|
gale 发表于 2013-4-12 17:42 
你可以看看DEVIATION固件,里面还有DUMP BOOTLOADER的代码,可以看出,DEVIATION作者也是对华科尔BOOTLOA ...
void dump_bootloader()
{
LCD_PrintStringXY(40, 10, "Dumping");
printf("Erase...\n");
SPIFlash_EraseSector(0x2000);
SPIFlash_EraseSector(0x3000);
SPIFlash_EraseSector(0x4000);
SPIFlash_EraseSector(0x5000);
printf("Pgm 2\n");
SPIFlash_WriteBytes(0x2000, 0x1000, (u8*)0x08000000);
printf("Pgm 3\n");
SPIFlash_WriteBytes(0x3000, 0x1000, (u8*)0x08001000);
printf("Pgm 4\n");
SPIFlash_WriteBytes(0x4000, 0x1000, (u8*)0x08002000);
printf("Pgm 5\n");
SPIFlash_WriteBytes(0x5000, 0x1000, (u8*)0x08003000);
printf("Done\n");
LCD_Clear(0x0000);
LCD_PrintStringXY(40, 10, "Done");
while(1)
{
if(PWR_CheckPowerSwitch())
PWR_Shutdown();
}
}
DEVIATION的固件是把内部FLASH中的程序拷贝到外部SPI口FLASH中,这样的话得到的是二进制代码,难道他反编译进行分析?高手呀。
|
欢迎继续阅读楼主其他信息
|