
CAUTION
Possible Damage to Device
Always handle MSP430 devices using a vacuum pick-up tool only; do not
use your fingers, as they can easily bend the device pins and render the
device useless. Also, always observe and follow proper ESD precautions.
3. C-SPY reports that the device JTAG security fuse is blown. With current MSP-FET430PIF and
MSP430-FET430UIF JTAG interface tools there is a weakness when adapting target boards that are
powered externally. This leads to an accidental fuse check in the MSP430 and results in the JTAG
security fuse being recognized as blown although it is not. This is valid for MSP-FET430PIF and MSP-
FET430UIF but is mainly seen on MSP-FET430UIF.
Workarounds:
• Connect the device RST/NMI pin to JTAG header (pin 11), MSP-FET430PIF or MSP-FET430UIF
interface tools are able to pull the RST line, this also resets the device internal fuse logic.
• Do NOT connect both VCC Tool (pin 2) and VCC Target (pin 4) of the JTAG header and also specify
a value for VCC in the debugger that is equal to the external supply voltage.
4. C-SPY can download data into RAM, information, and flash main memories. A warning message
is output if an attempt is made to download data outside of the device memory spaces.
5. C-SPY can debug applications that utilize interrupts and low power modes (see FAQ Debugging
#26).
6. C-SPY cannot access the device registers and memory while the device is running. C-SPY
displays "-" to indicate that a register or memory field is invalid. The user must stop the device to
access device registers and memory. Any displayed register or memory fields are then updated.
7. When C-SPY is started, the flash memory is erased and the opened file is programmed in
accordance with the download options as set in Project → Options → FET Debugger → Download
Control. This initial erase and program operations can be disabled selecting Project → Options → FET
Debugger → Download Control → Suppress Download. Programming of the flash can be initiated
manually with Emulator → Init New Device.
8. The parallel port designators (LPTx) have the following physical addresses: LPT1: 378h, LPT2:
278h, LPT3: 3BCh. The configuration of the parallel port (ECP, Compatible, Bidirectional, Normal) is
not significant; ECP seems to work well (see FAQ Debugging #1 for additional hints on solving
communication problems between C-SPY and the device).
9. C-SPY may assert RST/NMI to reset the device when C-SPY is started and when the device is
programmed. The device is also reset by the C-SPY RESET button, and when the device is manually
reprogrammed (Emulator → Init New Device), and when the JTAG is resynchronized (Emulator →
Resynchronize JTAG). When RST/NMI is not asserted (low), C-SPY sets the logic driving RST/NMI to
high-impedance, and RST/NMI is pulled high via a resistor on the PCB.
RST/NMI may get asserted and negated after power is applied when C-SPY is started. RST/NMI may
then get asserted and negated a second time after device initialization is complete.
Within C-SPY, Emulator → "Power on" Reset cycles the power to the target to generate a power-on
reset.
10. C-SPY can debug a device whose program reconfigures the function of the RST/NMI pin to
NMI.
11. The level of the XOUT/TCLK pin is undefined when C-SPY resets the device. The logic driving
XOUT/TCLK is set to high-impedance at all other times.
12. When making current measurements of the device, ensure that the JTAG control signals are
released (Emulator → Release JTAG on Go), otherwise the device is powered by the signals on the
JTAG pins and the measurements are erroneous (see FAQ Debugging #14).
13. Most C-SPY settings (breakpoints, etc.) are preserved between sessions.
14. When C-SPY has control of the device, the CPU is ON (that is, it is not in low-power mode)
regardless of the settings of the low-power mode bits in the status register. Any low-power mode
conditions are restored prior to Step or Go. Consequently, do not measure the power consumed by the
device while C-SPY has control of the device. Instead, run your application using Go with JTAG
released (see FAQ Debugging #12).
15. The View → Memory → Memory Fill dialog of C-SPY requires hexadecimal values for Starting
Address, Length, and Value to be preceded with "0x". Otherwise the values are interpreted as
decimal.
16. The Memory debug view of C-SPY (View → Memory) can be used to view the RAM, the information
memory, and the flash main memory. The Memory utility of C-SPY can be used to modify the RAM;
the information memory and flash main memory cannot be modified using the Memory utility.
The information memory and flash main memory can be programmed only when a project is opened
and the data is downloaded to the device, or when Emulator → Init New Device is selected.
17. C-SPY does not permit the individual segments of the information memory and the flash main
memory to be manipulated separately; consider the information memory to be one contiguous
memory, and the flash main memory to be a second contiguous memory.
18. The Memory window correctly displays the contents of memory where it is present. However, the
Memory window incorrectly displays the contents of memory where there is none present.
Memory should be used only in the address ranges specified by the device data sheet.
19. C-SPY utilizes the system clock to control the device during debugging. Therefore, device counters,
etc., that are clocked by the Main System Clock (MCLK) are affected when C-SPY has control of
the device. Special precautions are taken to minimize the effect upon the Watchdog Timer. The CPU
core registers are preserved. All other clock sources (SMCLK, ACLK) and peripherals continue to
operate normally during emulation. In other words, the Flash Emulation Tool is a partially intrusive
tool.
