Supported formats:
- Raw hex:
01000000011a00006a37657300000000 - With 0x prefix:
0x01000000 0x011a0000 - Spaced:
01 00 00 00 01 1a 00 00 - Multiple lines supported
About This Tool
This tool parses UART SoC ID data from Texas Instruments K3 processors. When a K3 SoC is in UART boot mode, it outputs encoded device information that can be parsed to reveal:
Parsed Information
| Category | Field | Description |
|---|---|---|
| Header | NumBlocks | Number of data blocks present |
| Public ROM | SubBlockId | Block identifier |
| SubBlockSize | Size of the block | |
| DeviceName | TI device name (e.g., j7es, am64x) | |
| DeviceType | Device type (GP, HS, etc.) | |
| DMSC ROM Version | Device Management and Security Controller version | |
| R5 ROM Version | ARM Cortex-R5 processor ROM version | |
| Secure ROM (if present) |
Sec Prime | Security prime number |
| Key Revision | Security key revision | |
| Key Count | Number of security keys | |
| TI MPK Hash | TI Manufacturer Public Key hash | |
| Customer MPK Hash | Customer Manufacturer Public Key hash | |
| Unique ID | Device unique identifier |
Sample SoC ID hex data:
01000000011a00006a3765730000000000000000475020200101010001010100
This example shows SoC ID data for a j7es (Jacinto 7) device with GP (General Purpose) security type.