1 Harmony 3 Peripheral Library Application Examples for PIC32CM LE/LS Family
The following applications are provided to demonstrate the typical or interesting usage models of one or more peripheral libraries.
Name | Description |
---|---|
AC Sleepwalking | This example application shows how to use the AC Peripheral library to perform a single shot comparison in standby sleep mode periodically and wake up the device at the end of a successful comparison |
ADC DMA Sleepwalking | This application shows how to configure the ADC in a sleepwalking operation, where the input voltage is measured at a fixed interval, and then the device is woken from sleep after conversion of 16 samples |
ADC Sample | This example application shows how to sample an analog input using the ADC and displays the converted samples on a serial terminal |
ADC Window Sleepwalking | This application shows how to configure ADC in a sleepwalking operation, where input voltage is measured at a fixed interval, but device is not woken from sleep until the measured value is below a given threshold |
CCL Manchester Encoder | This example application shows how to use the CCL peripheral library and generate a Manchester-encoded output |
Clock Configuration | This example application shows how to configure the clock system to run the device at maximum frequency. It also outputs a prescaled clock signal on a GPIO pin for measurement and verification |
DAC Waveform Generation | This example application shows how to use the DAC to generate a 1 kHz Sine or Sawtooth wave with a lookup table |
DAC Waveform Generation with DMA | This example application shows how to use the DAC with the DMA to generate a 5 kHz sinusoidal waveform without CPU intervention |
DMAC Memory Transfer | This example application demonstrates how to use the DMAC peripheral to do a memory to memory transfer |
DMAC USART Echo | This example application demonstrates USART transfer with DMA to receive 10 bytes and echo back the received bytes |
DSU Compute CRC32 | This example application demonstrates how to use the DSU Peripheral library to compute 32-bit Cyclic Redundancy Checksum (CRC) |
EIC Interrupt | This example application demonstrates how to generate interrupt using the EIC on switch press and indicate it through an LED |
EVSYS Trigger | This example application demonstrates how to use the EVSYS Peripheral library to setup autonomous, low-latency and configurable communication between peripherals |
FREQM Measurement | This example application demonstrates how to use the FREQM peripheral to measure the frequency of the internal RC Oscillator |
NVMCTRL Data Flash with Silent Access and RTC Tamper Detection | This example application displays the Data Flash content on a console which is refreshed every seconds. The Silent Access and Tamper Erase security features of the Data Flash are enabled |
NVMCTRL Data Flash | This example application demonstrates code execution from the main Flash memory while performing erase operation in data flash section |
NVMCTRL Read Write | This example application demonstrates how to use the NVMCTRL to erase and program the internal Flash memory |
OPAMP ADC Gain | This application shows how OPAMP can be used as gain stage for the internal ADC peripheral |
PM Low-Power Features | This example highlights the power consumption for each sleep mode based on the same application integration |
PM Wakeup Using EIC | This application demonstrates entering the low power modes and exiting it using the EIC |
PM Wakeup Using RTC | This example demonstrates entering the low power modes and exiting it using the RTC |
PORT Polling | This example application demonstrate how to poll the switch input, and indicate the switch status using the LED |
RSTC Reset Cause | This example shows how to use the RSTC peripheral to indicate the cause of the device reset |
RTC Alarm Interrupt | This example shows how to use the RTC to configure the time and generate the alarm |
RTC Periodic Interrupt | This example application shows how to use the RTC to generate periodic interrupts |
RTC Tamper Detect | This example application shows how to configure and use tamper detect feature of RTC |
SERCOM I2C EEPROM Read Write | This example application demonstrates how to use the SERCOM peripheral to write and read from the I2C serial EEPROM memory |
SERCOM I2C EEPROM Emulation (I2C Slave) | This example application demonstrates how to use the SERCOM peripheral in slave mode |
SERCOM SPI EEPROM Read Write | This example application demonstrates how to use the SERCOM SPI peripheral to write and read from the SPI serial EEPROM memory |
SERCOM SPI Ping Pong with DMA | This example demonstrates how to continuously transmit and receive data over a SPI interface using ping pong buffers with DMA |
SERCOM USART Blocking | This example application demonstrates how to use the SERCOM peripheral in USART mode to transfer block of data in a blocking manner |
SERCOM USART Interrupt | This example application demonstrates how to use the SERCOM peripheral in USART mode to transfer data in a non-blocking manner |
SERCOM USART Ring Buffer | This example application demonstrates how to use the SERCOM peripheral in USART ring buffer mode to transfer data in a non-blocking manner |
SERCOM USART Start of Frame (SOF) Interrupt | This example application demonstrates how to use the SERCOM peripheral in USART ring buffer mode with SoF to wake-up device from sleep mode |
Systick Periodic Interrupt | This example shows how to use the SysTick to generate periodic interrupts |
TC Capture Mode | This example shows how to use the TC module in capture mode to measure duty cycle and frequency of an external input |
TC Compare Mode | This example shows how to use the TC module in compare mode to generate an active low, active high, and toggle output on compare match |
