PyOCD remote execution wrapper
Project description
pyocd_remote
Remote execution wrapper for PyOCD.
This tool runs pyocd
on a remote SSH server and does additional copying / tunneling, so it looks like pyocd
is running locally.
Usage:
pyocd_remote user@host:port [--cmd pyocd_executable] [pyocd_args ...]
Prerequisites
For this tool to work, the local SSH client needs to be authorized at the remote server using a public key, and the remote server needs to be in the list of known hosts.
Examples
pyocd_remote user@host:port erase --chip
Erases the chip connected to the remote host.
pyocd_remote user@host:port flash image.bin
Copies image.bin
to the remote host, then flashes it there.
pyocd_remote user@host:port gdbserver --port 50000
Starts a gdbserver on the remote host and creates a tunnel, so it looks like a local gdbserver to the debugger.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
pyocd_remote-0.2.2.tar.gz
(3.6 kB
view hashes)
Built Distribution
Close
Hashes for pyocd_remote-0.2.2-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 3b98ff8d452b24da43a9498e202509e036f88c4b0df5d2195157e63e650c2b23 |
|
MD5 | c214c97d0bdaf7683a33eecbb92628f3 |
|
BLAKE2b-256 | f8ea27fcd7ce70ce1c43d46a185475df4289f3e5e1c4f51adff818df3d4de8ec |