Devices that support clock control (Emulator → Advanced → Clock Control) can further minimize these
effects by selecting to stop the clock(s) during debugging (see FAQ Debugging #24).
20. There is a time after C-SPY performs a reset of the device [when the C-SPY session is first
started, when the flash is reprogrammed (via Init New Device), and when JTAG is resynchronized
(Resynchronize JTAG)] and before C-SPY has regained control of the device that the device
executes code normally. This behavior may have side effects. Once C-SPY has regained control of
the device, it performs a reset of the device and retains control.
21. When programming the flash, do not set a breakpoint on the instruction immediately following
the write to flash operation. A simple workaround to this limitation is to follow the write to flash
operation with a NOP, and set a breakpoint on the instruction following the NOP (see FAQ Debugging
#23).
22. The Dump Memory length specifier is restricted to four hexadecimal digits (0 to FFFF). This
limits the number of bytes that can be written from 0 to 65535. Consequently, it is not possible to write
memory from 0 to 0xFFFF inclusive, as this would require a length specifier of 65536 (or 10000h).
23. Multiple internal machine cycles are required to clear and program the flash memory. When single
stepping over instructions that manipulate the flash, control is given back to C-SPY before these
operations are complete. Consequently, C-SPY updates its memory window with erroneous
information. A workaround to this behavior is to follow the flash access instruction with a NOP, and
then step past the NOP before reviewing the effects of the flash access instruction (see FAQ
Debugging #21).
24. Peripheral bits that are cleared when read during normal program execution (that is, interrupt
flags) are cleared when read while being debugged (that is, memory dump, peripheral registers).
When using certain MSP430 devices (such as MSP430F15x, MSP430F16x, MSP430F43x, and
MSP430F44x devices), bits do not behave this way (that is, the bits are not cleared by C-SPY read
operations).
25. C-SPY cannot be used to debug programs that execute in the RAM of MSP430F12x and
MSP430F41x devices. A workaround to this limitation is to debug programs in flash.
26. While single stepping with active and enabled interrupts, it can appear that only the interrupt
service routine (ISR) is active (that is, the non-ISR code never appears to execute, and the single
step operation always stops on the first line of the ISR). However, this behavior is correct because the
device always processes an active and enabled interrupt before processing non-ISR (that is, mainline)
code. A workaround for this behavior is, while within the ISR, to disable the GIE bit on the stack so that
interrupts are disabled after exiting the ISR. This permits the non-ISR code to be debugged (but
without interrupts). Interrupts can later be reenabled by setting GIE in the status register in the Register
window.
On devices with the clock control emulation feature, it may be possible to suspend a clock between
single steps and delay an interrupt request (Emulator → Advanced → Clock Control).
27. The base (decimal, hexadecimal, etc.) property of Watch Window variables is not preserved
between C-SPY sessions; the base reverts to Default Format.
28. On devices equipped with a Data Transfer Controller (DTC), the completion of a data transfer cycle
preempts a single step of a low-power mode instruction. The device advances beyond the low-
power mode instruction only after an interrupt is processed. Until an interrupt is processed, it appears
that the single step has no effect. A workaround to this situation is to set a breakpoint on the instruction
following the low-power mode instruction, and then execute (Go) to this breakpoint.
29. The transfer of data by the Data Transfer Controller (DTC) may not stop precisely when the
DTC is stopped in response to a single step or a breakpoint. When the DTC is enabled and a
single step is performed, one or more bytes of data can be transferred. When the DTC is enabled and
configured for two-block transfer mode, the DTC may not stop precisely on a block boundary when
stopped in response to a single step or a breakpoint.
30. The C-SPY Register window supports instruction cycle length counters. The cycle counter is
active only while single stepping. The count is reset when the device is reset, or the device is run (Go).
The count can be edited (normally set to zero) at any time.
31. It is possible to use C-SPY to get control of a running device whose state is unknown. Simply
use C-SPY to program a dummy device, and then start the application with Release JTAG on Go
selected. Remove the JTAG connector from the dummy device and connect to the unknown device.
Select Debug → Break (or the Stop hand) to stop the unknown device. The state of the device can
then be interrogated.
32. Resetting a program temporarily requires a breakpoint if Project → Options → Debugger → Setup →
Run To is enabled. If N or more breakpoints are set, Reset sets a virtual breakpoint and runs to the
Run To function. Consequently, it may require a significant amount of time before the program
resets (that is, stops at the Run To function). During this time the C-SPY indicates that the program is
running, and C-SPY windows may be blank (or may not be correctly updated).
33. Run To Cursor temporarily requires a breakpoint. If N breakpoints are set and virtual breakpoints are
disabled, Run To Cursor incorrectly uses a virtual breakpoint. This results in very slow program
execution.
34. The simulator is a CPU core simulator only; peripherals are not simulated, and interrupts are
statistical events.
