Hi Mahesh,
I'd recommend to generate write script in SEC tool and you can find in the script, what parts shall be written and the target address. The write script is designed to write everything into empty chip. In case you do an update, you can write only changed parts, of course.
For the cloud updates, there are supported secure binary (*.SB) file, which is encrypted. However, this is currently supported on command-line only, it can be build using elftosb tool.
In SEC tool you can use "main menu > Tools > Manufacturing Tool" to apply SB file into the processor.
HAB encrypted boot mode on RT10xx means, the application image is encrypted in the flash, and before execution, it is decrypted into RAM and executed from RAM. It can be executed either from internal or from external RAM (SDRAM). 0x3000 refers to address in internal RAM.
XIP = e(X)ecuted (I)n (P)lace = means the code is executed from flash, where it is located. In HAB encrypted boot mode, XIP is not possible.
RT1050 supports also XIP excrypted image from external flash, see BEE encryption.
The workflow for RT1051 in SEC tool can be found in chapter 6.2 of the user guide.
Hope this helps.
Regards,
Marek
NOTE: If you find the answer useful, kindly click on [ACCEPT AS SOLUTION] button