English
Language : 

56F8037 Datasheet, PDF (127/180 Pages) Freescale Semiconductor, Inc – 16-bit Digital Signal Controllers
Introduction
7.2.4 Product Analysis
The recommended method of unsecuring a programmed 56F8037 for product analysis of field failures is
via the backdoor key access. The customer would need to supply Technical Support with the backdoor key
and the protocol to access the backdoor routine in the Flash. Additionally, the KEYEN bit that allows
backdoor key access must be set.
An alternative method for performing analysis on a secured microcontroller would be to mass-erase and
reprogram the Flash with the original code, but modify the security bytes.
To insure that a customer does not inadvertently lock himself out of the 56F8037 during programming, it
is recommended that the user program the backdoor access key first, the application code second, and the
security bytes within the FM configuration field last.
Part 8 General Purpose Input/Output (GPIO)
8.1 Introduction
This section is intended to supplement the GPIO information found in the 56F802x and 56F803x
Peripheral Reference Manual and contains only chip-specific information. This information supersedes
the generic information in the 56F802x and 56F803x Peripheral Reference Manual.
8.2 Configuration
There are four GPIO ports defined on the 56F8037. The width of each port, the associated peripheral and
reset functions are shown in Table 8-1. The specific mapping of GPIO port pins is shown in Table 8-2.
Additional details are shown in Tables 2-2 and 2-3.
GPIO Port
A
B
C
D
Table 8-1 GPIO Ports Configuration
Available
Pins in
56F8037
Peripheral Function
Reset Function
15
PWM, Timer, QSPI, Comparator, Reset GPIO, RESET
14
QSPI, I2C, PWM, Clock, MSCAN,
Comparator, Timer
GPIO
16
ADC, Comparator, QSCI
GPIO
8
Clock, Oscillator, DAC, JTAG
GPIO, JTAG
56F8037 Data Sheet, Rev. 2
Freescale Semiconductor
127
Preliminary