Engine setup successfully
Detected CPU ID: 0x635817F
Loading manufacturer data from device
Checking for a device specific script
Loading script: agpf.bcs
Creating memory interface (0x0 / 16777216 bytes)
Set AMD default write delay to: 100 ms
Flash device detected: AMD S29GL320 (16777216 bytes)
Located at memory address: 0x1E000000
Programming mode: AMD (16 bit) fast-write algorithum
Setting device parameter (AMD Flash delay) to 0x4B0
Setting device parameter (Memory Read Mode) to 0x1
EJTAG command issued: 0x10000 result: 0x228310
Button Hander::Calling Event: WriteCFE
Address 0x0: wrote 0x10 and read 0x0 (94210 mismatches)
Address 0x0: wrote 0x10 and read 0x0 (94208 mismatches)
Address 0x0: wrote 0x10 and read 0x0 (94206 mismatches)
Error: data verification at 0x0 failed!
Sucessfully flashed 131072 bytes
Programming Flash memory (16777216 bytes)
Address 0x0: wrote 0x10 and read 0xFF (130456 mismatches)
Address 0x0: wrote 0x10 and read 0xFF (130456 mismatches)
Address 0x0: wrote 0x10 and read 0xFF (130456 mismatches)
Error: data verification at 0x0 failed!
Address 0x20000: wrote 0x38 and read 0xFF (130450 mismatches)
Address 0x20000: wrote 0x38 and read 0xFF (130450 mismatches)
Address 0x20000: wrote 0x38 and read 0xFF (130450 mismatches)
Error: data verification at 0x20000 failed!
Address 0x40000: wrote 0xEA and read 0xFF (130542 mismatches)
Address 0x40000: wrote 0xEA and read 0xFF (130542 mismatches)
Address 0x40000: wrote 0xEA and read 0xFF (130542 mismatches)
Error: data verification at 0x40000 failed!
Address 0x60000: wrote 0xAC and read 0xFF (130588 mismatches)
Address 0x60000: wrote 0xAC and read 0xFF (130588 mismatches)
Address 0x60000: wrote 0xAC and read 0xFF (130588 mismatches)
Error: data verification at 0x60000 failed!
Address 0x80000: wrote 0xE1 and read 0xFF (130572 mismatches)
Address 0x80000: wrote 0xE1 and read 0xFF (130572 mismatches)
Address 0x80000: wrote 0xE1 and read 0xFF (130572 mismatches)
Error: data verification at 0x80000 failed!
Address 0xA0000: wrote 0xB7 and read 0xFF (130550 mismatches)
Address 0xA0000: wrote 0xB7 and read 0xFF (130550 mismatches)
Address 0xA0000: wrote 0xB7 and read 0xFF (130550 mismatches)
Error: data verification at 0xA0000 failed!
Address 0xC0000: wrote 0x23 and read 0xFF (130562 mismatches)
Address 0xC0000: wrote 0x23 and read 0xFF (130562 mismatches)
Address 0xC0000: wrote 0x23 and read 0xFF (130562 mismatches)
Error: data verification at 0xC0000 failed!
Address 0xE0000: wrote 0xB4 and read 0xFF (130563 mismatches)
Address 0xE0000: wrote 0xB4 and read 0xFF (130563 mismatches)
Address 0xE0000: wrote 0xB4 and read 0xFF (130563 mismatches)
Error: data verification at 0xE0000 failed!
Address 0x100000: wrote 0x10 and read 0xFF (130583 mismatches)
Address 0x100000: wrote 0x10 and read 0xFF (130583 mismatches)
Address 0x100000: wrote 0x10 and read 0xFF (130583 mismatches)
Error: data verification at 0x100000 failed!
Address 0x120000: wrote 0xAE and read 0xFF (130573 mismatches)
Address 0x120000: wrote 0xAE and read 0xFF (130573 mismatches)
Address 0x120000: wrote 0xAE and read 0xFF (130573 mismatches)
Error: data verification at 0x120000 failed!
