PyOCD remote execution wrapper
Project description
pyocd_remote
Remote execution wrapper for PyOCD.
This tool runs pyocd
on a remote SSH server and does additional copying / tunneling, so it looks like pyocd
is running locally.
Usage:
pyocd_remote user@host:port [--cmd pyocd_executable] [pyocd_args ...]
Prerequisites
For this tool to work, the local SSH client needs to be authorized at the remote server using a public key, and the remote server needs to be in the list of known hosts.
Examples
pyocd_remote user@host:port erase --chip
Erases the chip connected to the remote host.
pyocd_remote user@host:port flash image.bin
Copies image.bin
to the remote host, then flashes it there.
pyocd_remote user@host:port gdbserver --port 50000
Starts a gdbserver on the remote host and creates a tunnel, so it looks like a local gdbserver to the debugger.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
pyocd_remote-0.2.0.tar.gz
(3.4 kB
view hashes)
Built Distribution
Close
Hashes for pyocd_remote-0.2.0-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 3057cca4a3523df8886d02a1a31d56d7fe472b7d20fcd468f964e0a24ebbe774 |
|
MD5 | 8a25f5d9b5f212765999232e3ac9e41e |
|
BLAKE2b-256 | 0b4c9bc1eb4bac3830816360e83374a09bc6041919a25369faade8403e386528 |