Flashing and Debugging A Firmware in Detail
Source: Dev.to
Inspect, Flash, and Debug an STM32F446RE Firmware
In this tutorial I will inspect, flash, and debug a firmware built for the STM32F446RE microcontroller.
To accomplish this we need a few dedicated tools:
openocd– the primary tool that bridges the host machine and the debugger hardware (I’m using an ST‑Link).arm-none-eabi-*– the ARM toolchain used to build the firmware.gdb-multiarch– the GDB front‑end for debugging.
Installing the required tools
On Ubuntu 24.04 the following command installs everything we need:
sudo apt install openocd gcc-arm-none-eabi gdb-multiarch
Note: The
gcc-arm-none-eabipackage on Ubuntu does not includearm-none-eabi-gdb, so we installgdb-multiarchseparately. On some other distributions the GDB debugger is bundled with the toolchain.
1. Inspecting the firmware
Assume we have a firmware file called firmware.elf.
The first step is to query the file itself:
$ file firmware.elf
firmware.elf: ELF 32-bit LSB executable, ARM, EABI5 version 1 (SYSV), statically linked, with debug_info, not stripped
The file command reports the ELF properties (endianness, architecture, etc.).
We can also view the section sizes with arm-none-eabi-size:
$ arm-none-eabi-size firmware.elf
text data bss dec hex filename
5252 20 1732 7004 1b5c firmware.elf
If you are unfamiliar with ELF sections, see my earlier tutorials that explain the ELF format.
Disassembling the .text section
To look at the actual code, use arm-none-eabi-objdump:
$ arm-none-eabi-objdump -j .text -d firmware.elf
firmware.elf: file format elf32-littlearm
Disassembly of section .text:
(...)
0800079c :
800079c: b500 push {lr}
800079e: b091 sub sp, #68 @ 0x44
80007a0: f000 f8ac bl 80008fc
80007a4: f000 f82c bl 8000800
80007a8: f000 f844 bl 8000834
80007ac: 4911 ldr r1, [pc, #68] @ (80007f4 )
80007ae: 4d12 ldr r5, [pc, #72] @ (80007f8 )
80007b0: 4c12 ldr r4, [pc, #72] @ (80007fc )
80007b2: 4668 mov r0, sp
80007b4: f7ff ff08 bl 80005c8
80007b8: 4668 mov r0, sp
80007ba: f7ff ff81 bl 80006c0
80007be: f04f 33ff mov.w r3, #4294967295 @ 0xffffffff
80007c2: b282 uxth r2, r0
80007c4: 4669 mov r1, sp
80007c6: 480d ldr r0, [pc, #52] @ (80007fc )
80007c8: f000 fdc2 bl 8001350
80007cc: 4629 mov r1, r5
80007ce: 4668 mov r0, sp
80007d0: f7ff fefa bl 80005c8
80007d4: 4668 mov r0, sp
80007d6: f7ff ff73 bl 80006c0
80007da: f04f 33ff mov.w r3, #4294967295 @ 0xffffffff
80007de: b282 uxth r2, r0
80007e0: 4669 mov r1, sp
80007e2: 4620 mov r0, r4
80007e4: f000 fdb4 bl 8001350
80007e8: f44f 707a mov.w r0, #1000 @ 0x3e8
80007ec: f000 f8b2 bl 8000954
80007f0: e7ec b.n 80007cc
80007f2: bf00 nop
80007f4: 0800146c .word 0x0800146c
80007f8: 08001489 .word 0x08001489
80007fc: 20000084 .word 0x20000084
(...)
You can see the main() function in the .text section.
- Left column – address of each instruction.
- Middle column – raw machine code.
- Right column – disassembled assembly.
Inspecting ELF executables is a huge topic with many viewpoints; the above is just a quick look.
2. Flashing the firmware
“Flashing” means writing the appropriate sections of the ELF file into the microcontroller’s flash memory.
We’ll use OpenOCD for this.
Starting the OpenOCD server
Connect the STM32 board (via ST‑Link) to the host, then run:
$ openocd -f interface/stlink.cfg -f target/stm32f4x.cfg
interface/stlink.cfg– configuration for the ST‑Link adapter.target/stm32f4x.cfg– configuration for the STM32F4 family (includes the Cortex‑M4 core).
OpenOCD will start a server that can be accessed via Telnet (port 4444) or GDB (port 3333).
