TI中文支持网
TI专业的中文技术问题搜集分享网站

[分享] 调试 UCD3028 和 UCD3138 的利器:内存调试器(Memory Debugger)

大家在调试UCD3028和UCD3138时,经常会遇到这样的需求:想随时了解一些变量和寄存器的值,以判断程序运行的情况。

使用Memory debugger可以很容易的实现该功能。请参考附件的应用笔记。

 

怎么找到Memory Debugger

Memory Debugger是德州仪器数字电源设计调试工具Fusion Digital Power Designer(下载地址:http://www.ti.com/fusiongui,请下载最新版本,早期版本不支持Memory Debugger功能)的一部分,主要用来读写UCD3xxx内部全局变量和寄存器的值。Memory Debugger界面如图1所示。如果是第一次调用Memory Debugger,需要输入密码“forestln”。

那么如何调出Memory Debugger工具,有两条途径:一是执行Fusion Design Online可执行文件(桌面直接双击Fusion Design Online快捷方式,如果没有创建桌面快捷方式,在开始菜单中找到Texas Instruments Fusion Digital Power Designer目录下的Fusion Digital Power Designer,点击即可),然后就可以在Fusion Design Online上的Tools菜单下面找到Memory Debugger项,如图2所示;二是执行UCD3xxx & UCD9xxx Device GUI可执行文件(桌面直接双击UCD3xxx & UCD9xxx Device GUI快捷方式,如果没有创建桌面快捷方式,在开始菜单中找到Texas Instruments Fusion Digital Power Designer\Device GUIs目录下的UCD3xxx & UCD9xxx Device GUI,点击即可),Memory Debugger在图中红圈处。

Neil Li:

UCD3xxx包含UCD3028和UCD3138两个系列,是TI大力推广的数字电源,可以用来设计PFC控制,高压400V转48V或12V,48V转28V或12V等多个隔离电源场景。

在RRU中应用尤为有优势。

jun yin:

回复 Neil Li:

Neil, 请问下使用memory debugger时寄存器SysRegs无法读取是什么原因,如何读取寄存器SysRegs得值?

