Development tools environment , Computer Engineering

Assignment Help:

Main Objectives:
• MPLAB In-Circuit Debugger (ICD 2) functionality
• ICD 2 Connection design
• MPLAB ICD 2 setup with the PC and Interface board designed
• I²C Protocol buses technologies

MPLAB In-Circuit Debugger (ICD 2)

The MPLAB ICD 2 debugger/programmer tool: is a low cost real-time debugger and programmer for selected PIC microcontrollers and dsPIC DSCs. The ICD 2 uses two dedicated hardware lines (PGC and PGD) or pins that control In Circuit Serial ProgrammingTM (ICSPTM) of the device and, afterwards, debugging through proprietary, on-chip firmware.
The features of ICD 2 debug are built into the microcontroller and activated by downloading the debug code into the target processor. Some shared overhead expenses are one stack level, general purpose file registers and a small area of program memory when in the debug mode.
The ICD 2 main functions are downloading programs into the microcontroller. The programs are executed in real time and examined in detail with the debug functions of MPLAB. Also set watch variables and breakpoints from symbolic labels in C or assembly source code, and single step through C source lines or into assembly code. MPLAB ICD 2 can also be used as a development programmer for supported MCUs.

ICD2 CONNECTOR

Main Objectives:

  1. To enable between the ICD2 connector and any suitable peripherals e.g. ICD2 Debugger
  2. Uploading data or codes into the PIC via the connector

This is a way of plugging a PIC into a standard computer (PC). A separate piece of hardware, called a "Programmer or ICD2 Debugger" is required to connect to one side of the PC I/O port to the PIC on the other side. There are other frequently used connectors such as the parallel port, serial port (COM port), the USB etc.

ICD2 CONNECTOR PIN OUT

Defining the pins of the connectors on an ICD2 cable as shown in Figure below:

                        1654_ICD2.png

                                FIGURE: ICD2 cable

The standard In- Circuit Debugger (ICD2) cable is wired so that the pins are flipped between the ends. In other words, pin 1 on one end is connected to pin 6 on the other end, pin 2 to pin 5, etc. The pin out of each end is shown in table 3 below:
Table : ICD 2 PIN OUTS

Signal

ICD2 end pin    

Target end pin

VPP/ MCLR

 

6

    1

VDD

5

    2

GND

4

    3

PGD

3

    4

PGC

2

    5

not connected

1

    6


Related Discussions:- Development tools environment

What are the page headers for secondary lists, What are the page headers fo...

What are the page headers for secondary lists? On secondary lists, the system does not show a standard page header and it does not trigger the event. TOP-OF-PAGE.  To make page

Capacity and performance of storage - computer architecture, Capacity: ...

Capacity: Raw capacity Total amount of stored information that a medium or storage device can hold is expressed as a quantity of bytes and bits (for example 10.4 megabyte

Operation of micro-programmed control unit, Micro-instructions are stored i...

Micro-instructions are stored in control memory. Address register for control memory comprises the address of subsequent instruction which is to be read. Control memory Buffer Regi

Cookies, basic purpose of cookies

basic purpose of cookies

Explain the importance of computer architecture, Explain the importance of ...

Explain the importance of computer architecture Studying the architecture implies working on machine language programs. However, this isn't practical when we design a computer

What is an event handler, An event handler is a part of a computer program ...

An event handler is a part of a computer program formed to tell the program how to act in response to a definite event.

Functions of an operating system, a) In multitasking Operating Systems, th...

a) In multitasking Operating Systems, there are two types of multitasking such as the "Preemptive Multitasking" and the "Cooperative Multitasking". Describe the two mentioned mult

State the various security tools, State the various Security Tools Sec...

State the various Security Tools Securing an Intranet is not a simple task. Just as articles in a house are protected by use of various types of security systems such as lock

Data hazards in computer architecture, Data hazards -  computer architec...

Data hazards -  computer architecture : A main effect of pipelining is to alter the relative timing of instructions by overlapping their execution. This introduces contro

Define bootstrap loader, Define bootstrap loader? The ROM portion of ma...

Define bootstrap loader? The ROM portion of main memory is required for storing an initial program known as bootstrap loader. It is a program whose function is to start the com

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd