Skip to content

Commit e5d954e

Browse files
committed
Update readme
1 parent ec0b3ab commit e5d954e

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

dspic33a_secure_boot/README.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@
1313
---
1414

1515
![Board picture](./images/board.jpg)<br>
16-
_Figure 1. - Curiosity Platform Development Board_<br><br>
16+
_Figure 1. - dsPIC33A Curiosity Platform Development Board_<br><br>
1717

1818
![DIM picture](./images/dim.jpg)<br>
1919
_Figure 2. - dsPIC33AK512MPS512 Curiosity GP DIM_<br><br>
@@ -42,13 +42,13 @@ The associated bootloader and application projects demonstrate the following:
4242

4343
### Hardware
4444
* [dsPIC33AK512MPS512 DIM (EV80L65A)](https://www.microchip.com/EV80L65A)
45-
* [Curiosity Platform Development Board (EV74H48A)](https://www.microchip.com/en-us/development-tool/ev74h48a)
45+
* [dsPIC33A Curiosity Platform Development Board (EV74H48A)](https://www.microchip.com/en-us/development-tool/ev74h48a)
4646
* A USB-Type C cable (for powering the board)
4747

4848
## Running the Demo
4949

5050
### Hardware Setup
51-
1. Insert the dsPIC33AK512MPS512 Curiosity GP Dim into the Curiosity DIM Connector.
51+
1. Insert the dsPIC33AK512MPS512 Curiosity GP Dim into the dsPIC33A Curiosity DIM Connector.
5252
2. Connect the USB-C cable to connector J24 of the Development Board to the host computer.
5353

5454
### Programming the Bootloader
@@ -516,7 +516,7 @@ Additional example application projects are included in this demo under the flas
516516
517517
### Flash Region Erase Examples
518518
519-
The examples within the flash_region_erase folder are intended to verify that an IRT region cannot be erased by non-IRT code and that the boot, executable, and keystore sections are locked to modification. By modifying the boot loader code, developers can verify that if these regions are not switched to "locked until next reset" or are not IRT enabled regions, they can be unlocked and modified.
519+
The examples projects listed below are intended to verify that an IRT region cannot be erased by non-IRT code and that the boot, executable, and keystore sections are locked to modification. By modifying the boot loader code, developers can verify that if these regions are not switched to "locked until next reset" or are not IRT enabled regions, they can be unlocked and modified. These projects can be found in the flash_protection_examples folder.
520520
521521
* bootEraseFlashProtection.X & keystoreEraseFlashProtection.X
522522
* Unlocks the region and erases a page from it.
@@ -544,7 +544,7 @@ Given the FIRT_IRT bit has been set and the projects are loaded via the firmware
544544
545545
### Flash Region Read Examples
546546
547-
The examples within the flash_region_read folder are intended to verify that an IRT region cannot be read by non-IRT code.
547+
The examples projects below are intended to verify that an IRT region cannot be read by non-IRT code. They are located in the flash_protection_examples folder.
548548
549549
* bootReadFlashProtection.X & keystoreReadFlashProtection.X
550550
* Reads an instruction within the region.
@@ -564,7 +564,7 @@ Given the FIRT_IRT bit has been set and the projects are loaded via the firmware
564564
565565
### Flash Region Execute Example
566566
567-
The example within the flash_region_execute folder is intended to verify that the IRT regions are fully protected and non-IRT user space cannot access IRT code.
567+
The example project below is intended to verify that the IRT regions are fully protected and non-IRT user space cannot access IRT code. It is located in the flash_protection_examples folder.
568568
569569
* bootExecuteFlashProtection.X
570570
* Jumps to an address in the IRT boot region from non-IRT user space.

0 commit comments

Comments
 (0)