#!/usr/bin/python3 # Raspberry Pi LPC1114 I/O Processor Expansion Board SPI Agent Firmware # SFR test # Copyright (C)2013-2018, Philip Munts, President, Munts AM Corp. # # Redistribution and use in source and binary forms, with or without # modification, are permitted provided that the following conditions are met: # # * Redistributions of source code must retain the above copyright notice, # this list of conditions and the following disclaimer. # # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" # AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE # IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE # ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE # LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE # POSSIBILITY OF SUCH DAMAGE. import sys import spiagent print('\nRaspberry Pi LPC1114 I/O Processor Expansion Board SFR Test\n') # Validate parameters if len(sys.argv) == 1: server = 'localhost' transport = 'auto' elif len(sys.argv) == 2: server = sys.argv[1] transport = 'auto' elif len(sys.argv) == 3: server = sys.argv[1] transport = sys.argv[2] else: print('Usage: ' + sys.argv[0] + ' [] [auto|libspiagent|xml-rpc]') sys.exit(1) # Open connection to the server try: t = spiagent.Transport(server, transport) except: print('ERROR: ' + str(sys.exc_info()[1])) sys.exit(1) # Read the LPC1114 device ID resp = [] t.command((spiagent.CMD_GET_SFR, spiagent.LPC1114_DEVICE_ID, 0), resp) print('The LPC1114 device ID is ' + hex(resp[2])) # Write the LPC1114 UART scratch pad register resp = [] t.command((spiagent.CMD_PUT_SFR, spiagent.LPC1114_U0SCR, 0x33), resp) # Read the LPC1114 UART scratch pad register resp = [] t.command((spiagent.CMD_GET_SFR, spiagent.LPC1114_U0SCR, 0), resp) print('The LPC1114 UART scratch pad register is ' + hex(resp[2]) + '\n') # Graceful shutdown t.close() sys.exit(0)