Caji PROM9801 Installation manual

PROM8908D/E/F, PROM9801/00
PROGRAMMER Operation Manual(07Sep2002)
CAPRILION ENTERPRISE CO.
11F, No. 50 Cheng Hsing Road
KAOHSIUNG 807, TAIWAN, ROC
Tel: 886-7-3865061
Fax: 886-7-3864521
http://www.caprilion.com.tw
Email: [email protected]

Contents
1. Power-on Initial --(2)
2. The layout of keyswitches and LCD display--(3)
3. The key-switch command operations --(3)
Checksum --(3)
Verify--(4)
Copy/Force --(4)
Algorithm/PSB setting--(5)
The PSB settingfor Memoryblock Protection
Transfer and Group Selection --(6)
+Name, -Name --(7)
4. Steps for upload, download and calibration --(7)
4.1 Download --(7)
4.2 Upload --(8)
4.3 Voltage calibration and Verify-type setting--(8)
5. Firmware Update --(9)
6. Appendixof IC operation note --(10)
16bit devices
M29/Am29F002T/NT/B/NB --(11)
Am29F040
Atmel 49F001T/002T --(12)
Atmel 49F010/020/040 --(13)
Atmel AT80C1051/2051
Atmel AT90S1200 --(14)
Winbond W29C020/040 --(15)
7. Operation examples --(15)
8. Warranty--(17)
1

1. Power-on initial
When the power is turn on, the PROM8908 will take a few seconds
to configure its hardware and turn off all the slave's LED lamps. It then
starts to check all textool pins byaccessingtheir address bus(A0..A15)
and data bus(D0..D7). If there was anyerror, it will shows " D. BUS
ERROR !!!" on the LCD displayand it shouldn't be used for anyIC
related operation. If the test was passed, it brings up the device name
which is the last operated one before the previous power-off, and be
readyto use.
If the PSB(Protection-Setting-Byte) byte was not set to zero, a
warningmessage "PSB is Locked, Press anykey" will appear at the
final check to alert the user and wait for an acknowledgment of this
situation.
The machine's stack is always been checked at everycommand
operation to make sure that this machine is in a good condition. If a "
Stack error!" message appears at anytime, this machine should be doubt
on its reliability.
There shouldn't has anyIC left on the textools when the power is turn
on or off. This might cause an unreliable self-checkingresults or will
damage this IC.
2. The layout of key switches and LCD display
2-1. The LCD panel
$ |MESSAGE
P VPP=12.5V
i27256 0000
DEVICE NAME | CHECKSUM
(1) DEVICE NAME: Shows the current device beingprocessed.
(2) $: For EPROMs, this field indicates the current
2

programmingalgorithm of speed. For some flashs, it indicates
the current Protect-Setting-Byte(PSB) settingvalue.
(3) CHECKSUM: Displays the master checksum value calculated
duringthe last read-related actions such as "VERIFY", "COPY",
etc. The machine will beep everytime this value has changed.
This value is calculated byone's complement method for the
convenience of recognizinga blank $FF device. For the
compatibilitywith other machines, there is a normal checksum
value displayed just below this field each time when the
"CHECKSUM" command is executed.
(4) MESSAGE: displaythe general operation message.
[PROM9801]
For devices which has the "T48" message shown
4on this field when its name was selected should be handled on
the upper 48pin textools.
2-2. key switches
ALGORITHM
CHECKSUM VERIFY COPY
KEY1 KEY2
Yes No
-NAME +NAME
Force
KEY3
TRANSFER ON/OFF
SPECIAL FUNCTION
3. The key-switch command operations
Checksum[key1]:
It calculated two types of checksum value of the master IC's memory
contents. The first one is calculated byaddingup the one's complement
3

of each byte and shows the sum's last four digits on the LCD's upper
row. The second one is calculated byaddingup each byte and shows on
the LCD's lower row. The first value has the advantage of knowingif
the master IC is a blank one or not. For a byte in a erased status(0xFF),
addingup its one's complement will always get a '0000'checksum no
matter what the size the IC is.
Each time when the calculated value is different from the previous
one, a '*'mark will show on the LCD, leadingits value, and a longer
beep is accompanywith to alert the user.
Verify[key2]:
Verifythe contents of the slave ICs with the master in a byte bybyte
basis. At the end of this command, some IC's protect status(see section
5) will also be verified with the PSB settings. When you see a red lamp
lights just at the final moment, it can almost be sure that it is caused by
the un-match of the protection status.
Each time after the power is on, the verifyaction is conducted only
once at the normal VCC voltage. A special mode can be set to verifyit
twice at different voltage levels, one at a higher voltage(+5% or +10%)
and the other one at a lower voltage(-5% or -10%). This includes the
verifyaction embedded in the COPY command.
Copy[key3]:
This command doinga blank check and/or erase action first, then
copythe memorycontents of the master IC to all the slave ICs. At last, a
VERIFY command was executed to make sure the contents is correct.
A "Force" command can be issued bydepressingthe "COPY" key
and hold it down until the programmer acknowledged it with a beep
sound. This command will bypass the blank check and/or erase action,
start the copyof memoryimmediately.
4

