Hello and special thanks to private help from @
madao @
strick and @
charlydHere is a status after trying different probings strategies, recording with deep memory (option 2M option of my TDS784D), observing signals of good TDSxxx versus bad TDSxxx to find out a pattern to be investigated.
The way I now use the 3rd TDSxxxD to record and display the bus lines:
* the J23-1 test pin (KAS Kernel Address Probe) goes into AUX input with P6139A passive probe with fall triggering
* the green trace is SRAM Chip Enable
* the blue trace is the EPROM Chip Enable
* the red trace is the SRAM Write Enable (J23-4)
* the yellow trace is J40-A4 connector corresponding to KRNW signal
As a rule of thumb, we can consider in most cases that SRAM Chip Enable is followed by SRAM Output Enable or Write Enable whereas the EPROM Chip Enable is followed by Output Enable. The 8 bits parallel which are sub-part of the 32 bits parallel are easy found on J40 connector.
What is really important to see in the attached 8 pictures, during test 5 phase of the boot when forced to loop via the DIP switches choice, the KRNW (yellow trace) goes pattern cyclic. With the healthy TDS the complete loop to re-run test 1 to test 5 is near 400ms but with the failed TDS, it is around 125 ms. Furthermore we see on the pictures that from 90ms the waveform are really different: good boot and partial failed boot.
Luckily I do have 2M options with my 3rd TDS but it will record half of the time after the trigger. Practically after trigger event, I'll get in fact 4 Meg recording (1 channel), 4 meg recording (2 channels)... even though total memory is 8 Meg.
My idea now of hacking and spying the 8bits parallel bus would be to record say 200 ms of bus activity to embrace the failure near 90 ms time after boot initialization. This would be done on both TDSxxx (good and bad) to then compare the bit streaming different of EPROM and the SRAM.
This could be done in theory by recording each bit, reboot then each time save via GPIB and Python-Visa which works good on my MacBook Air then re-build the actual HEX content of the 8bits parallel.
Another option would be that I purchase a USB logic analyzer made by SALEAE (Logic Pro16), it has much bigger deep memory plus streaming bandwidth. This way i'd get at the same time the chip signals (Enable, read, write) and the 8 bits parallel except I'd need to write a special C routine to implement the asynchronous parallel bus decoder not found on SALEAE suite.
Note that the asynchronous clock of the TDSxxx Kernel bus is around 2.5MHz so I need to have at least samples per clock and ideally say 10 samples per clock to properly decode the bits. All this to say that now it is clear the boot failure occurs between 125 ms to 500 ms but the TDS784D even with 2M options does not have enough deep memory recording.
Either I'll go hack the hard and pain way with no budget or I might decide to purchase SALEAE or another USB logic analyzer... not easy with Covid19 economical impact but at least, thanks to three TDSxxxD now I can identity where and when to look for the boot failure.
P.S. Most of the built-in decoders of SALEAE are serial so not applicable here but I might use the unit to try some RF hacking projects. After all, a wireless bus is serial