Source code for spinnman.messages.scp.impl.read_memory

# Copyright (c) 2014 The University of Manchester
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.

from spinn_utilities.overrides import overrides
from spinnman.messages.scp import SCPRequestHeader
from spinnman.messages.scp.abstract_messages import (
    AbstractSCPRequest, AbstractSCPResponse)
from spinnman.messages.scp.enums import SCPCommand, SCPResult
from spinnman.messages.sdp import SDPFlag, SDPHeader
from spinnman.exceptions import SpinnmanUnexpectedResponseCodeException
from spinnman.constants import address_length_dtype


[docs]class ReadMemory(AbstractSCPRequest): """ An SCP request to read a region of memory on a chip. """ __slots__ = [] def __init__(self, x, y, base_address, size, cpu=0): """ :param int x: The x-coordinate of the chip to read from, between 0 and 255 :param int y: The y-coordinate of the chip to read from, between 0 and 255 :param int base_address: The positive base address to start the read from :param int size: The number of bytes to read, between 1 and 256 :raise SpinnmanInvalidParameterException: * If the chip coordinates are out of range * If the base address is not a positive number * If the size is out of range """ # pylint: disable=too-many-arguments super().__init__( SDPHeader( flags=SDPFlag.REPLY_EXPECTED, destination_port=0, destination_cpu=cpu, destination_chip_x=x, destination_chip_y=y), SCPRequestHeader(command=SCPCommand.CMD_READ), argument_1=base_address, argument_2=size, argument_3=address_length_dtype[ (base_address % 4, size % 4)].value)
[docs] @overrides(AbstractSCPRequest.get_scp_response) def get_scp_response(self): return _SCPReadMemoryResponse()
class _SCPReadMemoryResponse(AbstractSCPResponse): """ An SCP response to a request to read a region of memory on a chip. """ __slots__ = [ "_data", "_length", "_offset"] def __init__(self): super().__init__() self._data = None self._length = None self._offset = None @overrides(AbstractSCPResponse.read_data_bytestring) def read_data_bytestring(self, data, offset): if self._scp_response_header.result != SCPResult.RC_OK: raise SpinnmanUnexpectedResponseCodeException( "Read", "CMD_READ", self._scp_response_header.result) self._data = data self._offset = offset self._length = len(data) - offset @property def data(self): """ The data read. .. note:: The data starts at offset. :rtype: bytearray """ return self._data @property def offset(self): """ The offset where the valid data starts. :rtype: int """ return self._offset @property def length(self): """ The length of the valid data. :rtype: int """ return self._length