Downloads and runs but wont let me debug.
Found Cortex-M33 r0p3, Little endian.
Cortex-M (ARMv8-M and later): The connected J-Link (S/N 59100629) uses an old firmware module that does not handle I/D-cache correctly. Proper debugging functionality cannot be guaranteed if cache is enabled
FPUnit: 8 code (BP) slots and 0 literal slots
Security extension: not implemented
CoreSight components:
ROMTbl[0] @ E00FE000
[0][0]: E00FF000 CID B105100D PID 000BB4C9 ROM Table
ROMTbl[1] @ E00FF000
[1][0]: E000E000 CID B105900D PID 000BBD21 DEVARCH 47702A04 DEVTYPE 00 Cortex-M33
[1][1]: E0001000 CID B105900D PID 000BBD21 DEVARCH 47701A02 DEVTYPE 00 DWT
[1][2]: E0002000 CID B105900D PID 000BBD21 DEVARCH 47701A03 DEVTYPE 00 FPB
[1][3]: E0000000 CID B105900D PID 000BBD21 DEVARCH 47701A01 DEVTYPE 43 ITM
[0][1]: E0040000 CID B105900D PID 000BBD21 DEVARCH 00000000 DEVTYPE 11 TPIU
SetupTarget() start
Disabling flash programming optimizations: Compare, SkipBlankDataOnProg
SetupTarget() end - Took 1.22ms
Connected to target
Waiting for GDB connection...Connected to 127.0.0.1
Reading all registers
WARNING: Failed to read memory @ address 0x00000000
Connected to 127.0.0.1
Reading all registers
WARNING: Failed to read memory @ address 0x00000000
Received monitor command: reset
ResetTarget() start
Reset strategy selected in debugger ignored. Performing device specific reset.
No valid application in flash: Wait until the bootloader is done.
CPU halted successfully after enabling debug access
Reset handler addr: 0x00000000
ROM entered ISP command handling loop. Re-enable the debug access.
CPU halted successfully after enabling debug access
ResetTarget() end - Took 423ms
Resetting target
Downloading 15952 bytes @ address 0x00000000 - Verified OK
Downloading 16112 bytes @ address 0x00003E50 - Verified OK
Downloading 900 bytes @ address 0x00007D40 - Verified OK
Downloading 100 bytes @ address 0x000080C4 - Verified OK
J-Link: Flash download: Bank 0 @ 0x00000000: 1 range affected (33280 bytes)
J-Link: Flash download: Total: 0.909s (Prepare: 0.204s, Erase: 0.070s, Program & Verify: 0.576s, Restore: 0.057s)
J-Link: Flash download: Program & Verify speed: 56 KB/s
Writing register (PC = 0x 180)
Read 4 bytes @ address 0x00000180 (Data = 0x4B13B672)
Reading 64 bytes @ address 0x00000180
Read 2 bytes @ address 0x00000180 (Data = 0xB672)
Reading 64 bytes @ address 0x00002180
Read 2 bytes @ address 0x00002182 (Data = 0x1DBB)
Reading 64 bytes @ address 0x000017C0
Read 2 bytes @ address 0x00001830 (Data = 0x224C)
Read 2 bytes @ address 0x00001846 (Data = 0x4913)
Read 2 bytes @ address 0x0000181A (Data = 0x224C)
Reading 64 bytes @ address 0x00001D00
Read 4 bytes @ address 0x00001DFC (Data = 0x20004958)
Read 2 bytes @ address 0x00001D02 (Data = 0x4B3E)
Reading 64 bytes @ address 0x00006240
Read 2 bytes @ address 0x000062A4 (Data = 0xF107)
Read 4 bytes @ address 0x00000180 (Data = 0x4B13B672)
Read 2 bytes @ address 0x00000180 (Data = 0xB672)
Read 2 bytes @ address 0x00002182 (Data = 0x1DBB)
Read 2 bytes @ address 0x00001830 (Data = 0x224C)
Read 2 bytes @ address 0x00001846 (Data = 0x4913)
Read 2 bytes @ address 0x0000181A (Data = 0x224C)
Read 4 bytes @ address 0x00001DFC (Data = 0x20004958)
Read 2 bytes @ address 0x00001D02 (Data = 0x4B3E)
Read 2 bytes @ address 0x000062A4 (Data = 0xF107)
Reading all registers
Read 4 bytes @ address 0x00000180 (Data = 0x4B13B672)
Read 2 bytes @ address 0x00006276 (Data = 0xF507)
Received monitor command: exec SetRestartOnClose=1
Executed SetRestartOnClose=1
Received monitor command: reset
ResetTarget() start
Reset strategy selected in debugger ignored. Performing device specific reset.
Reset handler addr: 0x00000180
ROM entered ISP command handling loop. Re-enable the debug access.
CPU halted successfully after enabling debug access
ResetTarget() end - Took 214ms
Resetting target
Reading 64 bytes @ address 0x00000000
Reading 64 bytes @ address 0x00000040
Reading 64 bytes @ address 0x00000080
Setting breakpoint @ address 0x00000180, Size = 2, BPHandle = 0x0001
Setting breakpoint @ address 0x00002182, Size = 2, BPHandle = 0x0002
Setting breakpoint @ address 0x00006276, Size = 2, BPHandle = 0x0003
Setting breakpoint @ address 0x000062A4, Size = 2, BPHandle = 0x0004
Starting target CPU...