<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Debug in ROP_LEVEL1 in MCX Microcontrollers</title>
    <link>https://community.nxp.com/t5/MCX-Microcontrollers/Debug-in-ROP-LEVEL1/m-p/2104415#M3065</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/103066"&gt;@salvalatorre&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;Please use the Set_FA_Mode command.&amp;nbsp;Combine with&amp;nbsp;SPSDK. If you have&amp;nbsp;installed&amp;nbsp;the Secure Provisioning Tool, you can directly access the SPSDK within it.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Alice_Yang_0-1748256716216.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/339714i6053CF87FBD1C58A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Alice_Yang_0-1748256716216.png" alt="Alice_Yang_0-1748256716216.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR&lt;/P&gt;
&lt;P&gt;Alice&lt;/P&gt;</description>
    <pubDate>Mon, 26 May 2025 10:52:07 GMT</pubDate>
    <dc:creator>Alice_Yang</dc:creator>
    <dc:date>2025-05-26T10:52:07Z</dc:date>
    <item>
      <title>Debug in ROP_LEVEL1</title>
      <link>https://community.nxp.com/t5/MCX-Microcontrollers/Debug-in-ROP-LEVEL1/m-p/2103174#M3055</link>
      <description>&lt;P&gt;After reading the insightful article &lt;A href="https://community.nxp.com/t5/MCX-Microcontrollers-Knowledge/MCXA153-Read-Out-Protection/ta-p/1796330" target="_blank" rel="noopener"&gt;MCXA153 Read Out Protection, i&lt;/A&gt;t is clear to me that, once ROP1 or ROP2 is entered, it is possible to return the device to an unprotected state (ROP0) by performing a mass erase. However, we are particularly interested in the possibility of disabling the protection temporarily without erasing the flash memory, in order to debug units returned through RMA.&lt;/P&gt;&lt;P&gt;We have successfully implemented a secure workflow using a secret key configured during production with other microcontrollers, such as those in the Kinetis and iMXRT families. This key allows us to later disable protection temporarily for debugging purposes, without losing the contents of the flash memory.&lt;/P&gt;&lt;P&gt;Is there any similar mechanism or recommended approach for MCXA devices that would allow us to achieve this?&lt;/P&gt;&lt;P&gt;A footnote in the previous mentionted article to the image in section IV states: &lt;SPAN&gt;ROP1 Debug is disabled, but can be enabled by user application code.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;That is exactly what I would like to do, but I don't know which way the application code can enable access through the debug port.&lt;/P&gt;&lt;P&gt;Could someone kindly provide me with documentation explaining this?&lt;/P&gt;</description>
      <pubDate>Fri, 23 May 2025 05:48:25 GMT</pubDate>
      <guid>https://community.nxp.com/t5/MCX-Microcontrollers/Debug-in-ROP-LEVEL1/m-p/2103174#M3055</guid>
      <dc:creator>salvalatorre</dc:creator>
      <dc:date>2025-05-23T05:48:25Z</dc:date>
    </item>
    <item>
      <title>Re: Debug in ROP_LEVEL1</title>
      <link>https://community.nxp.com/t5/MCX-Microcontrollers/Debug-in-ROP-LEVEL1/m-p/2104415#M3065</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/103066"&gt;@salvalatorre&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;Please use the Set_FA_Mode command.&amp;nbsp;Combine with&amp;nbsp;SPSDK. If you have&amp;nbsp;installed&amp;nbsp;the Secure Provisioning Tool, you can directly access the SPSDK within it.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Alice_Yang_0-1748256716216.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/339714i6053CF87FBD1C58A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Alice_Yang_0-1748256716216.png" alt="Alice_Yang_0-1748256716216.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR&lt;/P&gt;
&lt;P&gt;Alice&lt;/P&gt;</description>
      <pubDate>Mon, 26 May 2025 10:52:07 GMT</pubDate>
      <guid>https://community.nxp.com/t5/MCX-Microcontrollers/Debug-in-ROP-LEVEL1/m-p/2104415#M3065</guid>
      <dc:creator>Alice_Yang</dc:creator>
      <dc:date>2025-05-26T10:52:07Z</dc:date>
