This is the page for the RockChip
Nano-B system-on-chip. Little is known currently about this chip for which we do not have any kind of documentation. This page tries to summarize what is known.
It is believed that the RKNanoB?
is somehow related with the RK27xx and the RK28xx. The ARM core has been identified as a Cortex-M3 (from CPUID). The official brief for rknano-C confirms the core and specifies 100MHz max core frequency, 128kB of static ram and 96kB of dram.
System Memory Map
The system memory map is consistent with the ARMv7 Architecture, we refer to this document for more information.
|| on-chip RAM
|| on-chip RAM
|| on-chip peripherals
|| RAM (cached)
|| RAM (write-through)
|| Shared device space
|| Non-shared device space
|| System region
The system region contains all the standard ARMv7 devices:
|| Interrupt Controller Type and Auxillary Control
|| System timer
|| External Interrupt Controller
|| System Control Block
The peripherals region contains the following blocks:
From ARM Cortex-M3, it has two bit-band regions:
|| 1MB on-chip RAM region
|| bit-band SRAM alias
|| 1MB peripheral region
|| bit-band peripheral alias
The RKNano-B seems to use the RAM region for peripherals because it doesn't have external RAM. The following regions are known:
The USB core is mapped at address 0x62000000. It seems to be consistent with the Synopsys USB OTG HS controller which can be found the STM32 F2 line for example. See the reference manual of the STM32 F2 for the register description.
Similarly to the Rockchip27xx, it has a USB DFU mode which allows to upload code to the device. This mode is enhanced with respect to the Rockchip27xx since one can send an arbitrary large binary: it must be split up in pieces of 4096 bytes. The payload is encrypted in continuous mode using XOR routine of the Rockchip27xx. The binary is standard Cortex image: it starts with the address of the stack, then 30 entries for the vector table and then the code. As with the Rockchip27xx, the data sent is appended two bytes of CRC. The code is loaded at 0x01000000.
- 16 Mar 2013
Copyright © by the contributing authors.