Forum Discussion
Altera_Forum
Honored Contributor
13 years agoHi,
I've got the same issue with the Stratix V DSP Development Kit: USB Blaster is working correctly using the Quartus Programmger. But the "Board Test System" just shows the following error message:Connecting to the target...
java.lang.Exception: Could not find device 0x029070DD
This problem could be caused by an older version of Quartus. Please ensure Quartus 9.0 is installed.
Starting the BTS using the command line (c:\programme\altera\quartus12.1\kits\stratixvgs_5sgsmd5kf40_dsp\examples\board_test_system>jre1.6.0_07\bin\java.exe -djava.library.path=lib -jar bts.jar) gives the following output: 19.02.2013 16:25:12 com.altera.systemconsole.internal.core.SystemConsole logSevere
SCHWERWIEGEND: Unable to find AJIDevice constructor
java.lang.RuntimeException: Unable to find AJIDevice constructor
at com.altera.systemconsole.internal.plugin.jtag.aji.AJICable.getDevices0(Native Method)
at com.altera.systemconsole.internal.plugin.jtag.aji.AJIChannel.scanDevices(AJIChannel.java:79)
at com.altera.systemconsole.internal.plugin.jtag.aji.AJICable.queryDevices(AJICable.java:182)
at com.altera.systemconsole.internal.plugin.jtag.JtagConnectionProvider.queryCableDevices(JtagConnectionProvider
.java:228)
at com.altera.systemconsole.internal.plugin.jtag.JtagConnectionProvider.doRescan(JtagConnectionProvider.java:194
)
at com.altera.systemconsole.internal.plugin.jtag.JtagConnectionProvider.access$000(JtagConnectionProvider.java:4
0)
at com.altera.systemconsole.internal.plugin.jtag.JtagConnectionProvider$2$1.run(JtagConnectionProvider.java:119)
19.02.2013 16:25:12 com.altera.systemconsole.internal.core.SystemConsole logInfo
INFO: Finished discovering JTAG connections Running "jtagconfig --debug" yields the following output: 1) USB-BlasterII
029070DD 5SGSMD5H(1|2|3)/5SGSMD5K1/.. (IR=10)
020A40DD 5M(1270ZF324|2210Z)/EPM2210 (IR=10)
Node 00406E7B (110:8)# 123
Node 00406E00 (110:8)# 0
Node 00406E01 (110:8)# 1
Captured DR after reset = (029070DD020A40DD)
Captured IR after reset = (55555)
Captured Bypass chain = (0) So the device with id "0x029070DD" is actually accesible through the jtag chain.