Here you may find procedure how to perform censorship with Lauterbach debugger:
I am using UDE 4.6 debugger.
Any script from UDE will be more helpful
Unfortunately we don't have any experience with this debugger. I would recommend to contact PLS support:
https://www.pls-mc.com/contact/
Thank you .I have flashed the DCF records in UTEST flash memory instead of script.
After flashing this hex file the DCF records are set and password is 0x1234567812345678,
when i reseted and tried to access the JTAG its not working, any other special procedure to unlock apart from above password. ?
The debugger should be capable to enter the password similar way as procedure below:
"JTAG PASSWORD must be inserted in order to work with JTAG.
Lauterbach -> sys.option.keycode 0x1234567812345678
sys.attach
sys.break
The device is now accessible trough JTAG."
Please consult with your debugger's provider documentation or their support.
As per my understanding modification of DCF records in UTEST flash memory is not possible.
is it atleast possible to read the memory location ?
can it be possible to access the DCF records using pointer?
Modification is not possible, but you may write new record after last record, if the ID is the same, last entry is valid one (of course you must be able to access the device).
where can i find security documentation?
how to enable JTAG_password instruction?
I am afraid no security documentation exist for the device. It is apparently relic form other manual. I have reported this to application team as a typo.
Pay attention to MPC5744PRM, Rev. 6.1, 10/2017, Page 208, 2.32.1 Unsecuring the microcontroller:
https://www.nxp.com/webapp/Download?colCode=MPC5744PRM
For JTAG_PASSWORD register description see
61.3.5 JTAG_PASSWORD register
In general I would point out following appnote:
https://www.nxp.com/docs/en/application-note/AN4365.pdf
Also following examples could be useful:
If your question in related to specific debugger use, I would recommend to consult with debugger’s provider or support.