Timestamp
Message

2014/5/29 9:32:29
0x00020000: read 16 byte(s) 0x00000100000014000000220000000141

2014/5/29 9:32:29
0x00020010: read 16 byte(s) 0x00000000200000241770068200000682

2014/5/29 9:32:29
0x00020020: read 16 byte(s) 0x0A000000000000000000000000000000

2014/5/29 9:32:29
0x00020030: read 16 byte(s) 0x00000000000000000000000000000000

2014/5/29 9:32:29
0x00020040: read 16 byte(s) 0x00000000000000000000000000000000

2014/5/29 9:32:29
0x00020050: read 16 byte(s) 0x0000050F000068200000002700000000

2014/5/29 9:32:30
0x00020060: read 16 byte(s) 0x00000000000000000000000000000000

2014/5/29 9:32:30
0x00020070: read 4 byte(s) 0x00000000

2014/5/29 9:32:30
0x00020074: read 4 byte(s) 0x00000203

2014/5/29 9:32:30
0x00030000: read 16 byte(s) 0x36060005000400040004730600000004

2014/5/29 9:32:30
0x00030010: read 16 byte(s) 0x00000F00000000000000006D00000000

2014/5/29 9:32:30
0x00030020: read 16 byte(s) 0x00000000000000000000000000000000

2014/5/29 9:32:30
0x00030030: read 16 byte(s) 0x00000000000000000000001200120012

2014/5/29 9:32:30
0x00030040: read 16 byte(s) 0x00000000000000000000001200120012

2014/5/29 9:32:30
0x00030050: read 16 byte(s) 0x00000000000000000000000000000000

2014/5/29 9:32:30
0x00030060: read 16 byte(s) 0x00000000000000000000000000000000

2014/5/29 9:32:30
0x00030070: read 16 byte(s) 0x00000000000001FE0000000C00000000

2014/5/29 9:32:30
0x00040000: read 16 byte(s) 0x000007490000001B0000000002060D03

2014/5/29 9:32:30
0x00040010: read 16 byte(s) 0x01000104010001000D0001000000060A

2014/5/29 9:32:30
0x00040020: read 16 byte(s) 0x000000030000067F0000039D000004BF

2014/5/29 9:32:30
0x00040030: read 16 byte(s) 0x00000FFF00000FFF00000FFF00000FFF

2014/5/29 9:32:30
0x00040040: read 16 byte(s) 0x00000FFF00000FFF00000FFF00000FFF

2014/5/29 9:32:30
0x00040050: read 16 byte(s) 0x00000FFF00000FFF0000000B0000060A

2014/5/29 9:32:30
0x00040060: read 16 byte(s) 0x000000030000067F0000039C000004BE

2014/5/29 9:32:30
0x00040070: read 16 byte(s) 0x000000000FFF00000FFF00000FFF0000

2014/5/29 9:32:30
0x00040080: read 16 byte(s) 0x0FFF00000FFF00000FFF000000000000

2014/5/29 9:32:30
0x00040090: read 4 byte(s) 0x00000000

2014/5/29 9:32:30
0x00040094: read 4 byte(s) 0x00555551

2014/5/29 9:32:30
0x00050000: read 16 byte(s) 0x000080018001C00200000001000007D0

2014/5/29 9:32:30
0x00050010: read 16 byte(s) 0x000000100000331B00000D05000067B3

2014/5/29 9:32:30
0x00050020: read 16 byte(s) 0x000007C0000001000000000000000000

2014/5/29 9:32:30
0x00050030: read 16 byte(s) 0x00000000000000000000000000000020

2014/5/29 9:32:30
0x00050040: read 16 byte(s) 0x0000000F000032F00000000000000000

2014/5/29 9:32:30
0x00050050: read 16 byte(s) 0x00000000000000000000000000000000

2014/5/29 9:32:30
0x00050060: read 16 byte(s) 0x00000000000000000000000000000000

2014/5/29 9:32:30
0x00050070: read 16 byte(s) 0x00000000000000000000000000000000

2014/5/29 9:32:30
0x00050080: read 4 byte(s) 0x00000123

2014/5/29 9:32:30
0x00050084: read 4 byte(s) 0x00002CF8

2014/5/29 9:32:30
0x00050088: read 4 byte(s) 0x00000000

2014/5/29 9:32:30
0x00060000: read 16 byte(s) 0x00000000000081400000000000000000

2014/5/29 9:32:30
0x00060010: read 16 byte(s) 0x007FFFFF00000000000000000999AAA8

2014/5/29 9:32:30
