1.20 MCRAMC Erase On Tamper Detect

This example application demonstrates how to test the SRAM using the MCRAMC ECC feature on internal SRAM memory..

Description

This example uses the MCRAMC to test its ECC with Fault Injection feature. This application writes a 32-bit data in SRAM for single and double error injection to highlight SEC and DED process.

Downloading and Building the Application

To clone or download this application from Github, go to the main page of this repository and then click Clone button to clone this repository or download as zip file. This content can also be downloaded using content manager by following these instructions.

Path of the application within the repository is apps/mcramc/mcramc_ecc_testing.X.

To build the application, refer to the following table and open the project using its IDE.

Project NameDescription
pic32cz_ca80_curiosity_ultra.XMPLABX project for PIC32CZ CA80 Curiosity Ultra Board

Setting Up the Hardware

The following table shows the target hardware for the application projects.

Project NameBoard
pic32cz_ca80_curiosity_ultra.XPIC32CZ CA80 Curiosity Ultra Board

Setting Up PIC32CZ CA80 Curiosity Ultra Board

  • Connect the Debug USB port on the board to the computer using a micro USB cable

Running the Application

  1. Open the Terminal application (Ex.: Tera term) on the computer
  2. Connect to the PKOB4 Virtual COM port and configure the serial settings as follows:
    • Baud : 115200
    • Data : 8 Bits
    • Parity : None
    • Stop : 1 Bit
    • Flow Control : None
  3. Build and Program the application using its IDE
  4. Application Menu is displayed with following choices:
  5. 'a': Single Fault Injection is chosen and following message is displayed on console:
    'b': Double Fault Injection is chosen and following message is displayed on console:
    The on-board LED blinks each time a SERR interrupt occurs.