Listen "010 - T0015! Part 0x3 - Debug Interfaces"
Episode Synopsis
This week we talk about the nebulous world of debugging interfaces, some of their history, and how they can be used in reverse engineering. We cover the basics of what are JTAG and SWD ( both ARM Debug Access Port (DAP) and ARM® Debug Interface Architecture Specification) and can they both be used to debug a MIPS processor (the answer is NO!). We list a few other standards but also some key vendors and projects to get you debugging and controlling your next system: Segger J-Link/J-Trace (generally the most flexible) BlackMagicProbe ST-Link BusBlaster JTAGulator Cypress Miniprog3 Microchips supports both AVR and Microchip parts for debug. Since a few of these are from the OSHW/OSSW world, we briefly discuss the impact of this work on driving down costs and opening up the field to more people. As always, we might have missed your favorite tool or you had questions and comments about our list, find us on twitter @unnamed_show, or email us at [email protected] and tell us. Music by TeknoAxe (http://www.youtube.com/user/teknoaxe)
More episodes of the podcast Unnamed Reverse Engineering Podcast
076 - Living In A Vast World of Craziness
29/09/2025
075 - Teleporting All Over The Timeline
02/08/2025
074 - This Coconut Won't Open
06/05/2025
073 - REPP.show
01/02/2025
072 - EOF?
07/12/2024
071 - Snerd Niped
07/09/2024
070 - I Have a DediProblem
09/06/2024
069 - Canned Cheese and Onion Rings
17/04/2024
068 - The Monkey Button
07/04/2024
067 - I Don't Know What I'm Doing
03/03/2024
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.