    </item>
    <item>
      <title>Re: Debug in ROP_LEVEL1</title>
      <link>https://community.nxp.com/t5/MCX-Microcontrollers/Debug-in-ROP-LEVEL1/m-p/2104479#M3066</link>
      <description>Hello &lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/27788"&gt;@Alice_Yang&lt;/a&gt;,&lt;BR /&gt;&lt;BR /&gt;1. I thought that FA Mode does not keep the memory's content (the article "MCXA153-Read-Out-Protection" says: without storing any IP assets) but we are looking for a opening protection mechanism that does keep so that we can analyze bugs by debugging the code inside.&lt;BR /&gt;&lt;BR /&gt;2. Is FA Mode reversible? The MCXA manual says “Fault Analysis mode to return to NXP factory”, but we don't want to send it to NXP. In the initial post I was referring to an RMA being returned to our factory for analysis by us, not NXP.&lt;BR /&gt;&lt;BR /&gt;3. In ROP1 mode, is it only possible to interact with the device ROM via ISP? The SWD port is more accessible in our products, so it would be a better option for us.&lt;BR /&gt;&lt;BR /&gt;BR&lt;BR /&gt;Salvador.</description>
      <pubDate>Mon, 26 May 2025 12:48:43 GMT</pubDate>
      <guid>https://community.nxp.com/t5/MCX-Microcontrollers/Debug-in-ROP-LEVEL1/m-p/2104479#M3066</guid>
      <dc:creator>salvalatorre</dc:creator>
      <dc:date>2025-05-26T12:48:43Z</dc:date>
    </item>
    <item>
      <title>Re: Debug in ROP_LEVEL1</title>
      <link>https://community.nxp.com/t5/MCX-Microcontrollers/Debug-in-ROP-LEVEL1/m-p/2106687#M3075</link>
      <description>&lt;P&gt;&lt;FONT face="times new roman,times"&gt;Hello &lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/103066"&gt;@salvalatorre&lt;/a&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;1. I thought that FA Mode does not keep the memory's content (the article "MCXA153-Read-Out-Protection" says: without storing any IP assets) but we are looking for a opening protection mechanism that does keep so that we can analyze bugs by debugging the code inside.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times" color="#3366FF"&gt;-&amp;gt;&amp;gt;Yes, FA mode does not keep memory, also masse erase.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;2. Is FA Mode reversible? The MCXA manual says “Fault Analysis mode to return to NXP factory”, but we don't want to send it to NXP. In the initial post I was referring to an RMA being returned to our factory for analysis by us, not NXP.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times" color="#3366FF"&gt;-&amp;gt;&amp;gt; Customers can also use FA mode, but as mentioned above, it will also erase the flash.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;3. In ROP1 mode, is it only possible to interact with the device ROM via ISP? The SWD port is more accessible in our products, so it would be a better option for us.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times" color="#3366FF"&gt;-&amp;gt;&amp;gt; No, the SWD port is disabled on ROP1-3. This read-out protection is a mechanism that allows users to enable the of protection in the system.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;FONT face="times new roman,times"&gt;BR&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times" color="#000000"&gt;Alice&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 29 May 2025 02:47:17 GMT</pubDate>
      <guid>https://community.nxp.com/t5/MCX-Microcontrollers/Debug-in-ROP-LEVEL1/m-p/2106687#M3075</guid>
      <dc:creator>Alice_Yang</dc:creator>
      <dc:date>2025-05-29T02:47:17Z</dc:date>
    </item>
    <item>
      <title>Re: Debug in ROP_LEVEL1</title>
      <link>https://community.nxp.com/t5/MCX-Microcontrollers/Debug-in-ROP-LEVEL1/m-p/2106839#M3076</link>
