Engineers deliver firmware and a manifest.json file for all the complicated settings, while other non-technical people perform the firmware flashing with simple clicks.
-
Config with JSON file
-
Multiple backends
- esptool
- type=esp*
- Experimental external enablement of flash encryption (development mode) + secure boot for esp32c3
- Black Magic Probe
- type=bmp
- OpenOCD
- type=openocd
- Interfaces with device enumeration support:
- cmsis-dap
- jlink
- dfu-util
- type=dfu
- Still needs zadig to fix driver issue on windows
- PyOCD
- type=pyocd
- esptool
-
Batch Flashing
- Based on port detection, newly detected ports will be flashed automatically
- Tested with esptool backend only
-
Cross-Platform
- Linux
- macOS (tested with M2)
- Windows x64
- Download Arm GNU Toolchain and extract it to the root of the FwFlather so that
arm-none-eabi-gdbis in thegcc-arm-none-eabi-X.Y-Z/bindirectory - Download OpenOCD and extract it to the root of the FwFlasher so that
openocdis in the*openocd-X.Y-Z/bindirectory - Download dfu-util and extract it to the root of the FwFlasher so that
dfu-utilis in thedfu-util-X.Y-binaries/osname/directory
