Bus Pirate PIC 24F programmer update

Posted on Saturday, May 15th, 2010 in binmode, Bus Pirate, programmers by Ian

The Bus Pirate PIC 24F programmer will now successfully erase a PIC 24F and read the chip ID. In the future this could be a handy way to unbrick one Bus Pirate with another. Our goal is to make all Dangerous Prototypes projects repairable via a Bus Pirate programmer.

We couldn’t get the commands in the programming specification to work, even though everything looked perfect on a logic analyzer. Eventually we had to sniff the ICSP pins while we erased the chip with an ICD2. The actual commands were way off from our understanding of the datasheet. The erase operation seems to included an undocumented command.

A test programmer application should be finished very soon. Then we’ll add support for other 3.3volt PICs. The 18F24J50 in the Logic Sniffer is our next target.

We still have one of Ril3y’s laser-cut Bus Pirate cases to give away, we’ll send it to anyone who makes a contribution to the programmer effort (more below).

The latest source, executable, and scripts are in the SVN.

We put a laser-cut Bus Pirate case as a bounty on this project. Now that we’re over the major hurdle of reading the chip we still want to give it away. The plan is to give it to anyone who gets involved in the programmer effort. That’s pretty loosely defined, and in the case of multiple contributions we’ll put it up to a vote in the forum.

This entry was posted on Saturday, May 15th, 2010 at 7:42 am and is filed under binmode, Bus Pirate, programmers. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed.

2 Responses to “Bus Pirate PIC 24F programmer update”

  1. Andrew Frazer says:

    Interesting that you sniffed the ISCP data.. Do you think that its possible, that you could sniff an ordinary ICSP session and build a hex file from it, that you could then use to program other devices from.

    Scenerio is using a “secure” Programmer like the ones from Softlog.. The system is secure until the code squirts out the other end?

Leave a Reply

Notify me of followup comments via e-mail. You can also subscribe without commenting.

Recent Comments

  • Drone: So these go for around $330 USD and NO published calibration procedure online or otherwise? Given what's inside - I don't think I'll be considering...
  • Pekka Akselin: This is ridiculous!? :-) We are back at 256(!) byte EPROMs that needed multiple, a handful, of voltages to run! :-(
  • KH: Let's try a back-of-envelope calc balancing energies. From MCP1700 datasheet, there are graphs for a 200mA load step. Estimate the energy shortfall as 12uJ. Say...
  • Daniel: It's been a week and my comment is still awaiting moderation. Apparently the CIA doesn't want their involvement known?
  • KH: Agree, so okay, I guess he must have learned from somewhere. 100nF and 1000uF is so far apart, that was jarring; it's more magic incantation...