See 'WikiDevi' @ the Internet Archive (MW XML, Files, Images)
upgraded MW to 1.30 - maybe things are slightly less broken

Electric imp IMP001

From WikiDevi
Jump to: navigation, search

electric imp IMP001

Manuf/OEM/ODM Lite-On

FCC approval date: 19 July 2012
UPC: 713757100014 (UPC DB, On eBay)
Country of manuf.: China

Amazon image

B009K2ILKK (Flag of the United States.svg, On Amazon, On CCC)
B00G3IJ6GM (Flag of the United States.svg, On Amazon, On CCC)
B01N47J61L (Flag of the United States.svg, On Amazon, On CCC)

Type: module

Industry Canada ID: 4491A-IMP001

Power: ? VDC, ? A

CPU1: STMicroelectronics STM32F205 (120 MHz)
FLA1: 1 MiB
1,048,576 B
8,192 Kib
1,024 KiB
8 Mib
9.765625e-4 GiB
(STMicroelectronics STM32F205)
RAM1: 128 KiB
0.125 MiB
131,072 B
1,024 Kib
1 Mib
1.220703e-4 GiB
(STMicroelectronics STM32F205)

Expansion IFs: SD Card
Serial: yes

WI1 chip1: Broadcom BCM43362
WI1 802dot11 protocols: bgn
WI1 MIMO config: 1x1:1
WI1 antenna connector: none


802dot11 OUI: 0C:2A:69 (-, 1 W, 2012)

For a list of all currently documented Broadcom chipsets with specifications, see Broadcom.
For a list of all currently documented STMicroelectronics chipsets with specifications, see STMicroelectronics.

WiFi IoT Module in SD Card form factor

The labels "EEL_BCM43362_A" and "323C1627834D" are

silkscreened on the bottom side of the board.
SoC: ARM Cortex-M3 MCU (120MHz max, 32-bit Core)
with Adaptive real-time accelerator (ART. Accelerator)
1MB Flash memory, MPU, UART, I²C, CAN, SDIO, USB OTG


There are a number of test pads available on the bottom of

the board which can be used to access the bootloader.

You can interface with it using any 3.3V TTL RS-232 interface

and stm32loader code. The wiring required:
Pin name on board RS232 pin Notes
PIN1 RXD On SD card, this is UART3_TXD
PIN2 TXD On SD card, this is UART3_TXD
 sudo ./ -p /dev/ttyUSB0 -V
 Open port /dev/ttyUSB0, baud 115200
 *** Get command
     Bootloader version: 0x30
     Available commands: 0x63, 0x73, 0x82, 0x92
 Bootloader version 30
 *** GetID command
 Chip id: 0x0411 (STM32F2xx)

Do NOT send the Readout Unprotect command (0x92) to the chip,

it will erase the entire flash bricking the device!

Refer to AN1355 for details about the bootloader protocol.

See also[edit]