1 Harmony 3 Peripheral Library Application Examples for PIC32CM LE/LS Family

The following applications are provided to demonstrate the typical or interesting usage models of one or more peripheral libraries.

NameDescription
AC SleepwalkingThis example application shows how to use the AC Peripheral library to perform a single shot comparison in standby sleep mode periodically and wake up the device at the end of a successful comparison
ADC DMA SleepwalkingThis application shows how to configure the ADC in a sleepwalking operation, where the input voltage is measured at a fixed interval, and then the device is woken from sleep after conversion of 16 samples
ADC SampleThis example application shows how to sample an analog input using the ADC and displays the converted samples on a serial terminal
ADC Window SleepwalkingThis application shows how to configure ADC in a sleepwalking operation, where input voltage is measured at a fixed interval, but device is not woken from sleep until the measured value is below a given threshold
CCL Manchester EncoderThis example application shows how to use the CCL peripheral library and generate a Manchester-encoded output
Clock ConfigurationThis example application shows how to configure the clock system to run the device at maximum frequency. It also outputs a prescaled clock signal on a GPIO pin for measurement and verification
DAC Waveform GenerationThis example application shows how to use the DAC to generate a 1 kHz Sine or Sawtooth wave with a lookup table
DAC Waveform Generation with DMAThis example application shows how to use the DAC with the DMA to generate a 5 kHz sinusoidal waveform without CPU intervention
DMAC Memory TransferThis example application demonstrates how to use the DMAC peripheral to do a memory to memory transfer
DMAC USART EchoThis example application demonstrates USART transfer with DMA to receive 10 bytes and echo back the received bytes
DSU Compute CRC32This example application demonstrates how to use the DSU Peripheral library to compute 32-bit Cyclic Redundancy Checksum (CRC)
EIC InterruptThis example application demonstrates how to generate interrupt using the EIC on switch press and indicate it through an LED
EVSYS TriggerThis example application demonstrates how to use the EVSYS Peripheral library to setup autonomous, low-latency and configurable communication between peripherals
FREQM MeasurementThis example application demonstrates how to use the FREQM peripheral to measure the frequency of the internal RC Oscillator
NVMCTRL Data Flash with Silent Access and RTC Tamper DetectionThis example application displays the Data Flash content on a console which is refreshed every seconds. The Silent Access and Tamper Erase security features of the Data Flash are enabled
NVMCTRL Data FlashThis example application demonstrates code execution from the main Flash memory while performing erase operation in data flash section
NVMCTRL Read WriteThis example application demonstrates how to use the NVMCTRL to erase and program the internal Flash memory
OPAMP ADC GainThis application shows how OPAMP can be used as gain stage for the internal ADC peripheral
PM Low-Power FeaturesThis example highlights the power consumption for each sleep mode based on the same application integration
PM Wakeup Using EICThis application demonstrates entering the low power modes and exiting it using the EIC
PM Wakeup Using RTCThis example demonstrates entering the low power modes and exiting it using the RTC
PORT PollingThis example application demonstrate how to poll the switch input, and indicate the switch status using the LED
RSTC Reset CauseThis example shows how to use the RSTC peripheral to indicate the cause of the device reset
RTC Alarm InterruptThis example shows how to use the RTC to configure the time and generate the alarm
RTC Periodic InterruptThis example application shows how to use the RTC to generate periodic interrupts
RTC Tamper DetectThis example application shows how to configure and use tamper detect feature of RTC
SERCOM I2C EEPROM Read WriteThis example application demonstrates how to use the SERCOM peripheral to write and read from the I2C serial EEPROM memory
SERCOM I2C EEPROM Emulation (I2C Slave)This example application demonstrates how to use the SERCOM peripheral in slave mode
SERCOM SPI EEPROM Read WriteThis example application demonstrates how to use the SERCOM SPI peripheral to write and read from the SPI serial EEPROM memory
SERCOM SPI Ping Pong with DMAThis example demonstrates how to continuously transmit and receive data over a SPI interface using ping pong buffers with DMA
SERCOM USART BlockingThis example application demonstrates how to use the SERCOM peripheral in USART mode to transfer block of data in a blocking manner
SERCOM USART InterruptThis example application demonstrates how to use the SERCOM peripheral in USART mode to transfer data in a non-blocking manner
SERCOM USART Ring BufferThis example application demonstrates how to use the SERCOM peripheral in USART ring buffer mode to transfer data in a non-blocking manner
SERCOM USART Start of Frame (SOF) InterruptThis example application demonstrates how to use the SERCOM peripheral in USART ring buffer mode with SoF to wake-up device from sleep mode
Systick Periodic InterruptThis example shows how to use the SysTick to generate periodic interrupts
TC Capture ModeThis example shows how to use the TC module in capture mode to measure duty cycle and frequency of an external input
TC Compare ModeThis example shows how to use the TC module in compare mode to generate an active low, active high, and toggle output on compare match