      <description>&lt;P&gt;Hello Alice,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;I understand that the protection is intended to prevent external access. However, it would be very useful if the program itself, after authenticated access through some means (e.g., serial port), could disable the protection without triggering a mass erase. This is possible with Kinetis and LPC microcontrollers, and would be a significant drawback to adopting the MCX.&lt;/P&gt;&lt;P&gt;A footnote to the image in section IV of the previously mentioned article states: "&lt;EM&gt;ROP1 Debug is disabled, but can be enabled &lt;STRONG&gt;by user application code&lt;/STRONG&gt;&lt;/EM&gt;."&lt;/P&gt;&lt;P&gt;That is exactly what I would like to do, but I don’t know how the application code can enable access through the debug port. Would you be so kind to tell me or point me to documentation where this is explained?&lt;BR /&gt;&lt;BR /&gt;Regards,&amp;nbsp;&lt;BR /&gt;Salvador.&lt;/P&gt;</description>
      <pubDate>Thu, 29 May 2025 06:25:51 GMT</pubDate>
      <guid>https://community.nxp.com/t5/MCX-Microcontrollers/Debug-in-ROP-LEVEL1/m-p/2106839#M3076</guid>
      <dc:creator>salvalatorre</dc:creator>
      <dc:date>2025-05-29T06:25:51Z</dc:date>
    </item>
    <item>
      <title>Re: Debug in ROP_LEVEL1</title>
      <link>https://community.nxp.com/t5/MCX-Microcontrollers/Debug-in-ROP-LEVEL1/m-p/2107863#M3082</link>
      <description>Sorry, I replied by mistake to my first post and my reply may have been missed:&lt;BR /&gt;&lt;BR /&gt;Hello Alice,&lt;BR /&gt;&lt;BR /&gt;I understand that the protection is intended to prevent external access. However, it would be very useful if the program itself, after authenticated access through some means (e.g., serial port), could disable the protection without triggering a mass erase. This is possible with Kinetis and LPC microcontrollers, and would be a significant drawback to adopting the MCX.&lt;BR /&gt;&lt;BR /&gt;A footnote to the image in section IV of the previously mentioned article states: "ROP1 Debug is disabled, but can be enabled by user application code". That is exactly what I would like to do, but I don’t know how the application code can enable access through the debug port. Would you be so kind to tell me or point me to documentation where this is explained? Enabling the debug port by registers, reprogramming ROP_LEVEL in CMPA... any mechanism that from the program allows enabling debug access (after gaining authorization) would be great.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Salvador.&lt;BR /&gt;</description>
      <pubDate>Fri, 30 May 2025 08:35:40 GMT</pubDate>
      <guid>https://community.nxp.com/t5/MCX-Microcontrollers/Debug-in-ROP-LEVEL1/m-p/2107863#M3082</guid>
      <dc:creator>salvalatorre</dc:creator>
      <dc:date>2025-05-30T08:35:40Z</dc:date>
    </item>
    <item>
      <title>Re: Debug in ROP_LEVEL1</title>
      <link>https://community.nxp.com/t5/MCX-Microcontrollers/Debug-in-ROP-LEVEL1/m-p/2109460#M3101</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/103066"&gt;@salvalatorre&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please refer to the code under&amp;nbsp; AN14525SW：&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.nxp.com/docs/en/application-note-software/AN14525SW.zip" target="_blank"&gt;https://www.nxp.com/docs/en/application-note-software/AN14525SW.zip&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;A href="https://docs.nxp.com/bundle/AN14525/page/topics/introduction.html" target="_blank"&gt;https://docs.nxp.com/bundle/AN14525/page/topics/introduction.html&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It includes the code to enable SWD .&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Alice_Yang_0-1748947936464.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/341098i473BBD5BAACD658A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Alice_Yang_0-1748947936464.png" alt="Alice_Yang_0-1748947936464.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR&lt;/P&gt;
&lt;P&gt;Alice&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2025 10:52:30 GMT</pubDate>
      <guid>https://community.nxp.com/t5/MCX-Microcontrollers/Debug-in-ROP-LEVEL1/m-p/2109460#M3101</guid>
      <dc:creator>Alice_Yang</dc:creator>
      <dc:date>2025-06-03T10:52:30Z</dc:date>
    </item>
  </channel>
</rss>

