# Debug log with IAR configured to use JTAG successfully working # J-Link Ultra+ v4.3, "Debug without downloading" Tue May 04, 2021 07:56:05: IAR Embedded Workbench 9.10.1 (C:\Program Files\IAR Systems\Embedded Workbench 9.0\arm\bin\armPROC.dll) Tue May 04, 2021 07:56:05: Loaded macro file: C:\Program Files\IAR Systems\Embedded Workbench 9.0\arm\config\debugger\ST\STM32F1xx.dmac Tue May 04, 2021 07:56:05: JLINK command: ProjectFile = C:\devtrees\obfuscated\settings\obfuscated_Debug.jlink, return = 0 Tue May 04, 2021 07:56:05: Device "STM32F103ZG" selected. Tue May 04, 2021 07:56:05: DLL version: V6.94d, compiled Feb 12 2021 15:56:38 Tue May 04, 2021 07:56:05: Firmware: J-Link Ultra V4 compiled Apr 27 2021 16:36:54 Tue May 04, 2021 07:56:05: JTAG speed is initially set to: 32 kHz Tue May 04, 2021 07:56:05: TotalIRLen = 9, IRPrint = 0x0011 Tue May 04, 2021 07:56:05: JTAG chain detection found 2 devices: Tue May 04, 2021 07:56:05: #0 Id: 0x3BA00477, IRLen: 04, CoreSight JTAG-DP Tue May 04, 2021 07:56:05: #1 Id: 0x06430041, IRLen: 05, STM32 Boundary Scan Tue May 04, 2021 07:56:05: TotalIRLen = 9, IRPrint = 0x0011 Tue May 04, 2021 07:56:05: JTAG chain detection found 2 devices: Tue May 04, 2021 07:56:05: #0 Id: 0x3BA00477, IRLen: 04, CoreSight JTAG-DP Tue May 04, 2021 07:56:05: #1 Id: 0x06430041, IRLen: 05, STM32 Boundary Scan Tue May 04, 2021 07:56:05: DPv0 detected Tue May 04, 2021 07:56:05: Scanning AP map to find all available APs Tue May 04, 2021 07:56:05: AP[1]: Stopped AP scan as end of AP map has been reached Tue May 04, 2021 07:56:05: AP[0]: AHB-AP (IDR: 0x14770011) Tue May 04, 2021 07:56:05: Iterating through AP map to find AHB-AP to use Tue May 04, 2021 07:56:05: AP[0]: Core found Tue May 04, 2021 07:56:05: AP[0]: AHB-AP ROM base: 0xE00FF000 Tue May 04, 2021 07:56:05: CPUID register: 0x411FC231. Implementer code: 0x41 (ARM) Tue May 04, 2021 07:56:05: Found Cortex-M3 r1p1, Little endian. Tue May 04, 2021 07:56:05: FPUnit: 6 code (BP) slots and 2 literal slots Tue May 04, 2021 07:56:06: CoreSight components: Tue May 04, 2021 07:56:06: ROMTbl[0] @ E00FF000 Tue May 04, 2021 07:56:06: ROMTbl[0][0]: E000E000, CID: B105E00D, PID: 001BB000 SCS Tue May 04, 2021 07:56:06: ROMTbl[0][1]: E0001000, CID: B105E00D, PID: 001BB002 DWT Tue May 04, 2021 07:56:06: ROMTbl[0][2]: E0002000, CID: B105E00D, PID: 000BB003 FPB Tue May 04, 2021 07:56:06: ROMTbl[0][3]: E0000000, CID: B105E00D, PID: 001BB001 ITM Tue May 04, 2021 07:56:06: ROMTbl[0][4]: E0040000, CID: B105900D, PID: 001BB923 TPIU-Lite Tue May 04, 2021 07:56:06: ROMTbl[0][5]: E0041000, CID: B105900D, PID: 101BB924 ETM-M3 Tue May 04, 2021 07:56:06: Reset: Halt core after reset via DEMCR.VC_CORERESET. Tue May 04, 2021 07:56:06: Reset: Reset device via AIRCR.SYSRESETREQ. Tue May 04, 2021 07:56:06: Hardware reset with strategy 0 was performed Tue May 04, 2021 07:56:06: Initial reset was performed Tue May 04, 2021 07:56:06: Found 2 JTAG devices, Total IRLen = 9: Tue May 04, 2021 07:56:06: #0 Id: 0x3BA00477, IRLen: 4, IRPrint: 0x1 CoreSight JTAG-DP Tue May 04, 2021 07:56:06: #1 Id: 0x06430041, IRLen: 5, IRPrint: 0x1 STM32 Boundary Scan Tue May 04, 2021 07:56:07: Loaded debugee: C:\devtrees\obfuscated\Debug\Exe\obfuscated.out Tue May 04, 2021 07:56:07: Download completed. Tue May 04, 2021 07:56:07: Reset: Halt core after reset via DEMCR.VC_CORERESET. Tue May 04, 2021 07:56:07: Reset: Reset device via AIRCR.SYSRESETREQ. Tue May 04, 2021 07:56:07: Software reset was performed Tue May 04, 2021 07:56:07: Target reset Tue May 04, 2021 07:56:08: Update all software breakpoints was performed