For some ICs(see section 5) which has the block lock/protect feature,
the programmer will enable/disable this feature on those blocks
accordingto the settings in the PSB byte.
Algorithm/PSB setting[key1 + key2 + key3]:
For most EPROMs, this command changes the programming
algorithm and the time. Although this is an user accessible feature, we
don't encourage to change it unless the user knows exactlywhat he is
doing. Instead, we suggest usingthe default algorithm to program the
device.
For some Flash/Micro ICs, this command become the entrance of the
settingmode for the PSB byte.
For other ICs, this command has no action.
The PSB setting for MemoryProtection:
For ICs which has the abilityto lock/unlock some of its memory
blocks, preventingdata from accidentallylost, the PROM8908 can deal
this feature through the PSB(Protection-Setting-Byte) settings. The user
should payattention on its value(shown by2 digits on the lower left
corner of the LCD displayin HEX number) because it will influence the
result of how those ICs be Copied and Verified.
When those IC's name was chose, depressingall three keys together
will bringout the PSB value in bit form on the LCD display. The
leftmost bit correspondingto the highest address block of memoryand a
"1" means this block is "locked". Use [key1] or [key2] to move the
cursor to the proper bit position and use [key3] to toggle it. After all
bits are setted(all no-use bits should be set to '0'), move the cursor out of
those region and depress [key3] to exit. The new value will be shown on
the displayimmediately.
5

Transfer and Group Selcetion[key1 + key3]:
The PROM8908/980xcan upload data from the master IC to the PC,
or download data from the PC to the slave ICs. Also the PROM8908F
usingthis command to select the Device Group and Size of the target
chip.
[PROM8908D/E, PROM980x]
Usingthis command to enter the transfer mode will bringup the LCD
message " Down Load ?" and waitingfor an action key.(This command
will be aborted when an invalid keywas entered)
If you want to do the download, insert the ICs into the slave textools
first and then press the Yes[key1]. All slave ICs will be checked or
erased to its blank status. If everythinggoes fine, it will bringup the
LCD message "Download Rdy" and wait for data download from the
host PC. (See section 4.1 for followingsteps)
If you want to do the upload, depress the No[key2] to bringup the
LCD message " Up Load Ready." and wait the host PC to upload.
(See section 4.2 for followingsteps)
If you press the [key2] and [key3] together, it will enter the Voltage
calibration and Verify-type setting procedure.(See section 4.3 for
followingsteps)
[PROM8908F]
Usingthis command to select one of the two different sets of
function. One is for device group selection(Flash, Eprom or Micro)
which was conducted by[key2] and, the other is for data transfer
selection(upload, download and calibration) which was conducted by
[key1]. When a function was bringup onto the LCD display, depress the
[key3] to select it.
6

After a device group was selected, a further detailed selection based
on the size of the chip has to be chose, to help the user more quickly
locate his target.
If you want to do the download, insert the ICs into the slave textools
before you depress the [key3] to have them be checked or erased to their
blank status.
+Name[key2 + key3], -Name[key1 + key2]:
[PROM8908D/E, PROM980x]
Select the next device name for operation. The arrangement of the
name's sequence is from smaller to larger size with the EPROM group
comes first, followed bysome special devices and then the FLASH
group.
The -Name circulate the name list in opposite direction as the
+Name does.
[PROM8908F]
Select the next device name in this device group for operation. Only
the devices of this size categorywill be shown and can be chose. You
can't find device name not belongthis size or type.
4. Steps for upload, download and calibration
4.1 When the LCD shows " Download Rdy" message, followingthe
steps below to complete the Download:
(This procedure can be abort at this time bydepressingthe key1+key3)
1. If you see a " Clear buffer?" message before " Download Rdy", that
means there is alreadya byte received and, what you want to do on it?
Yes[key1] will drop it and waitingfor the next data come in, which is
the most usual choice. No[key2] will write this data as the first byte into
the IC.
2. Run the PROMUTIL.EXE utilityon the PC and follows its
instruction. (use /Iswitch to set the LPT port number as required.)
7

