Du verwendest einen veralteten Browser. Es ist möglich, dass diese oder andere Websites nicht korrekt angezeigt werden. Du solltest ein Upgrade durchführen oder ein alternativer Browser verwenden.
I managed to write a MIPS program that dumps memory and I tried it on BFC00000. It looks very similar (same?) to yours.
Unfortunately I now discovered that is very very difficult to make u-boot load from RAM: http://www.denx.de/wiki/view/DULG/CanUBootBeConfiguredSuchThatItCanBeStartedInRAM, so...
I did something even simpler.
lui $8,0xBFC0
ori $9,$8,0x05F4
jr $9
It works. It jumps.
That means the bank is not broken. That means i now have to find why it doesn't like my u-boot image.
Yes, it's that one.
Flash (4MB) is at 0xB3000000.
RAM (16 MB) is at 0x80000000.
That's very interesting. I don't really know MIPS assembly (only a bit of x86), but (if I haven't misunderstood something) it should be fairly easy to use "Serial Download" to load some raw code that puts something...
Update: I built and loaded u-boot "RAM version" but it still does nothing. Meh.
Just curious, where did you get the BFC005F4 address? I don't see it mentioned on any of the header files.
It's a Kraun KR.RN (a rebranded Edimax AR-7064Mg+).
Now that I've looked at some V700W pics I see that it's not all that similar.. still, it has "Serial Download".
When it boots it says
Version 1.0.1
Read EEPROM
Jump to Flash
Head : Amazon Version 1.0.0 D-Link
DRAM: 32 MB
Head ...
But I tried the blrecovery.hex too, and it didn't work (the router is different, but the hardware is very very similar, should at least display a message, no?)
Anyway, I'll try modifying the source code if I find that hardcoded b3000000.
Thanks
Thanks.
I managed to convert the bootloader into that format, but after all the dots (lines received by device) it does nothing and stays blank (the only working jump i ever saw was your serloadtest.hex).
I'm starting to think the RAM is damaged...
I see blrecover.hex it's not a 1:1 byte copy of bl0930.bin.
Could you explain how to encode a binary file into that hex representation?
I see it's something like:
[8 byte memory address][64 bytes of data]
[8 byte memory address][64 bytes of data]
...
11111111[8 byte checksum][56 bytes of...