You can run a program on the RP2350 which will dump the 32KB ROM. Then you can manipulate that into being a binary image which you can then compare to what is built by that source code.
This MicroPython code run on my RP2350B board seems to have worked for me ...Some snippets ...
This MicroPython code run on my RP2350B board seems to have worked for me ...
Code:
from machine import mem8def Dump256BytePage(adr): for msb in range(0, 256, 16): h = "{:08X} :".format(adr + msb) t = " " for lsb in range(16): b = mem8[adr + msb + lsb] h += " {:02X}".format(b) if b > 0x20 and b < 0x7F : t += chr(b) else : t += "." print(h + t)for adr in range(0, 32*1024, 256): Dump256BytePage(adr) print("")
Code:
pi@Pi4B:~ $ mpremote connect /dev/ttyACM0 run dump-rp235x-rom.py > /tmp/rp235x-rom.txtpi@Pi4B:~ $ ls -l /tmp/rp235x-rom.txt-rw-r--r-- 1 pi pi 160000 Dec 9 15:43 /tmp/rp235x-rom.txt
Code:
00000000 : 00 00 00 F0 89 00 00 00 F9 02 00 00 F9 02 00 00 ................00000010 : 4D 75 02 02 D4 7C 75 00 35 00 28 43 29 20 32 30 Mu...|u.5.(C).2000000020 : 32 34 20 52 61 73 70 62 65 72 72 79 20 50 69 20 24.Raspberry.Pi.00000030 : 4C 74 64 00 84 FE 18 07 47 F6 D4 43 84 46 07 E0 Ltd.....G..C.F..00006740 : 00 01 01 72 61 73 70 62 65 72 72 79 70 69 2E 63 ...raspberrypi.c00006750 : 6F 6D 00 68 74 74 70 73 3A 2F 2F 72 61 73 70 62 om.https://raspb00006760 : 65 72 72 79 70 69 2E 63 6F 6D 2F 64 65 76 69 63 errypi.com/devic00006770 : 65 2F 52 50 32 3F 76 65 72 73 69 6F 6E 3D 01 78 e/RP2?version=.x00006780 : 78 78 78 78 78 78 78 78 78 78 00 52 61 73 70 62 xxxxxxxxxx.Raspb00006790 : 65 72 72 79 20 50 69 20 52 50 32 33 35 30 00 52 erry.Pi.RP2350.R000067A0 : 50 49 00 31 00 63 72 69 76 65 6E 73 00 00 00 00 PI.1.crivens....000067B0 : 43 67 53 67 53 67 98 67 8B 67 B0 67 75 69 3E 69 CgSgSg.g.g.gui>i000067C0 : 3C 68 74 6D 6C 3E 3C 68 65 61 64 3E 3C 6D 65 74 <html><head><met000067D0 : 61 20 68 74 74 70 2D 65 71 75 69 76 3D 22 72 65 a.http-equiv="re000067E0 : 66 72 65 73 68 22 20 63 6F 6E 74 65 6E 74 3D 22 fresh".content="000067F0 : 30 3B 55 52 4C 3D 27 27 22 2F 3E 3C 2F FA 36 62 0;URL=''"/></.6b00006800 : 6F 64 79 3E 52 65 64 69 72 65 63 74 69 6E 67 20 ody>Redirecting.00006810 : 74 6F 20 3C FD 48 72 65 66 FD 29 3E 3C 2F 61 FD to.<.Href.)></a.00006820 : 2B 62 FC 25 3C 2F FB 6E B6 67 78 69 43 69 55 46 +b.%</.n.gxiCiUF00006830 : 32 20 42 6F 6F 74 6C 6F 61 64 65 72 20 76 31 2E 2.Bootloader.v1.00006840 : 30 0A 4D 6F 64 65 6C 3A 20 0A 42 6F 61 72 64 2D 0.Model:..Board-00006850 : 49 44 FD 0B 20 0A 10 50 94 0A 10 50 0E 6A 00 00 ID.....P...P.j..00006860 : 1B 6A 00 00 08 0B 10 50 28 0A 10 50 70 09 10 50 .j.....P(..Pp..P00006870 : 15 4D 00 00 0A 00 FC 01 03 06 00 00 08 00 02 00 .M..............00006880 : 01 09 02 37 00 02 01 00 80 19 09 04 00 00 02 08 ...7............00006890 : 06 50 00 07 05 81 02 40 00 00 07 05 02 02 40 00 .P.....@......@.000068A0 : 00 09 04 01 00 02 FF 00 00 00 07 05 03 02 40 00 ..............@.000068B0 : 00 07 05 84 02 40 00 00 12 01 10 02 00 00 00 40 .....@.........@000068C0 : 8A 2E 0F 00 00 01 01 02 03 01 14 00 03 00 57 49 ..............WI000068D0 : 4E 55 53 42 80 04 01 28 44 65 76 69 63 65 49 6E NUSB...(DeviceIn000068E0 : 74 65 72 66 61 63 65 47 55 49 44 00 4E 7B 62 63 terfaceGUID.N{bc000068F0 : 37 33 39 38 63 31 2D 37 33 63 64 2D 34 63 62 37 7398c1-73cd-4cb700006900 : 2D 39 38 62 38 2D 39 31 33 61 38 66 63 61 37 62 -98b8-913a8fca7b00006910 : 66 36 7D 00 00 00 00 01 00 01 0C 00 03 08 00 20 f6}.............00006920 : 08 80 40 08 80 80 00 00 10 00 00 02 04 00 03 04 ..@.............00006930 : 00 04 10 00 00 10 B0 05 05 D0 06 05 D0 07 03 74 ...............t00006940 : 12 02 29 02 27 01 0B 20 F6 01 28 00 64 00 00 25 ..).'.....(.d..%00006950 : 39 00 FB 01 25 F9 08 49 4E 44 45 58 FD 25 48 54 9...%..INDEX.%HT00006960 : 4D 21 F2 20 02 F9 20 46 4F 5F 55 46 32 54 58 54 M!.....FO_UF2TXT00006970 : F1 20 03 FB 49 0D 0C 0C 0F 0E EB 3C 90 4D 53 57 ....I......<.MSW00006980 : 49 4E 34 2E 31 00 02 08 01 00 02 00 02 00 00 F8 IN4.1...........00006990 : 81 00 01 00 01 00 01 00 00 00 FF FF 03 00 00 00 ................000069A0 : 29 00 00 00 00 20 20 20 20 20 20 20 20 20 20 20 )...............000069B0 : 46 41 54 31 36 20 20 20 EB FE 00 08 08 08 0A 0B FAT16...........00006A00 : 65 9D 9E 64 8A 9F 00 00 03 06 00 00 01 00 52 61 e..d..........Ra00006A10 : 73 70 62 65 72 72 79 20 50 69 00 52 50 32 33 35 spberry.Pi.RP23500006A20 : 30 20 42 6F 6F 74 00 00 BE 00 BE 00 F8 6A F8 6A 0.Boot.......j.j
Statistics: Posted by hippy — Mon Dec 09, 2024 3:49 pm