3. There is no final VERIFY action taken at the end of download such
as in the COPY commands. Instead, a checksum of all the received data
bytes will be shown on the LCD display, lettingthe user to verifyits
correctness manuallybyreadingthese IC's checksum in the master
textool.
4.2 When the LCD shows " Up Load Ready." message, followingthe
steps below to Upload:
(This procedure can be abort at this time bydepressingthe key1+key3)
1. Plugthe IC into the master textool.
2. runningthe PROMUTIL.EXE utilityon the PC and follows its
instructions. (use /Iswitch to set the LPT port number as required.)
3. At the end, there is checksum shows both on the LCD and the PC
monitor, to let user to verifyits correctness.
4. The user can abort the transfer at anytime bydisrupt the PC, usually
usingthe CTRL-C.
4.3 Voltage calibration and Verify-type setting:
The PROM8908 has a build-in calibration feature on the programming
voltage VCC and VPP. An offset value will be memorized and be used
to adjust all related voltage. The calibration need onlybe done once
within a period of months or when those voltage are in doubt.
Use a multimeter to measure the value on anyone of the slave
textools.
You can't leave anyIC in the textools when doingthe calibration, or
it will be damaged.
After the voltage calibration, you can choose the verifytype the
VERIFY command does. There are three types can be chose: verify
once at normal VCC voltage(the power-on default), verifytwice at VCC
+- 5%, or verifytwice at +- 10%. The choice will be effected
immediatelyuntil the power is off.
8

5. Firmware Update
[PROM8908D/E, PROM980x]
The PROM8908D/E has a firmware PROM located at the back side
of the main board. It can be easilyaccessed bysimplyremove the four
plastic stands at the bottom of the machine. The user has to download
the updated firmware image file from the web and copyit into a 27C512
equalivent PROM(with access time 70ns) and replace it.
[PROM8908F]
The PROM8908F use an embedded flash ROM with the ISP feature.
The user can run the utilityprogram AVR.EXE(with the avr.ini file) on
the PC and usingthe ISP cable to update the firmware through a PC
printer port.
After the AVR window was bringup, the printer port was set to
"AUTO" and the CPU type was set to "ATMega128" as the default. No
"FUSE" or "LOCK" bits update was required(leave those four small tick
boxs blank). The user onlyhave to select the correct file(p8908f.bin)
and "PROG" it. All settingparameters will be saved in avr.ini after
program EXIT for the next time re-use.
9

6. Appendix of IC operation note:
The followingICs'lock status has the PSB copied in the COPY
command and verified in the VERIFY command:
AM29F010, AM29F040-old, AM29F040, AM29F002T/NT,
M29F002T/NT, MX29F8100, MX29F1610, W29C020, W29C040,
AT49F010, AT49F020, AT49F040.
(For AT49F001T and AT49F002T, the PSB will be copied, but not
verified)
The followingICs have the capabilityof TemporarySector Unprotect
feature, allows code changes in previouslylocked sectors. This feature
can be enabled bysettingthe PSB byte to value $FF.
AM29F080, AM29F016, AM29F100, AM29F200, AM29F400,
AM29LV400, AM29F800, AM29LV800, AM29LV160.
16bit devices:
16bit EPROM operation on the PROM8908D/E/F
The PROM8908 was originallydesigned to handle the 8bit chips. For
EPROM with 16bit structure only, you need usingan adapter and
programmingit in a special way: You have to do everyoperation twice,
one on the low byte(D0..D7) and the other on the high byte(D8..D15).
A complete process will be:
1. Set both DIP switches(totally16) on the adapter to the same
direction. This will connect half of the 16bit bus onto the terminal pin
and open the other half to make them pulled up. Then you treat this chip
just like 8bit device and operate the programmer in the usual way.
2. After the first half part of the chip has been done, you switch all
DIP switches to the other side to process another half in the same way.
3. Onlyboth steps work successfully, the process is completed.
10

