2.1 Overview of the Programming Process

Figure 2-1 shows a high-level overview of the ICSP programming process. After entering ICSP mode, the first action is to Bulk Erase the code memory. Next, the code memory is programmed, followed by the device Configuration bits. The code memory (including the Configuration bits) is then verified to ensure that programming was successful. Then, programming the code-protect Configuration bits can be done if required.

Figure 2-1. High-Level ICSP™ Programming Flow