[QUOTE=Dr.Impresion;4459099]Hola,
Por lo que estuve investigando en su momento, el chip está protegido contra la lectura, por lo que la programación original no se puede obtener.
Los ficheros que circulan por la red, son ficheros creados desde cero por la persona que los ha desarrollado:
WARNING !!! WARNING !!! WARNING !!!
DO NOT USE THIS FILE ON FULL WORKING MATRIX REVOLUTION CAM !!!
THIS IS NOT ORIGINAL DUMP OR " FOUNDED" FILE !!!
THIS FILE IS WRITEN BY ME AFTER TESTING
MATRIX - ALL VERSION CAM.
IF YOU KILL YOUR MATRIX REVOLUTION WITH WRONG XILINX FILE " FOR RELOAD " ,
THEN TRY THIS FILE.
IF YOU KILL BRAND NEW WORKING REVOLUTION , DON'T BLAME ME !!!
USE AT YOUR OWN RISK !!!
Una vez reprogramado... de momento, no hay vuelta a atrás, y puede que te vaya bien o te vaya mal.
Saludos!!![/QUOTE]
Exacto, tu lo has dicho, pero es lo unico k tiene...
Tambien es cierto
"[COLOR="Red"]XC9500XL High-Performance CPLD
Family Data Sheet[/COLOR]
[B]Design Security[/B]
XC9500XL devices incorporate advanced data security features
which fully protect the programming data against
unauthorized reading or inadvertent device erasure/reprogramming.
[COLOR="Red"][B]Table 3[/B] shows the four different security settings
available.[/COLOR]
The read security bits can be set by the user to prevent the
internal programming pattern from being read or copied.
When set, they also inhibit further program operations but
allow device erase. Erasing the entire device is the only way
to reset the read security bit.
The write security bits provide added protection against
accidental device erasure or reprogramming when the JTAG pins are subject to noise, such as during system
power-up. Once set, the write-protection may be deactivated
when the device needs to be reprogrammed with a
valid pattern with a specific sequence of JTAG instructions. "