JTAG Programmer software uses sequences of JTAG instructions to perform the following programming and verification operations. The user need only select the desired operation; the software will execute all required JTAG commands transparently. For a description of JTAG instructions supported by Xilinx devices, see Appendix A.
Device operation options available to users are:
Program. Downloads the contents of the JEDEC or BIT file to the device programming registers.
Verify. Reads back the contents of the device programming registers and compares them with the JEDEC or BIT file.
Erase. Clears device configuration information.
Functional Test. Applies user-specified functional vectors from the JEDEC file to the device using the JTAG INTEST instruction, comparing results obtained against expected values. Reports any differences to the user.
Blank Check. Checks whether a device has been programmed or is erased.
Readback Jedec. Reads back the contents of device programming registers and creates a new JEDEC file with the results.
Get Device ID. Reads the contents of the JTAG IDCODE register. Displays contents for the user.
Get Device Checksum. Reads back the contents of device programming registers and calculates a checksum for comparison against the expected value.
Get Device Signature/Usercode. This value is selected by the user during fitting. The specified value is translated to binary values in the JEDEC file. During device programming these values are loaded into the JTAG USERCODE register. This function reads the contents of the USERCODE register and displays the result.
Bypass. Ignores this device when addressing devices in the JTAG boundary scan chain. This option is only available through chain operations.
Any Xilinx XC9500 device selected for programming can be secured with the Write Protect or Read Protect or both.
When enabled, Read Protect disables reading the programmed contents of a device (the IDCODE and USERCODE registers remain readable).
Write Protect allows only the reading of the programmed data. The device contents cannot be altered or re-programmed.
When both Read Protect and Write Protect are enabled, the device can be neither read nor re-programmed.
Security options do not affect the accessibility of the bypass or boundary-scan register.
When using the graphical user interface, immediate feedback is provided by a scrolling log file and alert boxes. Detailed information regarding failure is located in the system log file, and is provided for both the PC and workstation based tool.