Debugging eZ430-F2013 MCU with MSPDebug tool in Ubuntu Linux

This post brings you a way to debug eZ430-F2013 Development tool (Texas Instrument) from Ubuntu Linux 10.10 using MSPDebug tool. This tool provides source level debugging capability. Basically tt supports MSP430 MCUs  with JTAG and Spy Bi-Wire interface. It also supports simulation mode, which allows MSP430 code to be debugged without hardware. Another worth noted feature is reverse engineering support.

Hardware setup

The below shown is the eZ430-F2013 Development tool is a MSP430 MCU with built-in USB based emulator/debugger. This debugger can be detached from the target once the product is ready.

Just plugin the device in USB Port. The below commands and outputs shows how this USB Emulator/debugger detected in Linux.

$ lsusb
Bus 006 Device 006: ID 0451:f430 Texas Instruments, Inc. MSP-FET430UIF JTAG Tool
$ dmesg
[ 8703.704590] usb 6-1: new full speed USB device using uhci_hcd and address 6
[ 8703.933252] ti_usb_3410_5052 6-1:1.0: TI USB 3410 1 port adapter converter detected
[ 8703.933286] ti_usb_3410_5052: probe of 6-1:1.0 failed with error -5
[ 8703.938573] ti_usb_3410_5052 6-1:2.0: TI USB 3410 1 port adapter converter detected
[ 8703.938757] usb 6-1: TI USB 3410 1 port adapter converter now attached to ttyUSB0
$ lsmod | grep ti_usb
ti_usb_3410_5052       23451  0
usbserial              33100  1 ti_usb_3410_5052

So the device node can be noted down as /dev/ttyUSB0 from the above message.

Software installation and usage

Now it is time to install MSPDebug tool. Visit to download the source code file in .tar.gz format.

Here is my console session to explain how I extracted, compiled and installed in Ubuntu Linux 10.10.

$ tar zxvf mspdebug-0.11.tar.g

$ cd mspdebug-0.11

$ make clean


$ sudo make install
Run “mspdebug -d /dev/ttyUSB0 uif” command as shown below to get connected to debugger. Your device should be identified properly and you should get (mspdebug) prompt.
$ mspdebug -d /dev/ttyUSB0 uif
Trying to open UIF on /dev/ttyUSB0…
Initializing FET…
FET protocol version is 10002000
Configured for Spy-Bi-Wire
Sending initial reset…
Set Vcc: 3000 mV
Device: MSP430F20x3
Code memory starts at 0xf800
Number of breakpoints: 2
Available commands:
=         dis       hexout    opt       reset     step
break     erase     isearch   prog      run       sym
cgraph    gdb       md        read      set
delbreak  help      mw        regs      setbreak
Available options:
color     gdb_loop  quiet
Type “help <topic>” for more information.
Press Ctrl+D to quit.
For complete instruction on build environment and debugging with gdb, refer my post here:
Happy debugging hours!
Share this post


Leave a Reply

Your email address will not be published. Required fields are marked *