Skip to content

1b. Installing the Toolchain on Mac

andrewikenberry edited this page Jun 1, 2020 · 23 revisions

Brew

Install the Brew package manager.

Install the toolchain by pasting the following command into Terminal:

brew install make armmbed/formulae/arm-none-eabi-gcc dfu-util

If you're using MacOS Mojave or earlier, you are all set!

For MacOS Catalina and later you will need to temporarily disable security checks on the ARM toolchain. Once you have run the full toolchain you can re-enable the security checks.

Navigate to the root directory of the DaisyExamples repo:

cd ~/Desktop/DaisyExamples

Then run the following:

sudo spctl --master-disable
./rebuild_all.sh
sudo spctl —master-enable

Openocd (optional)

This is only required if you want to program/debug the module using JTAG.

The current release of OpenOCD 0.10 is missing the stm32h7x hardware profile

To use openocd you will need to build latest from a github mirror.

See https://docs.espressif.com/projects/esp-idf/en/latest/api-guides/jtag-debugging/building-openocd-macos.html

Once you have built the openocd tool from master you can run make install. Assuming you are running homebrew and have permissions to /usr/local

To test your OpenOCD install from the root of the libdaisy source tree:

cd core
make openocd

You should see something like the following

Info : auto-selecting first available session transport "hla_swd". To override use 'transport select <transport>'.
Info : The selected transport took over low-level target control. The results might differ compared to plain JTAG/SWD
Info : Listening on port 6666 for tcl connections
Info : Listening on port 4444 for telnet connections
Info : clock speed 1800 kHz
Info : STLINK V2J29S7 (API v2) VID:PID 0483:3748
Info : Target voltage: 3.154331
Info : stm32h7x.cpu: hardware has 8 breakpoints, 4 watchpoints
Info : Listening on port 3333 for gdb connections