TC Timer ModeThis example shows how to use the TC module in timer mode to generate periodic interrupt
TCC PWM GenerationThis example application shows how to use the TCC to generate a 2 or 3 phase PWM signals for motor control with dead time
TRAM Erase on Tamper DetectThis example application shows how to configure and use tamper detect feature of RTC and TrustRam
TRAM with Security Features DemonstrationThis example application displays the TrustRAM content on a console which is refreshed every seconds. This example allows to experiment static and dynamic tamper detections coupled with a TrustRAM full erase
TRNG Random NumberThis example shows how to use the TRNG Peripheral library to generate and read a random number
TrustZone EIC Pin Toggle - PIC32CMLS00This example application demonstrates handling of external pin interrupt in secure and non-secure project
TrustZone EIC Pin Toggle - PIC32CMLS60This example application demonstrates handling of external pin interrupt in secure and non-secure project
TrustZone EVSYS Trigger - PIC32CMLS00This example application demonstrates peripheral event handling with event system in secure and non-secure project
TrustZone EVSYS Trigger - PIC32CMLS60This example application demonstrates peripheral event handling with event system in secure and non-secure project
TrustZone Data Flash Scrambling and RTC Tamper Detection - PIC32CMLS00This example application displays the Data Flash content on a console which is refreshed every seconds. The Data Flash Scrambling and Tamper Erase security features of the Data Flash are enabled
TrustZone Data Flash Scrambling and RTC Tamper Detection - PIC32CMLS60This example application displays the Data Flash content on a console which is refreshed every seconds. The Data Flash Scrambling and Tamper Erase security features of the Data Flash are enabled
TrustZone Silent Access and RTC Tamper Detection - PIC32CMLS00This example application displays the Data Flash content on a console which is refreshed every seconds. The Silent Access and Tamper Erase security features of the Secure Data Flash are enabled
TrustZone Silent Access and RTC Tamper Detection - PIC32CMLS60This example application displays the Data Flash content on a console which is refreshed every seconds. The Silent Access and Tamper Erase security features of the Secure Data Flash are enabled
TrustZone Low-Power Features - PIC32CMLS00This example highlights the power consumption for each sleep mode based on the same application integration
TrustZone Low-Power Features - PIC32CMLS60This example highlights the power consumption for each sleep mode based on the same application integration
TrustZone SERCOM USART Start of Frame (SOF) Interrupt - PIC32CMLS00This example application demonstrates how to use the SERCOM peripheral in USART ring buffer mode with SoF to wake-up device from sleep mode
TrustZone SERCOM USART Start of Frame (SOF) Interrupt - PIC32CMLS60This example application demonstrates how to use the SERCOM peripheral in USART ring buffer mode with SoF to wake-up device from sleep mode
TrustZone Systick Periodic Timeout - PIC32CMLS00This example application shows how to use the SysTick to generate periodic interrupts on both Secure and Non-secure modes
TrustZone Systick Periodic Timeout - PIC32CMLS60This example application shows how to use the SysTick to generate periodic interrupts on both Secure and Non-secure modes
TrustZone Non-Secure TC Demonstration - PIC32CMLS00This example application performs a PWM signal applied on PC19 pin (LED0) based on TC0 peripheral
TrustZone Non-Secure TC Demonstration - PIC32CMLS60This example application performs a PWM signal applied on PC19 pin (LED0) based on TC0 peripheral
TrustZone Secure TC Demonstration - PIC32CMLS00This example application performs a PWM signal applied on PC19 pin (LED0) based on TC0 peripheral
TrustZone Secure TC Demonstration - PIC32CMLS60This example application performs a PWM signal applied on PC19 pin (LED0) based on TC0 peripheral
TrustZone Secure TrustRAM Demonstration - PIC32CMLS00This example application displays the TrustRAM content on a console which is refreshed every seconds. This example allows to experiment static and dynamic tamper detections coupled with a TrustRAM full erase
TrustZone Secure TrustRAM Demonstration - PIC32CMLS60This example application displays the TrustRAM content on a console which is refreshed every seconds. This example allows to experiment static and dynamic tamper detections coupled with a TrustRAM full erase
TrustZone Basic Demonstration - PIC32CMLS00This example application performs Add and Multiply Math operations in secure mode and I/O operations in non-secure mode
TrustZone Basic Demonstration - PIC32CMLS60This example application performs Add and Multiply Math operations in secure mode and I/O operations in non-secure mode
TrustZone Basic with Secure Boot Demonstration - PIC32CMLS00This example application performs Add and Multiply math operations in Secure Flash BOOT and APPLICATION regions called through veneers in Non Secure Flash APPLICATION region. The LED0 (Green) is switched on in Boot Secure application and the LED1 (Red) in Secure application
TrustZone Basic with Secure Boot Demonstration - PIC32CMLS60This example application performs Add and Multiply math operations in Secure Flash BOOT and APPLICATION regions called through veneers in Non Secure Flash APPLICATION region. The LED0 (Green) is switched on in Boot Secure application and the LED1 (Red) in Secure application
WDT TimeoutThis example shows how to generate a Watchdog timer reset by emulating a deadlock