0x00060020: read 16 byte(s) 0x1F400000000027100000000000000000

2014/5/29 9:32:30
0x00060030: read 16 byte(s) 0x00000000000000000000000000780064

2014/5/29 9:32:30
0x00060040: read 16 byte(s) 0x00DC00B400FE00F0007FFFFF00FFFFFF

2014/5/29 9:32:30
0x00060050: read 16 byte(s) 0x00FFFFFF00FFFFFF0000682B000029AA

2014/5/29 9:32:30
0x00060060: read 4 byte(s) 0x017FFFFF

2014/5/29 9:32:30
0x00070000: read 16 byte(s) 0x000080018001C00200000001000007D0

2014/5/29 9:32:30
0x00070010: read 16 byte(s) 0x000000100000331B00000D05000067B3

2014/5/29 9:32:30
0x00070020: read 16 byte(s) 0x00000800000001000000000000000000

2014/5/29 9:32:30
0x00070030: read 16 byte(s) 0x00000000000000000000000000000010

2014/5/29 9:32:30
0x00070040: read 16 byte(s) 0x00000012000067100000000000000000

2014/5/29 9:32:30
0x00070050: read 16 byte(s) 0x00000000000000000000000000000000

2014/5/29 9:32:30
0x00070060: read 16 byte(s) 0x00000000000000000000000000000000

2014/5/29 9:32:30
0x00070070: read 16 byte(s) 0x00000000000000000000000000000000

2014/5/29 9:32:30
0x00070080: read 4 byte(s) 0x00000123

2014/5/29 9:32:30
0x00070084: read 4 byte(s) 0x00002CF8

2014/5/29 9:32:30
0x00070088: read 4 byte(s) 0x00000000

2014/5/29 9:32:30
0x00080000: read 16 byte(s) 0x00000000000008000000000000001DF0

2014/5/29 9:32:30
0x00080010: read 16 byte(s) 0x00000000000000C80000000012101011

2014/5/29 9:32:30
0x00080020: read 16 byte(s) 0x0000000B000045050000FF0000000000

2014/5/29 9:32:30
0x00080030: read 16 byte(s) 0x286010000000043201DF000000000000

2014/5/29 9:32:30
0x00080040: read 4 byte(s) 0x000001DF

2014/5/29 9:32:30
0x00090000: read 16 byte(s) 0x00000000000080010000000000000000

2014/5/29 9:32:30
0x00090010: read 16 byte(s) 0x00000000000000000000000000000000

2014/5/29 9:32:30
0x00090020: read 16 byte(s) 0x00004234000000000000241200000000

2014/5/29 9:32:30
0x00090030: read 16 byte(s) 0x0000C4010000000000000052000000FF

2014/5/29 9:32:30
0x00090040: read 16 byte(s) 0x0000000000000000007FFFFF00000000

2014/5/29 9:32:30
0x00090050: read 16 byte(s) 0x007FFFFF000000000003FFFF00000000

2014/5/29 9:32:30
0x00090060: read 4 byte(s) 0x00000000

2014/5/29 9:32:30
0x000A0000: read 16 byte(s) 0x000080038001C00200000001000007D0

2014/5/29 9:32:30
0x000A0010: read 16 byte(s) 0x000000100000331B00003415000067B3

2014/5/29 9:32:30
0x000A0020: read 16 byte(s) 0x000007C0000001000000000000000000

2014/5/29 9:32:30
0x000A0030: read 16 byte(s) 0x00000000000000008000000000000010

2014/5/29 9:32:30
0x000A0040: read 16 byte(s) 0x0000000F000034100000000000000000

2014/5/29 9:32:30
0x000A0050: read 16 byte(s) 0x00000000000000000000000000000000

2014/5/29 9:32:30
0x000A0060: read 16 byte(s) 0x00000000000000000000000000000000

2014/5/29 9:32:30
0x000A0070: read 16 byte(s) 0x00000000000000000000000000000000

2014/5/29 9:32:30
0x000A0080: read 4 byte(s) 0x00000123

2014/5/29 9:32:30
0x000A0084: read 4 byte(s) 0x00002CFB

2014/5/29 9:32:30
0x000A0088: read 4 byte(s) 0x00000000

2014/5/29 9:32:30
0x000B0000: read 16 byte(s) 0x00000000000000000000000000000FF0

2014/5/29 9:32:30
0x000B0010: read 16 byte(s) 0x00000000000000000000000011101011

2014/5/29 9:32:30
0x000B0020: read 16 byte(s) 0x0000003F000045050000FF0000000000

2014/5/29 9:32:30