TC Timer Mode | This example shows how to use the TC module in timer mode to generate periodic interrupt |
TCC PWM Generation | This example application shows how to use the TCC to generate a 2 or 3 phase PWM signals for motor control with dead time |
TRAM Erase on Tamper Detect | This example application shows how to configure and use tamper detect feature of RTC and TrustRam |
TRAM with Security Features Demonstration | This example application displays the TrustRAM content on a console which is refreshed every seconds. This example allows to experiment static and dynamic tamper detections coupled with a TrustRAM full erase |
TRNG Random Number | This example shows how to use the TRNG Peripheral library to generate and read a random number |
TrustZone EIC Pin Toggle - PIC32CMLS00 | This example application demonstrates handling of external pin interrupt in secure and non-secure project |
TrustZone EIC Pin Toggle - PIC32CMLS60 | This example application demonstrates handling of external pin interrupt in secure and non-secure project |
TrustZone EVSYS Trigger - PIC32CMLS00 | This example application demonstrates peripheral event handling with event system in secure and non-secure project |
TrustZone EVSYS Trigger - PIC32CMLS60 | This example application demonstrates peripheral event handling with event system in secure and non-secure project |
TrustZone Data Flash Scrambling and RTC Tamper Detection - PIC32CMLS00 | This example application displays the Data Flash content on a console which is refreshed every seconds. The Data Flash Scrambling and Tamper Erase security features of the Data Flash are enabled |
TrustZone Data Flash Scrambling and RTC Tamper Detection - PIC32CMLS60 | This example application displays the Data Flash content on a console which is refreshed every seconds. The Data Flash Scrambling and Tamper Erase security features of the Data Flash are enabled |
TrustZone Silent Access and RTC Tamper Detection - PIC32CMLS00 | This example application displays the Data Flash content on a console which is refreshed every seconds. The Silent Access and Tamper Erase security features of the Secure Data Flash are enabled |
TrustZone Silent Access and RTC Tamper Detection - PIC32CMLS60 | This example application displays the Data Flash content on a console which is refreshed every seconds. The Silent Access and Tamper Erase security features of the Secure Data Flash are enabled |
TrustZone Low-Power Features - PIC32CMLS00 | This example highlights the power consumption for each sleep mode based on the same application integration |
TrustZone Low-Power Features - PIC32CMLS60 | This example highlights the power consumption for each sleep mode based on the same application integration |
TrustZone SERCOM USART Start of Frame (SOF) Interrupt - PIC32CMLS00 | This example application demonstrates how to use the SERCOM peripheral in USART ring buffer mode with SoF to wake-up device from sleep mode |
TrustZone SERCOM USART Start of Frame (SOF) Interrupt - PIC32CMLS60 | This example application demonstrates how to use the SERCOM peripheral in USART ring buffer mode with SoF to wake-up device from sleep mode |
TrustZone Systick Periodic Timeout - PIC32CMLS00 | This example application shows how to use the SysTick to generate periodic interrupts on both Secure and Non-secure modes |
TrustZone Systick Periodic Timeout - PIC32CMLS60 | This example application shows how to use the SysTick to generate periodic interrupts on both Secure and Non-secure modes |
TrustZone Non-Secure TC Demonstration - PIC32CMLS00 | This example application performs a PWM signal applied on PC19 pin (LED0) based on TC0 peripheral |
TrustZone Non-Secure TC Demonstration - PIC32CMLS60 | This example application performs a PWM signal applied on PC19 pin (LED0) based on TC0 peripheral |
TrustZone Secure TC Demonstration - PIC32CMLS00 | This example application performs a PWM signal applied on PC19 pin (LED0) based on TC0 peripheral |
TrustZone Secure TC Demonstration - PIC32CMLS60 | This example application performs a PWM signal applied on PC19 pin (LED0) based on TC0 peripheral |
TrustZone Secure TrustRAM Demonstration - PIC32CMLS00 | This example application displays the TrustRAM content on a console which is refreshed every seconds. This example allows to experiment static and dynamic tamper detections coupled with a TrustRAM full erase |
TrustZone Secure TrustRAM Demonstration - PIC32CMLS60 | This example application displays the TrustRAM content on a console which is refreshed every seconds. This example allows to experiment static and dynamic tamper detections coupled with a TrustRAM full erase |
TrustZone Basic Demonstration - PIC32CMLS00 | This example application performs Add and Multiply Math operations in secure mode and I/O operations in non-secure mode |
TrustZone Basic Demonstration - PIC32CMLS60 | This example application performs Add and Multiply Math operations in secure mode and I/O operations in non-secure mode |
TrustZone Basic with Secure Boot Demonstration - PIC32CMLS00 | This example application performs Add and Multiply math operations in Secure Flash BOOT and APPLICATION regions called through veneers in Non Secure Flash APPLICATION region. The LED0 (Green) is switched on in Boot Secure application and the LED1 (Red) in Secure application |
TrustZone Basic with Secure Boot Demonstration - PIC32CMLS60 | This example application performs Add and Multiply math operations in Secure Flash BOOT and APPLICATION regions called through veneers in Non Secure Flash APPLICATION region. The LED0 (Green) is switched on in Boot Secure application and the LED1 (Red) in Secure application |
WDT Timeout | This example shows how to generate a Watchdog timer reset by emulating a deadlock |