For large quantityof ICs, we recommend you process the half part on
all ICs together first, then switch to do the other half again.
16bit FLASH operation on the PROM8908D/E/F
For 16bit flash devices with abilityof BYTE configurable, the
PROM8908 always handle it in the BYTE mode. For devices onlyhave
the WORD configuration, it's impossible to handle on this machine.
16bit EPROM/FLASH operation on the PROM9801
The upper 48pin textools are used to handle all 16bit EPROMs and
16bit word-configurable-onlydevices. When these names were selected,
a "T48" or "Use Adapter In T48" message will shown on the LCD to
indicate it.
M29/Am29F002T/NT/B/NB Operation
These chips onlyhas seven sectors available. The value of bit 7(msb)
in the Protect-Setting-Byte(PSB) is irrelevant, onlythe lower seven bits
are used for setting/verifyingthe IC's sector protection status.
The master IC's protection status will not be used for anypurpose.
Instead, the PSB was used in the COPY and VERIFY command.
After the regular verifyon the memoryarraywas completed, all the
slave IC's protectingstatus will be compared with the PSB settings. A
slave IC will be acknowledged as good onlyboth comparingof the array
and the PSB were passed. If the error LED lights at the last moment
duringverify, it mostlycan saythat the protection status is onlythe
difference.
Am29F040 Operation
11

There are two names can be chose for this device, AM29F040-old
and AM29F040. When "COPY" command is executed, the "-old" name
will conduct an extra step of doingthe Sector-Protect-Unprotect on the
chip.
Because some newer date-coded chip(dated after 3) have a
different Unprotect algorithm, the old algorithm will cause all eight
sectors been kept on "Protected" state, and causingthe followingerase
action fails. We stronglyrecommend that usingthe "AM29F040" name
to handle the newer date-coded chips. For those newer dated chips
which alreadybeen sector protected, it have to be unprotected on some
other programmer.
Both names will handle the post Sector-Protect action correctly, after
the copywas completed, accordingto the value in the PSB byte where
bit7 represent the highest sector and a "1" means "Protect".
The master IC's protection status will not be used. Instead, the PSB
was used in the COPY and VERIFY command.
1. VERIFY: After the regular comparison on the memoryarray
completed, all the slave IC's protectingstatus will be compared with the
PSB setting. A slave IC will be acknowledged as a good one onlyboth
comparingwas passed. If the error LED lights at the last moment, it
mostlycan saythat the protection status is the onlydifference.
2. COPY: The slave chips was erased first, then the master's contents
was copied to all slaves, then the sector protect was done accordingto
the PSB setting. At the last, the VERIFY action will taken. If the "-old"
name was chose, a Sector-Unprotect action will be conducted at the
verybeginning, before the erase step.
The "AM29F040" name should be used for most chips, unless you
are sure the chip you have is of the older one.
12

Atmel 49F001T/002T Operation
These chips have a boot block with lockout feature. This feature
works in a OTP (one-time-program) way, which means once it had been
activated, it can't be unlocked anymore. To prevent it from accidentally
enabled, the user must set the Protect-Setting-Byte (PSB) to the value of
5A(HEX) to let the programmer activate this lockout feature
automaticallyin the COPY command. (Since version 1.16)
Atmel 49F010/020/040 Operation
These chips have a boot block with lockout feature. This feature
works in a OTP (one-time-program) way, which means once it had been
activated, it can't be unlocked anymore. To prevent from accidentally
enabled, the user must set the Protect-Setting-Byte (PSB) to the value of
5A(HEX) to let the programmer activate this lockout feature
automaticallyin the COPY command.(Since version 1.16)
The VERIFY command will compare the content of all salves with
the master device first, then compare their lockout status with the PSB
setting. Onlythose which have both comparisons passed will be
recognized as a good one.(Since version 1.16)
Atmel AT80C1051/2051 Operation
The settingof the Lock bits are stored in the Protect-Setting-Byte
(PSB) of the programmer. This value also control some command's
(COPY, VERIFY and DOWNLOAD) operation.
The followings explain each bit's meaningand location. Please be
noted that the programmer doesn't use anyof these information stored in
the master IC.
BIT 7 6 5 4 3 2 1 0
xxxxxLB2 LB1 x
13

1. VERIFY: If the Lock bit is set to the "read suppress", all slave ICs
will be verified with fixed value of $FF to confirm this setting. If it's
not, all slave ICs will be compared with the master contents.
2. COPY: Erase all slaves first, copythe contents of the master, then set
the Lock bits in all slaves accordingto the bits stored in the PSB. At the
last, a VERIFY command was executed.
3. DOWNLOAD: Erase the slaves first, transfer data to the slave's
memoryarray, then set the Lock bits in all slaves accordingto the bits
stored in the PSB.
Atmel AT90S1200 operation
The settingof the Lock and Fuse bits are stored in the
Protect-Setting-Byte (PSB) of the programmer. It also control some
command's (COPY, VERIFY and DOWNLOAD) operation.
The followings explain each bit's meaningand location. Please be
noted that the programmer doesn't use anyof these information stored in
the master IC.
BIT 7 6 5 4 3 2 1 0
xxSPIxxLB2 LB1 RCE
1. CHECKSUM: Show the checksum of the Flash memoryportion in
the master IC. Its Fuse and Lock bits information also be shown in [xx]
format.
2. VERIFY: First, compares the Fuse and Lock bits of all the slaves
with the settings in PSB. Second, if the Lock bits is set to the "read
suppress", all slave ICs will be verified with value $FF to confirm this
setting. If it's not, all slaves will be compared with the master's contents
(the flash portion).
14

