PyOCD remote execution wrapper
Project description
pyocd_remote
Remote execution wrapper for PyOCD.
This tool runs pyocd
on a remote SSH server and does additional copying / tunneling, so it looks like pyocd
is running locally.
Usage:
pyocd_remote user@host:port [--cmd pyocd_executable] [pyocd_args ...]
Prerequisites
For this tool to work, the local SSH client needs to be authorized at the remote server using a public key, and the remote server needs to be in the list of known hosts.
Examples
pyocd_remote user@host:port erase --chip
Erases the chip connected to the remote host.
pyocd_remote user@host:port flash image.bin
Copies image.bin
to the remote host, then flashes it there.
pyocd_remote user@host:port gdbserver --port 50000
Starts a gdbserver on the remote host and creates a tunnel, so it looks like a local gdbserver to the debugger.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
pyocd_remote-0.2.1.tar.gz
(3.4 kB
view hashes)
Built Distribution
Close
Hashes for pyocd_remote-0.2.1-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 176522f29dda7e3abce9eb6ae45c1a38303a58e8d1a52f36a8f0b483bb49d3dd |
|
MD5 | aa0718a50eac2025d0a20762ec0a37b2 |
|
BLAKE2b-256 | 8415da20b46bc4c52bb48376626db1aba54f4cc49405f445432634bdf9c43fa0 |