Address 0x140000: wrote 0xA4 and read 0xFF (130536 mismatches)
Address 0x140000: wrote 0xA4 and read 0xFF (130536 mismatches)
Address 0x140000: wrote 0xA4 and read 0xFF (130536 mismatches)
Error: data verification at 0x140000 failed!
Address 0x160000: wrote 0x24 and read 0xFF (130560 mismatches)
Address 0x160000: wrote 0x24 and read 0xFF (130560 mismatches)
.....
# Script file for BCM6358 - 0x0635817F,
# This script is automatically executed when BlackcatUSB
MyDevice = "AGPF" #Name of device
CFEBase = 0x00000000
CFESize = 131072
JTAG.MemoryAddress(0x00000000)
JTAG.MemorySize(0x1000000)
JTAG.MemoryInit()
JTAG.Flashbase(0x1E000000)
JTAG.FlashInit()
#removed this to gain performance. If you have reading issues, uncomment
#SetParam(3,100) #Sets read delay to 0
SetParam(2,1200) #Sets the AMD flash delay to 200
SetParam(4,1) #Sets read mode to 1
t1 = Tab.Create(MyDevice)
Tab(t1).AddGroup("CFE",10,10,420,54)
Tab(t1).AddButton("ReadCFE","Read",130,30)
Tab(t1).AddButton("WriteCFE","Write",220,30)
Tab(t1).AddImage("LOGO","Motorola.gif",45,240)
CreateEvent(ReadCFE)
Status("Reading the CFE")
Tab(t1).ButtonDisable()
MyData = Flash.ReadVerify(CFEBase,CFESize)
if (MyData = Nothing)
Status("Error: data read back failed")
Tab(t1).ButtonEnable()
Exit Event
endif
Prompt = "Choose filename to save the firmware"
SaveFile(MyData,Prompt,"CFE.bin")
Status("Successfully read CFE from Flash")
Tab(t1).ButtonEnable()
EndEvent
CreateEvent(WriteCFE)
Tab(t1).ButtonDisable()
Prompt = "Choose a CFE to write into Flash"
MyData = OpenFile(Prompt,"CFE files (*.bin)|*.bin")
if (MyData = Nothing)
goto WriteCFEExit
endif
if not (Len(MyData) = CFESize)
Status("Error: File is not the size of the CFE")
goto WriteCFEExit
endif
Flash.Write(MyData,CFEBase,CFESize)
Status("New CFE successfully written")
WriteCFEExit:
Tab(t1).ButtonEnable()
EndEvent
LibUsbDotNet version: 2.2.8.104
BlackcatUSB Script Engine running, build: 150
Welcome to Blackcat USB interfacing software, build: 267
Running on: Microsoft Windows XP Professional (32 bit)
Initializing EJTAG engine
Device connected in JTAG mode: 6,01
Engine setup successfully
Detected CPU ID: 0x635817F
Loading manufacturer data from device
Checking for a device specific script
No script files available
Loading script: AGPF.bcs
Set AMD default write delay to: 100 ms
Flash device detected: AMD S29GL320 (16777216 bytes)
Located at memory address: 0x1E000000
Programming mode: AMD (16 bit) fast-write algorithum
Setting device parameter (Memory Read Delay) to 0x64
Setting device parameter (AMD Flash delay) to 0xFA
Setting device parameter (Memory Read Mode) to 0x1
Tab.AddImage, specified image not found: images\Motorola.gif
Button Hander::Calling Event: WriteCFE
Address 0x0: wrote 0x10 and read 0x0 (94196 mismatches)
Address 0x0: wrote 0x10 and read 0x0 (94205 mismatches)
Address 0x0: wrote 0x10 and read 0x0 (128526 mismatches)
Error: data verification at 0x0 failed!
Write Flash operation complete
131072 bytes written in 15,522 seconds, 8.444 Bytes/s
Sucessfully programmed 131072 bytes
http://darviniano.eu/anselmo/files/hacking_routers/alice_gate/firmware_originale/