E1/E20/E2/E2 Lite Additional Document 3. Notes on Usage
R20UT2937EJ0301 Rev.3.01 Page 36 of 45
Jul 1, 2020
3.3 MCU Resources to be Occupied
Figure 3-1 shows the areas which are occupied by the E1/E20/E2/E2 Lite for debugging.
These areas (shaded sections) are used for debugging. These areas should not be changed to save the
user program or data. If a change is made, control by the E1/E20/E2/E2 Lite is no longer possible.
However, when "No" is selected in the [Permit flash programming] property of the debugger, the internal
ROM spaces shown in Figure 3-1 are not used (only the internal RAM spaces are used).
When selecting not to permit flash memory rewriting with the debugger's property, also refer to section
3.3.3, Setting an On-Chip Debugging Option Byte.
00000h
Security ID area
10 bytes
000C3h
Reset vector area
2 bytes
00002h
Debug monitor area
2 bytes
00004h
On-chip debug
option byte area
1 byte
000C4h
000CEh
Debug monitor area
10 bytes
000D8h
Stack area for debugging
10 bytes
Area for pseudo-RRM/
pseudo-DMM
4 bytes
Internal
ROM end
address
Internal ROM
space
Internal
RAM end
address
Internal RAM
space
Figure 3-1 MCU Resources to be Occupied
*1 The reset vector area is used by the program for the E1/E20/E2/E2 Lite when performing debugging
with the E1/E20/E2/E2 Lite. If the contents of the reset vector area are changed, control by the
E1/E20/E2/E2 Lite is no longer possible.
3.3.1 Securing an Area for the Debugging Monitor Program
You may need to secure the area to which the debugging monitor program is to be allocated. The
monitor program initializes the debugger communications interface and handles processing to make the
CPU run or break execution.
The user program or data must not be placed within 23 bytes of the on-chip debugging option byte.
In addition, the reset vector must be changed if it points to an address to which the monitor program is
allocated.
The working RAM for the pseudo-RRM/pseudo-DMM starts at addresses 0x02 and 0x03.
The internal ROM spaces, including the debug monitoring area, are erased when the debugger is
closed.
[Securing the area]
Specifically securing the area for the monitor program is not necessarily required if the user program
does not use the area.
However, to avoid problems that may occur while the debugger is starting up, we recommend securing
this area in advance by using a build tool or some other means.