<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: JTAGulator</title>
	<atom:link href="http://www.epanorama.net/blog/2013/08/14/jtagulator/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2013/08/14/jtagulator/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Tue, 14 Apr 2026 22:35:42 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/08/14/jtagulator/comment-page-1/#comment-1832424</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 16 Jul 2024 20:23:36 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=21037#comment-1832424</guid>
		<description><![CDATA[https://blog.samtec.com/post/what-is-a-jtag-connector/]]></description>
		<content:encoded><![CDATA[<p><a href="https://blog.samtec.com/post/what-is-a-jtag-connector/" rel="nofollow">https://blog.samtec.com/post/what-is-a-jtag-connector/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/08/14/jtagulator/comment-page-1/#comment-1827409</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 13 May 2024 11:48:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=21037#comment-1827409</guid>
		<description><![CDATA[https://hackaday.com/2024/05/12/jtag-hacking-an-ssd-with-a-pi-a-primer/]]></description>
		<content:encoded><![CDATA[<p><a href="https://hackaday.com/2024/05/12/jtag-hacking-an-ssd-with-a-pi-a-primer/" rel="nofollow">https://hackaday.com/2024/05/12/jtag-hacking-an-ssd-with-a-pi-a-primer/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/08/14/jtagulator/comment-page-1/#comment-1810375</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 12 Aug 2023 11:32:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=21037#comment-1810375</guid>
		<description><![CDATA[https://hackaday.com/2023/08/11/using-jtag-to-dump-the-xboxs-secret-boot-rom/]]></description>
		<content:encoded><![CDATA[<p><a href="https://hackaday.com/2023/08/11/using-jtag-to-dump-the-xboxs-secret-boot-rom/" rel="nofollow">https://hackaday.com/2023/08/11/using-jtag-to-dump-the-xboxs-secret-boot-rom/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/08/14/jtagulator/comment-page-1/#comment-1682853</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 21 Jun 2020 11:23:41 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=21037#comment-1682853</guid>
		<description><![CDATA[A Hacker’s Guide To JTAG
https://hackaday.com/2020/04/08/a-hackers-guide-to-jtag/]]></description>
		<content:encoded><![CDATA[<p>A Hacker’s Guide To JTAG<br />
<a href="https://hackaday.com/2020/04/08/a-hackers-guide-to-jtag/" rel="nofollow">https://hackaday.com/2020/04/08/a-hackers-guide-to-jtag/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/08/14/jtagulator/comment-page-1/#comment-1234206</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 20 Sep 2014 06:29:17 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=21037#comment-1234206</guid>
		<description><![CDATA[Given an Arduino compatible microcontroller JTAGenum scans pins[] for basic JTAG functionality and can be used to enumerate the IR for undocumented opcodes.

https://github.com/cyphunk/JTAGenum/]]></description>
		<content:encoded><![CDATA[<p>Given an Arduino compatible microcontroller JTAGenum scans pins[] for basic JTAG functionality and can be used to enumerate the IR for undocumented opcodes.</p>
<p><a href="https://github.com/cyphunk/JTAGenum/" rel="nofollow">https://github.com/cyphunk/JTAGenum/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/08/14/jtagulator/comment-page-1/#comment-34315</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 03 Oct 2013 06:37:10 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=21037#comment-34315</guid>
		<description><![CDATA[JTAGulator
http://www.grandideastudio.com/portfolio/jtagulator/

JTAGulator is an open source hardware tool that assists in identifying OCD connections from test points, vias, or component pads on a target device.

Assembled JTAGulators are available from Parallax, Inc.

JTAGulator $159.99
http://parallax.com/product/32115]]></description>
		<content:encoded><![CDATA[<p>JTAGulator<br />
<a href="http://www.grandideastudio.com/portfolio/jtagulator/" rel="nofollow">http://www.grandideastudio.com/portfolio/jtagulator/</a></p>
<p>JTAGulator is an open source hardware tool that assists in identifying OCD connections from test points, vias, or component pads on a target device.</p>
<p>Assembled JTAGulators are available from Parallax, Inc.</p>
<p>JTAGulator $159.99<br />
<a href="http://parallax.com/product/32115" rel="nofollow">http://parallax.com/product/32115</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/08/14/jtagulator/comment-page-1/#comment-34314</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 03 Oct 2013 06:25:48 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=21037#comment-34314</guid>
		<description><![CDATA[JTAGulator Finds Debug Interfaces
http://hackaday.com/2013/10/02/jtagulator-finds-debug-interfaces/

[Joe Grand] has come up with a tool which we think will be useful to anyone trying to hack a physical device: The JTAGulator. We touched on the JTAGulator briefly during our DEF CON coverage, but it really deserves a more in-depth feature. The JTAGulator is a way to discover On Chip Debug (OCD) interfaces on unfamiliar hardware.

Open any cell phone, router, or just about any moderately complex device today, and you’ll find test points. Quite often at least a few of these test points are the common JTAG / IEEE 1149.1 interface.

JTAG interfaces have 5 basic pins: TDI (Test Data In), TDO (Test Data Out), TCK (Test Clock), and TMS (Test Mode Select), /TRST (Test Reset) (optional).

If you’re looking at a PCB with many test points, which ones are the JTAG pins? Also which test points are which signals?

The idea is simple: Connect the JTAGulator to the test points on the PCB under test, issue a few commands via a serial terminal, and let the JTAGulator do the rest. It performs a brute force approach on every permutation of pins, issuing basic JTAG commands – either IDCODE or BYPASS, and looking for a response. If any valid responses are received, the JTAGulator displays the found interface’s pinout.]]></description>
		<content:encoded><![CDATA[<p>JTAGulator Finds Debug Interfaces<br />
<a href="http://hackaday.com/2013/10/02/jtagulator-finds-debug-interfaces/" rel="nofollow">http://hackaday.com/2013/10/02/jtagulator-finds-debug-interfaces/</a></p>
<p>[Joe Grand] has come up with a tool which we think will be useful to anyone trying to hack a physical device: The JTAGulator. We touched on the JTAGulator briefly during our DEF CON coverage, but it really deserves a more in-depth feature. The JTAGulator is a way to discover On Chip Debug (OCD) interfaces on unfamiliar hardware.</p>
<p>Open any cell phone, router, or just about any moderately complex device today, and you’ll find test points. Quite often at least a few of these test points are the common JTAG / IEEE 1149.1 interface.</p>
<p>JTAG interfaces have 5 basic pins: TDI (Test Data In), TDO (Test Data Out), TCK (Test Clock), and TMS (Test Mode Select), /TRST (Test Reset) (optional).</p>
<p>If you’re looking at a PCB with many test points, which ones are the JTAG pins? Also which test points are which signals?</p>
<p>The idea is simple: Connect the JTAGulator to the test points on the PCB under test, issue a few commands via a serial terminal, and let the JTAGulator do the rest. It performs a brute force approach on every permutation of pins, issuing basic JTAG commands – either IDCODE or BYPASS, and looking for a response. If any valid responses are received, the JTAGulator displays the found interface’s pinout.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
