This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import re | |
_dmamux_pattern = re.compile("^\s*#define\s+(?P<name>(LL_DMAMUX_REQ_\w+))\s+(?P<id>(0x[0-9A-Fa-f]+))U") | |
_request_pattern = re.compile("^\s*#define\s+(?P<name>(DMA_REQUEST_\w+))\s+(?P<id>([0-9]+))U") | |
def _read_map(filename, pattern): | |
out_map = {} | |
with open(filename, "r") as header_file: | |
for line in header_file.readlines(): |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
scons: Reading SConscript files ... | |
scons: done reading SConscript files. | |
scons: Building targets ... | |
.----OpenOCD--- /home/christopher/modm/build/stm32f746g_discovery/blink/release/blink.elf | |
'-------------> stm32f746ngh | |
Open On-Chip Debugger 0.10.0 | |
Licensed under GNU GPL v2 | |
For bug reports, read | |
http://openocd.org/doc/doxygen/bugs.html | |
Info : The selected transport took over low-level target control. The results might differ compared to plain JTAG/SWD |