35. On devices without data breakpoint capabilities, it is possible to associate with an instruction
breakpoint an (arbitrarily complex) expression that C-SPY evaluates when the breakpoint is hit. This
mechanism can be used to synthesize a data breakpoint. See the C-SPY documentation for a
description of this complex breakpoint mechanism.
36. The ROM Monitor referenced by the C-SPY documentation applies only to older MSP430Exxx
(EPROM) based devices; it can be ignored when using the FET and the flash-based MSP430F
devices.
37. Special function registers (SFRs) and the peripheral registers are displayed in View → Register.
38. The putchar() and getchar() breakpoints are set only if these functions are present (and the
mechanism is enabled). Note that putchar() and getchar() could be indirectly referenced by a library
function.
39. The flash program and download progress bar does not update gradually. This behavior is to be
expected. The progress bar updates whenever a "chunk" of memory is written to flash. The
development tools attempt to minimize the number of program chunks to maximize programming
efficiency. Consequently, it is possible, for example, for a 60K-byte program to be reduced to a single
chunk, and the progress bar is not updated until the entire write operation is complete.
40. After moving a complete EW430 project (including workspace, project, source and generated
object files) to a different storage location (for example, a different PC) a rebuild of the object files
(rebuild project) is required before starting C-Spy. The Linker stores absolute path names in the object
files, which probably do not match the new storage location. C-Spy can show a message that the
source files cannot be located or can show strange artifacts during debugging.
FET-Specific Menus
B.1 Menus
Revision History
Version Comments
Added emulation features for MSP430FR59xx and MSP430F665x.
SLAU138Y
Updated LPMx.5 debugging support in Table 2-1.
Related Documentation From Texas Instruments, Added CC430 documentation.
SLAU138X
Table 2-1, Added CC430F512x, CC430F514x, CC430F614x, MSP430G22xx.
SLAU138W Updated Table 2-1.
Added Section 2.2.4 and Section 2.2.5.
SLAU138V
Updated Table 2-1.
SLAU138U Updated Table 2-1
SLAU138T Updated Table 2-1
Added Section 2.2.2.
SLAU138S
Updated Table 2-1 with MSP430x092 and MSP430F438 and MSP430F439.
Added emulation features for MSP430G2xxx, MSP430F51x1, MSP430F51x2, MSP430F550x, MSP430F5510,
SLAU138R
MSP430F551x, MSP430F552x, MSP430F663x.
SLAU138Q Updated supported operating systems in Section 1.1.
SLAU138P Updated features for MSP430F461x and MSP430F461x 1 in Table 2-1.
SLAU138O Removed Appendix C: 80-Pin MSP430F44x and MSP430F43x Device Emulation
SLAU138N Added information on MSP430F5xx and CC430 devices
• Removed information on hardware. It was moved into the MSP430 Hardware Tools User's Guide (SLAU278).
SLAU138M • Added emulation features for MSP430F55xx and MSP430F54xxA in Table 2-1.
• Updated and extended Table 2-1 with architecture information.
• Added MSP-FET430U100A kit in Section 1.7 and MSP-TS430PZ100A target socket module schematic (Figure B-
19) and PCB (Figure B-20).
• Added emulation features for CC430F513x, CC430F612x, CC430F613x, MSP430F41x2, MSP430F47x,
SLAU138L MSP430FG479, and MSP430F471xx in Table 2-1.
• Updated MSP-TS430PN80 target socket module schematic (Figure B-15) with information on MSP430F47x and
MSP430FG47x.
• Removed information throughout on MSP-FET430Pxx0 and MSP-FET430X110 kits.
• Added MSP-FET430U5x100 kit and MSP-TS430PZ5x100 target socket module schematic.
SLAU138K • Added overview of debug interfaces as Table 1-1.
• Added eZ430-F2013, T2012, and eZ430-RF2500.
SLAU138J • Updated Section 1-7.
• Added MSP-TS430PW28 Target Socket Module, Schematic (Figure B-5) and PCB (Figure B-6).
• Updated MSP-FET430U28 kit content information (DW or PW package support) (Section 1-7).
SLAU138I • Added Emulation features for MSP430F21x2 to Table 2-1.
• Updated MSP-TS430PW14 Target Socket Module, Schematic (Figure B-1).
• Updated MSP-TS430DA38 Target Socket Module, Schematic (Figure B-7).
SLAU138H • Updated Appendix E
• Added Emulation features for MSP430F22x2, MSP430F241x, MSP430F261x, MSP430FG42x0 and
SLAU138G MSP430F43x1 to Table 2-1.
• Updated Figure B-15 and Figure B-16 in Appendix B.
• Renamed MSP-FET430U40 to MSP-FET430U23x0.
• Replaced MSP-FET430U40 schematic and PCB figures with renamed MSP-FET430U23x0 images.
SLAU138F
• Added FAQ Hardware #2 in Section A.1.
• Added FAQ Debugging #3 in Section A.3.
NOTE: Page numbers for previous revisions may differ from page numbers in the current version.