I'm completely new to this and have recently found:
https://www.ebay.co.uk/itm/ESP32-CAM-MB ... 4204150016
which should be the same as:
https://www.amazon.com/Aideepen-ESP32-C ... 578LV?th=1
so I bought it and give it a try. Docs were clear enough and I tried flashing esp32-idf4-20210202-v1.14.bin (and some other images later), but even though flashing it was always successful according to output, I was not able to boot it at all.
Code: Select all
$ esptool.py --chip esp32 --port /dev/ttyUSB0 --before default_reset --after hard_reset erase_flash
esptool.py v3.0
Serial port /dev/ttyUSB0
Connecting.....
Chip is ESP32-D0WDQ6 (revision 1)
Features: WiFi, BT, Dual Core, 240MHz, VRef calibration in efuse, Coding Scheme None
Crystal is 40MHz
MAC: 9c:9c:1f:c8:13:f4
Uploading stub...
Running stub...
Stub running...
Erasing flash (this may take a while)...
Chip erase completed successfully in 3.1s
Hard resetting via RTS pin...
(in same cases here I removed the power and then plugged it again)
$ esptool.py --chip esp32 --port /dev/ttyUSB0 --baud 460800 write_flash --verify -z 0x1000 ./esp32-idf4-20210202-v1.14.bin
esptool.py v3.0
Serial port /dev/ttyUSB0
Connecting......
Chip is ESP32-D0WDQ6 (revision 1)
Features: WiFi, BT, Dual Core, 240MHz, VRef calibration in efuse, Coding Scheme None
Crystal is 40MHz
MAC: 9c:9c:1f:c8:13:f4
Uploading stub...
Running stub...
Stub running...
Changing baud rate to 460800
Changed.
Configuring flash size...
Compressed 1567824 bytes to 982369...
Wrote 1567824 bytes (982369 compressed) at 0x00001000 in 22.0 seconds (effective 569.3 kbit/s)...
Hash of data verified.
Leaving...
Verifying just-written flash...
(This option is deprecated, flash contents are now always read back after flashing.)
Verifying 0x17ec50 (1567824) bytes @ 0x00001000 in flash against esp32-idf4-20210202-v1.14.bin
-- verify OK (digest matched)
Hard resetting via RTS pin...
When I try to read something, I only get:
Code: Select all
$ jpnevulator --ascii --timing-print --tty /dev/ttyUSB0 --read
2021-03-26 23:12:36.138644:
65 74 73 20 4A 75 6E 20 20 38 20 32 30 31 36 20 ets Jun 8 2016
30 30 3A 32 32 3A 35 37 0D 0A 0D 0A 72 73 74 3A 00:22:57....rst:
30 78 31 20 28 50 4F 57 45 52 4F 4E 5F 52 45 53 0x1 (POWERON_RES
45 54 29 2C 62 6F 6F 74 3A 30 78 31 33 20 28 53 ET),boot:0x13 (S
alternatively I get nothing back or just something random:
Code: Select all
jpnevulator --ascii --timing-print --tty /dev/ttyUSB0 --read
2021-03-27 14:30:41.665467:
92 CD 28 36 5C 55 71 2B 71 70 D1 D0 E0 D2 65 5D ..(6\Uq+qp....e]
1B 6A 91 E9 F9 4A 3D 88 0A .j...J=..
Has anyone experience with this? Is it stuck in download mode?
Thanks,
Vedran