I followed the instructions on the page titled “Using SparkFun Edge Board with Ambiq Apollo3 SDK” and everything worked great!
I got to the point in example1 where I do “make bootload”
The board was quickly blinking the “37” blue LED. I held the “14” button and pushed and released the “rst” button. The blue LED stopped blinking and then ran the “make bootload”
Here is a copy/paste of what I saw:
$make bootload
Compiling gcc …/src/main.c
Compiling gcc …/…/…/…/…/devices/am_devices_led.c
Compiling gcc …/…/…/…/…/utils/am_util_delay.c
Compiling gcc …/…/…/…/…/utils/am_util_faultisr.c
Compiling gcc …/…/…/…/…/utils/am_util_stdio.c
Compiling gcc startup_gcc.c
Compiling gcc …/src/tf_adc/tf_adc.c
Compiling gcc …/src/tf_accelerometer/tf_accelerometer.c
…/src/tf_accelerometer/tf_accelerometer.c: In function ‘platform_read’:
…/src/tf_accelerometer/tf_accelerometer.c:336:31: warning: assignment to ‘uint32_t *’ {aka ‘long unsigned int *’} from incompatible pointer type ‘uint8_t *’ {aka ‘unsigned char *’} [-Wincompatible-pointer-types]
iomTransfer.pui32RxBuffer = bufp; // Link in the RX buffer
^
Compiling gcc …/src/tf_accelerometer/lis2dh12_reg.c
Linking gcc bin/example1_edge_test.axf
Copying gcc bin/example1_edge_test.bin…
…/…/…/…/…/tools/apollo3_scripts/create_cust_image_blob.py --bin bin/example1_edge_test.bin --load-address 0xC000 --magic-num 0xCB -o bin/main_nonsecure_ota --version 0x0
Header Size = 0x80
original app_size 0x460c ( 17932 )
load_address 0xc000 ( 49152 )
app_size 0x460c ( 17932 )
w0 = 0xcb00468c
Security Value 0x10
w2 = 0x10008080
addrWord = 0xc000
versionKeyWord = 0x0
child0/feature = 0xffffffff
child1 = 0xffffffff
crc = 0xb13edac3
Writing to file bin/main_nonsecure_ota.bin
…/…/…/…/…/tools/apollo3_scripts/create_cust_wireupdate_blob.py --load-address 0x20000 --bin bin/main_nonsecure_ota.bin -i 6 -o bin/main_nonsecure_wire --options 0x1
Header Size = 0x60
app_size 0x468c ( 18060 )
Writing to file bin/main_nonsecure_wire.bin
Image from 0x0 to 0x468c will be loaded at 0x20000
…/…/…/bsp/tools/uart_wired_update_sparkfun.py -b 921600 /dev/tty.usbserial-1410 -r 1 -f bin/main_nonsecure_wire.bin -i 6
Connecting with Corvette over serial port /dev/tty.usbserial-1410…
Sending Hello.
No response for command 0x00000000
received bytes 48
[‘0x86’, ‘0xe5’, ‘0xac’, ‘0x80’, ‘0x5’, ‘0x83’, ‘0x80’, ‘0xd0’, ‘0x80’, ‘0x82’, ‘0x80’, ‘0x87’, ‘0x80’, ‘0x81’, ‘0x80’, ‘0xff’, ‘0x5c’, ‘0xf1’, ‘0xff’, ‘0x35’, ‘0x80’, ‘0x0’, ‘0x80’, ‘0x83’, ‘0xf4’, ‘0xb2’, ‘0xff’, ‘0xff’, ‘0xff’, ‘0xff’, ‘0xff’, ‘0xff’, ‘0xff’, ‘0xff’, ‘0xff’, ‘0xff’, ‘0xff’, ‘0xff’, ‘0xff’, ‘0xff’, ‘0xff’, ‘0xff’, ‘0xff’, ‘0xff’, ‘0xff’, ‘0xff’, ‘0xff’, ‘0xff’]
Traceback (most recent call last):
File “…/…/…/bsp/tools/uart_wired_update_sparkfun.py”, line 341, in
main()
File “…/…/…/bsp/tools/uart_wired_update_sparkfun.py”, line 42, in main
connect_device(ser)
File “…/…/…/bsp/tools/uart_wired_update_sparkfun.py”, line 61, in connect_device
response = send_command(hello, 88, ser)
File “…/…/…/bsp/tools/uart_wired_update_sparkfun.py”, line 238, in send_command
raise NoResponseError
main.NoResponseError
make: *** [bootload] Error 1
I can verify that the tty that I specified in the makefile is the correct one. /dev/tty.usbserial-1410. If i unplug the edge board, the device file is no longer there. When I plug it back in, it comes back.