The fix_project.py script is designed to configure VisualGDB projects for JTAG debugging with ESP32-C3 or ESP32-C6 Arduino projects. It automates the process of applying the necessary settings to the .vgdbproj file, ensuring compatibility with the ESP32 debugging setup.
To use the script, follow these steps:
1. Place the fix_project.py script in the root directory of your VisualGDB project, where the .vgdbproj file is located.
2. Manually copy the boot_app0.bin file into the root directory of your project. You can find this file in the Arduino ESP32 package directory: C:\Users[USERNAME]\Documents\ArduinoData\packages\esp32\hardware\esp32[VERSION]\tools\partitions\boot_app0.bin
3. Open a terminal (Command Prompt or PowerShell) and navigate to the project directory.
4. Run the script using the following command: python fix_project.py [esp32c3|esp32c6] Replace [esp32c3|esp32c6] with the chip you are using (e.g., esp32c3 for ESP32-C3).
5. The script will:
• Create a backup of the .vgdbproj file before making any changes.
• Update the CommandLine section to include the correct JTAG configuration for the selected chip.
• Enable ProgramMode in the project file.
• Replace the StartupCommands section with the necessary GDB commands for flashing and debugging.
• Ensure AutoDetectRTOS is enabled.
• Set the correct path for GDBBinaryOverride to point to the ESP32 GDB executable.
6. After running the script, reload the project in Visual Studio.
7. Press F5 to start debugging. The project should now be correctly configured for JTAG debugging with ESP32-C3 or ESP32-C6.
8. Important: If you make any changes to the VisualGDB Project Properties, you must run the fix_project.py script again to reapply the necessary configurations.
This script simplifies the setup process, ensuring all required configurations are applied automatically. If you encounter any issues, double-check the project file and ensure all dependencies are correctly installed.
-
This topic was modified 1 hour, 32 minutes ago by
NKK72.
Attachments:
You must be
logged in to view attached files.