Development tools environment , Computer Engineering

Assignment Help:

Main Objectives:
• MPLAB In-Circuit Debugger (ICD 2) functionality
• ICD 2 Connection design
• MPLAB ICD 2 setup with the PC and Interface board designed
• I²C Protocol buses technologies

MPLAB In-Circuit Debugger (ICD 2)

The MPLAB ICD 2 debugger/programmer tool: is a low cost real-time debugger and programmer for selected PIC microcontrollers and dsPIC DSCs. The ICD 2 uses two dedicated hardware lines (PGC and PGD) or pins that control In Circuit Serial ProgrammingTM (ICSPTM) of the device and, afterwards, debugging through proprietary, on-chip firmware.
The features of ICD 2 debug are built into the microcontroller and activated by downloading the debug code into the target processor. Some shared overhead expenses are one stack level, general purpose file registers and a small area of program memory when in the debug mode.
The ICD 2 main functions are downloading programs into the microcontroller. The programs are executed in real time and examined in detail with the debug functions of MPLAB. Also set watch variables and breakpoints from symbolic labels in C or assembly source code, and single step through C source lines or into assembly code. MPLAB ICD 2 can also be used as a development programmer for supported MCUs.

ICD2 CONNECTOR

Main Objectives:

  1. To enable between the ICD2 connector and any suitable peripherals e.g. ICD2 Debugger
  2. Uploading data or codes into the PIC via the connector

This is a way of plugging a PIC into a standard computer (PC). A separate piece of hardware, called a "Programmer or ICD2 Debugger" is required to connect to one side of the PC I/O port to the PIC on the other side. There are other frequently used connectors such as the parallel port, serial port (COM port), the USB etc.

ICD2 CONNECTOR PIN OUT

Defining the pins of the connectors on an ICD2 cable as shown in Figure below:

                        1654_ICD2.png

                                FIGURE: ICD2 cable

The standard In- Circuit Debugger (ICD2) cable is wired so that the pins are flipped between the ends. In other words, pin 1 on one end is connected to pin 6 on the other end, pin 2 to pin 5, etc. The pin out of each end is shown in table 3 below:
Table : ICD 2 PIN OUTS

Signal

ICD2 end pin    

Target end pin

VPP/ MCLR

 

6

    1

VDD

5

    2

GND

4

    3

PGD

3

    4

PGC

2

    5

not connected

1

    6


Related Discussions:- Development tools environment

Difference between char a[] = "string", What is the difference between char...

What is the difference between char a[] = "string"; and char *p = "string";? Ans) In the first case 6 bytes are assigned to the variable a which is fixed, where as in the secon

Explain the numbering plan for isdn address structure, Explain the numberin...

Explain the numbering plan for ISDN address structure. The numbering plan for ISDN is evolved with using the following guidelines: 1. This is based on, and is an improvemen

Role of information system in business, Q. Role of information system in bu...

Q. Role of information system in business? Ans. 1. Information System is grouping of two terms namely - 1) Information 2) System 1. Information - Information is dat

What are the main features of uml, What are the main features of UML ...

What are the main features of UML Defined system structure for the object modelling Support for all different model organization Strong modelling for behaviour an

Simple assembly programs, Data Transfer Two most fundamental data trans...

Data Transfer Two most fundamental data transfer instructions in 8086 microprocessor are XCHG and MOV. Let's give illustrations of the use of these instructions. Program 1:

DoDAF OV-2 for a green datacenter, How do I create a DoDAF OV-2 for the con...

How do I create a DoDAF OV-2 for the construction of a green data center?

Determine about the blocking suspicious behaviour, Determine about the bloc...

Determine about the blocking suspicious behaviour The response could be spontaneous and automatic, with an option to generate the alert message manually. The history recorded i

Discuss the 5-level switching hierarchy recommended by ccitt, Discuss the 5...

Discuss the 5-level switching hierarchy recommended by CCITT. Hierarchical networks are able of handling heavy traffic where needed, and at similar time use minimal number of t

What do you call an event and when do you call an assertion, What do you ca...

What do you call an event and when do you call an assertion? Assertion based Verification Tools, checks whether a statement holds a explained  property or not, while, Event bas

Eliminating hazards - computer architecture, Eliminating hazards of pipeli...

Eliminating hazards of pipeline -  computer architecture: We can delegate the work of eliminating data dependencies to the compiler, which can fill up in suitable number of NO

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd