Integration Manual

Table Of Contents
NORA-B1 series - System integration manual
UBX-20027617 - R04 Flashing application software Page 22 of 61
C1-Public
3 Flashing application software
Both the application and network cores of the NORA-B1 modules are flashed over a common SWD
interface. See also [20].
3.1 SWD interface
A SEGGER J-Link programmer is required to program the NORA-B1 module flash over the SWD port.
The EVK-NORA-B10x evaluation kit includes a J-LINK-OB that is used to program and debug
the on-board NORA-B1 as well as the target hardware for ANNA-B1, BMD-3, NINA-B1,
NINA-B3, NINA-B4, and NORA-B1 modules.
3.2 Readback protection
By default, readback protection is enabled in NORA-B1. To use the SWD interface, the
UICR.APPROTECT register must be set to “unprotected”. In addition, the code running on the core
must set the CTRL-AP.APPROTECT.DISABLE register to the same value. Each core is separately
protected. The application core also contains UICR.SECUREAPPROTECT and CTRL-
AP.SECUREAPPROTECT.DISABLE registers which may be enabled separately to block all secure access
through the application core. See also [16].
NORA-B1 is provided from the factory with readback protection fully disabled.
Open CPU application firmware and the UICR must include these settings to debug or reprogram
NORA-B1. If these settings are not provided, each core needs to be recovered to enable the SWD
port.
3.3 Recovery
If SWD access becomes disabled, NORA-B1 must be recovered. west can perform a full recovery of
both cores with a single command:
c:\ubx>we --recover
If nrfjprog is used, each core of NORA-B1 must be recovered separately. This process fully erases
both the flash and UICR:
c:\ubx>nrfjprog -f nrf --coprocessor CP_NETWO --recover
Recovering device. This operation might take 30s.
Writing image to disable ap protect.
Erasing user code and UICR flash areas.
c:\ubx>nrfjprog -f nrf --recover
Recovering device. This operation might take 30s.
Writing image to disable ap protect.
Erasing user code and UICR flash areas.
When the network core is recovered, it erases both the network and application cores. When the
application core is recovered, only the application core is affected. For this reason, it is important
to first recover the network core so the readback protection can be properly disabled.
The Bluetooth device address is erased this process. For information about restoring the
address to the UICR, see also Bluetooth device (MAC) address and other production data.
3.4 Programming
SES can be used to interactively erase, program, and debug application core and network core code.