3. COPY: Erase all the slaves, copythe flash portion of the master IC,
and then set the Fuse and Lock bits accordingto the value stored in
PSB. At last, execute a VERIFY command.
4. DOWNLOAD: Erase all the slaves, transfer data to the slaves'flash
portion, then set the Fuse and Lock bits accordingto the value stored in
PSB.
Winbond W29C020/040 Operation
This chip has two boot blocks with lockout feature. This feature can
be enabled bysettingthe bit0(the first boot block) or the bit7(the last
boot block) in the programmer's Protect-Setting-Byte(PSB). The other
bits(bit1..6) are don't-care.
Before writing, all the slaves will be unlocked and erased. After the
contents of master IC has been copied into the slaves, the boot block
will be locked accordingto its bit status in the PSB byte.('1'for lock, '0'
for no-lock)
The VERIFY command will compare the content of all salves with
the master device first, and then compare their lock status with the PSB
setting. Onlythose which has both comparison passed will be
recognized as a good one.
7. Operation examples
7-1 Copying 27256 EPROMs:
step1:
[PROM8908D/E]:
Select the correct device name bydepressing+NAME[key2 + key3]
or -NAME[key1 + key2].
[PROM8908F]:
15

First, select the EPROM device group byenteringTransfer mode
[key1+key3], then pressing[key2] to bringup the "Eprom Group"
message onto the LCD display, then pressing[key3] to confirm.
Second, select the required chip size bypressing[key1] or [key2] to
bringup the "Size 512K" message(actuallyit is alreadythere) and
pressing[key3] to confirm.
The last, using+Name or -Name to find the required chip name.
step2: Insert the master IC into the master socket. Although it's not a
necessity, depressingthe CHECKSUM[key1] to calculate and identify
the checksum value each time when a new IC was in the master socket
might be a good habit on operatingthis programmer.
step3: Insert some erased 27256 EPROM into the slave sockets. (Let's
suppose that you have insert 6 pieces into the sockets, from slave0 to
slave5, and the one in slave5 is not blank)
step4: DepressingCOPY[key3] to start the copyaction.
The programmer shows error with the message "Not blank! " and a
series of short beep. Also the LED lamp of the socket 5 was light to
indicate that this one is not blank.
step5: Remove that EPROM from socket and insert a new one, or just
leave this socket empty.
step6: Depressingthe COPY keyagain.
This time the programmer will pass the blank check stage and start to
copythe master's contents into all slaves. Duringthe copying, the
amount of kilobytes been copied was shown on the LCD to show its
progress, and the LED will light if its correspondingIC failed on the
copying.
At the end of the copy, the programmer automaticallydo one
VERIFY command to make sure the correctness of data be copied. The
16

master's checksum was recalculated and displayed again. A noticeable
beep will alert the user if there is anychange at the checksum value
which, in normal situation, shouldn't be happen.
All the failed ICs, includingthe emptysockets, are indicated by
lightingtheir correspondingLED.
17

8. WARRANTY
These products are warranted to be free from defects in materials and
workmanship, but excludingthe ZIF textools which are of expendable
materials, for 18 months from the date of shipment or 12 months after
deliveryto the first purchaser for use, whichever occurs first, providing
that the units have not been misused. Caprilion's obligations hereunder
are limited to repairingor replacinganyunit which upon examination
prove to have been defective within the warrantyperiod specified and
are returned to seller's site at the buyer's expense. Authorization must be
obtained from Caprilion prior to the return of anyproduct under this
warranty. Units or parts which have been subject to the damage of
transportation, accident, alteration, abuse, misuse or unauthorized repair
are not covered bythis warranty.
THE WARRANTY SET FORTH HEREIN IS THE ONLY
WARRANTY, ORALOR WRITTEN, MADE BY CAPRILION
ENTERPRISE CO. AND IS IN LIEU OF ALL OTHER
WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING ANY
LOST OR DAMAGE CAUSED BY ITS USE.
18
This manual suits for next models
1
Table of contents