Typical output looks like this:
Open On-Chip Debugger 0.12.0
Licensed under GNU GPL v2
For bug reports, read
http://openocd.org/doc/doxygen/bugs.html
Info : auto-selecting first available session transport "hla_swd". To override use 'transport select '.
Info : The selected transport took over low-level target control. The results might differ compared to plain JTAG/SWD
Info : Listening on port 6666 for tcl connections
Info : Listening on port 4444 for telnet connections
Info : clock speed 2000 kHz
Info : STLINK V2J33M25 (API v2) VID:PID 0483:374B
Info : Target voltage: 3.224656
Info : [stm32f4x.cpu] Cortex-M4 r0p1 processor detected
Info : [stm32f4x.cpu] target has 6 breakpoints, 4 watchpoints
Info : starting gdb server for stm32f4x.cpu on 3333
Info : Listening on port 3333 for gdb connections
Now the target is ready to be programmed or debugged.
3. Debugging with GDB
In another terminal, launch gdb-multiarch (or arm-none-eabi-gdb if you have it) and connect to the OpenOCD GDB server:
$ gdb-multiarch firmware.elf
(gdb) target remote localhost:3333
You can now set breakpoints, step through code, inspect registers, etc.:
(gdb) break main
(gdb) continue
(gdb) info registers
(gdb) disassemble main
Recap
- Inspect the ELF file with
file,arm-none-eabi-size, andarm-none-eabi-objdump. - Flash the firmware using OpenOCD (
openocd -f interface/stlink.cfg -f target/stm32f4x.cfg). - Debug with GDB (
gdb-multiarchorarm-none-eabi-gdb) over the OpenOCD GDB server.
With these tools you can fully explore, program, and troubleshoot STM32F446RE firmware from the command line. Happy hacking!
Flashing and Debugging with OpenOCD & GDB
1. OpenOCD ports
OpenOCD exposes two ports:
- 4444 – Telnet interface
- 3333 – GDB remote‑debug interface
You will connect GDB to the 3333 port.
2. Start a GDB session
Open a second terminal and run:
$ gdb-multiarch firmware.elf
You are now inside the GDB prompt.
Connect to OpenOCD
(gdb) target remote localhost:3333
You now have full control over flashing and debugging.
3. Flash the firmware
Run the following commands in the GDB session:
(gdb) monitor reset halt
(gdb) load
(gdb) monitor reset halt
How the commands work
monitor …– Sent directly to OpenOCD.load– GDB command that writes the ELF sections to the target.
Typical output:
Loading section .isr_vector, size 0x1c4 lma 0x8000000
Loading section .text, size 0x126c lma 0x8000200
Loading section .rodata, size 0x4c lma 0x800146c
Loading section .ARM, size 0x8 lma 0x80014b8
Loading section .init_array, size 0x4 lma 0x80014c0
Loading section .fini_array, size 0x4 lma 0x80014c4
Loading section .data, size 0xc lma 0x80014c8
Start address 0x08001400, load size 5272
Transfer rate: 9 KB/sec, 753 bytes/write.
If you see this, the firmware has been successfully flashed 🎉.
4. One‑step flashing (no debugging)
If you only need to flash the firmware, you can skip the GDB session entirely:
$ openocd -f interface/stlink.cfg -f target/stm32f4x.cfg \
-c "program firmware.elf verify reset exit"
This single command programs the device and exits.
5. Basic GDB debugging commands
Below are some of the most common GDB commands you’ll use while debugging:
(gdb) break main # set a breakpoint at `main`
(gdb) continue # resume execution
(gdb) next # step over the next line
(gdb) finish # run until the current function returns
(gdb) print var # display the value of `var`
(gdb) x/16wx *ptr # examine memory at `*ptr`
(gdb) set var = 42 # change the value of `var`
(gdb) list # show source code around the current line
Debugging is a deep topic that can’t be covered fully in a short tutorial. For a comprehensive guide, see The Art of Debugging with GDB, DDD, and Eclipse by Norman Matloff and Peter Jay Salzman.
6. Summary
- OpenOCD provides a GDB‑compatible port (3333).
- Use
gdb-multiarchto connect, thentarget remote localhost:3333. - Flash with
monitor reset halt→load→monitor reset halt. - For a quick flash without debugging, use the one‑liner OpenOCD command.
- Familiarize yourself with basic GDB commands for effective debugging.
I’ll cover additional topics and advanced usage in future sections. Happy hacking!