MSP430F6736
MSP430 USB Debug Interface FET430UIF
CCS v5
Is it possible to somehow mangle the MSP430F6736 lock bits through errant code?
After a software change, uploaded and running a test, I realized that it had referenced and wrote to an array offset that was 1 greater than its allocation. As in:
unsigned char aArray[15];
aArray[0]=0x00;
...
aArray[15] = 0x01;
Because, since this mistake, all attempts at accessing through 2 wire SPI via the FET430UIF are met with "fuse blown" messages.
Also, using the Elpotronic FET-Pro 430 software which tends to solve connection problems (sets the UIF to the correct 2 wire JTAG mode) also fails.
Reading Code File ........................... done
-- Code size = 0x54CA ( 21706 ) bytes
=====================================
JTAG communication initialization.... failed
Verifying Security Fuse .................... failed
--------------- FAILED !!! -----------------
I restarted the entire workstation, the UIF and the target. No change.
I and also tried a second target and in this case the Elpotronic software connects just fine. I haven't tried this second target with ccs. I'm now worried that I will blow the second board, too, if indeed it's possible to break the security fuse so easily!
Is it possible to correct this by wiping the flash memory of the target? I assume this would clear everything. Can I use the FET430UIF interface for this purpose?