0x000B0030: read 16 byte(s) 0x28601000000004320000000000000000

2014/5/29 9:32:30
0x000B0040: read 4 byte(s) 0x000000FF

2014/5/29 9:32:30
0x000C0000: read 16 byte(s) 0x00000000000081050000000000000000

2014/5/29 9:32:30
0x000C0010: read 16 byte(s) 0x0037493900000000003749A909999900

2014/5/29 9:32:30
0x000C0020: read 16 byte(s) 0x00C800C8000000C800C800C800C800C8

2014/5/29 9:32:30
0x000C0030: read 16 byte(s) 0x0BB80000000013880000000000190000

2014/5/29 9:32:30
0x000C0040: read 16 byte(s) 0x004B0032007D0064004AFFFF00D99999

2014/5/29 9:32:30
0x000C0050: read 16 byte(s) 0x007FFFFF00D99999000033AD00000050

2014/5/29 9:32:30
0x000C0060: read 4 byte(s) 0x010043B9

2014/5/29 9:32:30
0x000D0000: read 16 byte(s) 0x000000030001C00200000001000007D0

2014/5/29 9:32:30
0x000D0010: read 16 byte(s) 0x000000100000331B00003415000067B3

2014/5/29 9:32:30
0x000D0020: read 16 byte(s) 0x00004FC0000001000000000000000000

2014/5/29 9:32:30
0x000D0030: read 16 byte(s) 0x00000000000000008000000000000020

2014/5/29 9:32:30
0x000D0040: read 16 byte(s) 0x0000000F000000000000000000000000

2014/5/29 9:32:30
0x000D0050: read 16 byte(s) 0x00000000000000000000000000000000

2014/5/29 9:32:30
0x000D0060: read 16 byte(s) 0x00000000000000000000000000000000

2014/5/29 9:32:30
0x000D0070: read 16 byte(s) 0x00000000000000000000000000000000

2014/5/29 9:32:30
0x000D0080: read 4 byte(s) 0x00000123

2014/5/29 9:32:30
0x000D0084: read 4 byte(s) 0x00002CFB

2014/5/29 9:32:31
0x000D0088: read 4 byte(s) 0x00000000

2014/5/29 9:32:31
0x000E0000: read 16 byte(s) 0x000000000000082000000000000025E7

2014/5/29 9:32:31
0x000E0010: read 16 byte(s) 0x000025E7000015AA0000000011101011

2014/5/29 9:32:31
0x000E0020: read 16 byte(s) 0x0000003B0000450500000A0A000A0FFF

2014/5/29 9:32:31
0x000E0030: read 16 byte(s) 0x2860100000000432025E000000000000

2014/5/29 9:32:31
0x000E0040: read 4 byte(s) 0x0000025E

2014/5/29 9:32:31
0xFFF7EC00: read 16 byte(s) 0x00000000000000000000000C00000000

2014/5/29 9:32:31
0xFFF7EC10: read 16 byte(s) 0x00000000000000000000000000000000

2014/5/29 9:32:31
0xFFF7EC20: read 16 byte(s) 0x00000000000000000000000000000008

2014/5/29 9:32:31
0xFFF7EC30: read 4 byte(s) 0x00000008

2014/5/29 9:32:31
0xFFF7EC34: read 4 byte(s) 0x00000000

2014/5/29 9:32:31
0xFFF7ED00: read 16 byte(s) 0x00000000000000000000000C00000000

2014/5/29 9:32:31
0xFFF7ED10: read 16 byte(s) 0x00000000000000000000000000000000

2014/5/29 9:32:31
0xFFF7ED20: read 16 byte(s) 0x00000000000000000000000000000008

2014/5/29 9:32:31
0xFFF7ED30: read 4 byte(s) 0x00000008

2014/5/29 9:32:31
0xFFF7ED34: read 4 byte(s) 0x00000008

2014/5/29 9:32:31
0xFFF7F000: read 16 byte(s) 0x000036A70002C30100000000F0F00000

2014/5/29 9:32:31
0xFFF7F010: read 16 byte(s) 0x000000010000000014004000100000FF

2014/5/29 9:32:31
0xFFF7F020: read 16 byte(s) 0x000000000000000023BE9FB900000014

2014/5/29 9:32:31
0xFFF7F030: read 16 byte(s) 0x000000800000070E0000000000000BCD

2014/5/29 9:32:31
0xFFF7F040: read 4 byte(s) 0x0103FFFF

2014/5/29 9:32:31
0xFFF7F044: read 4 byte(s) 0x00000065

2014/5/29 9:32:31
0xFFF7F600: read 16 byte(s) 0x000000FE00000065000000E300000000

2014/5/29 9:32:31
0xFFF7F610: read 16 byte(s) 0x00101800000001FF0061FF58000000B0

2014/5/29 9:32:31
0xFFF7F620: read 4 byte(s) 0x002C0002

2014/5/29 9:32:31
0xFFF7FA00: read 16 byte(s) 0x000000000000006F0000000000000000

2014/5/29 9:32:31
0xFFF7FA10: read 16 byte(s) 0x00000000000000000000000000000000

2014/5/29 9:32:31
0xFFF7FA20: read 16 byte(s) 0x00000000000000010000000000000000

2014/5/29 9:32:31
0xFFF7FA30: read 16 byte(s) 0x00000000000000000000000000000000

2014/5/29 9:32:31
0xFFF7FD00: read 16 byte(s) 0x00EC3686000000010000000000000000

2014/5/29 9:32:31
0xFFF7FD10: read 16 byte(s) 0x00000000000000000000000000000000

2014/5/29 9:32:31
0xFFF7FD20: read 16 byte(s) 0x00000004000000000000000000000001

2014/5/29 9:32:31
0xFFF7FD30: read 16 byte(s) 0x00000001000000000000000000000000

2014/5/29 9:32:31
0xFFF7FD40: read 16 byte(s) 0x00000000000008050000000000000000

2014/5/29 9:32:31
0xFFF7FD50: read 16 byte(s) 0x00000000000000000000000000000000

2014/5/29 9:32:31
0xFFF7FD60: read 16 byte(s) 0x0000000000000000000008050000062B

2014/5/29 9:32:31
0xFFF7FD70: read 16 byte(s) 0x0000000C000006330000FFFF00000002

2014/5/29 9:32:31
0xFFF7FD80: read 16 byte(s) 0x00000000000000000000000000000000

2014/5/29 9:32:31
0xFFF7FD90: read 4 byte(s) 0x00000005

2014/5/29 9:32:31
0xFFF7FD94: read 4 byte(s) 0x00000000

2014/5/29 9:32:31
0xFFF7FD98: read 4 byte(s) 0x00007F40

2014/5/29 9:32:31
0xFFFFFD00: read 16 byte(s) 0x00000000000000000000000000000000

2014/5/29 9:32:31
0xFFFFFD10: read 16 byte(s) 0x00000000000000000000000000000000

2014/5/29 9:32:31
0xFFFFFD20: read 16 byte(s) 0x00000000000000000000000000000000

2014/5/29 9:32:31
0xFFFFFD30: read 4 byte(s) 0x00000003

2014/5/29 9:32:31
0xFFFFFD34: read 4 byte(s) 0x00000000

2014/5/29 9:32:31
0xFFFFFD38: read 4 byte(s) 0x00000000

2014/5/29 9:32:31
0xFFFFFE00: read 16 byte(s) 0x000000000000A1320000000000000062

2014/5/29 9:32:31
0xFFFFFE10: read 16 byte(s) 0x00000001000088220000000100009030

2014/5/29 9:32:31
0xFFFFFE20: read 16 byte(s) 0x00000002000000000000000300000000

2014/5/29 9:32:31
0xFFFFFE30: read 16 byte(s) 0x00000004000000000000000500000000

2014/5/29 9:32:31
0xFFFFFE40: read 16 byte(s) 0x00000006000000000000000700000000

2014/5/29 9:32:31
0xFFFFFE50: read 16 byte(s) 0x00000008000000000000000900000000

2014/5/29 9:32:31
0xFFFFFE60: read 16 byte(s) 0x0000000A000000000000000B00000000

2014/5/29 9:32:31
0xFFFFFE70: read 16 byte(s) 0x0000000C000000000000000D00000000

2014/5/29 9:32:31
0xFFFFFE80: read 16 byte(s) 0x0000000E000000000000000000000000

2014/5/29 9:32:31
0xFFFFFE90: read 4 byte(s) 0x00000000

2014/5/29 9:32:31
0xFFFFFE94: read 4 byte(s) 0x00000000

2014/5/29 9:32:31
0xFFFFFE98: read 4 byte(s) 0x00000000

2014/5/29 9:32:31
0xFFFFFF20: read 16 byte(s) 0x00000000000000000000000002000000

2014/5/29 9:32:31
0xFFFFFF30: read 4 byte(s) 0x08000000

2014/5/29 9:32:31
0xFFFFFF34: read 4 byte(s) 0x02008000

2014/5/29 9:32:31
error reading from the device: error reading memory or EEPROM at address 0xFFFFFFD0; address 0xFFFFFFD0 is not supported for read/write using PARM_INFO/PARM_VALUE commands

Ding Xiufang:

请问怎样使用Memory Debugger观察自定义变量的值,谢谢!

Neil Li:

回复 Ding Xiufang:

需要将其定义为外部变量。

Ding Xiufang:

回复 Neil Li:

是定义为外部变量,那怎样才能添加到Memory Debugge的Watch List从而观察数据变化!

赞(0)
未经允许不得转载:TI中文支持网 » [分享] 调试 UCD3028 和 UCD3138 的利器:内存调试器(Memory Debugger)
分享到: 更多 (0)