I borked my original BCM so I decided to reverse engineer it and see if I can fix it in the process.
The first BCM Calibration File I could find was '8R29-14D511-AB.zip' which contains 8R29-14D511-AB.PHF.
The archive does not have a password.
PHF - Packed HEX Format?
There are two sections to this file - The description and the contents. These two sections are separated by 0x00 0x24 0x00.
The lines in the header are plain text. Replacing 0x00 with 0x0D 0x0A will give you something like this...
- Code: Select all
APPLICATION>BPM Application
MASK NUMBER>Rev0 3 July 2008
FILE NAME>SW-8R29-14D511-AB.HEX
RELEASE DATE>07/03/08
MODULE TYPE>Bluetooth Phone Module
PRODUCTION MODULE PART NUMBER>8R29-14D509-AA
WERS NOTICE>
COMMENTS>
RELEASED BY>Sumitomo Wiring Systems Australia
MODULE NAME>BPM
MODULE ID>0x781
DOWNLOAD FORMAT>0x00
FILE CHECKSUM>0xE5C3
FLASH INDICATOR>1
FLASH ERASE SECTORS>0x00
The remainder of the file is Intel HEX. Easy!
...Moving on...
The two attached files are of the front and back of the PCB. The intentional overexposure is to grab the IC markings.
The PCB is from an early model '8R29 19C112 AA' BPM.
U3 - MIC5239 - 500mA LDO regulator.
U4 - MB3793 - Power Voltage Monitoring IC with Watchdog Timer
U5 - BC358239A - Single Chip Bluetooth® v1.2 System
U6 - ???2-Wire Serial EEPROM???
U8 - V850ES - 32-bit Single-Chip Microcontroller
U9 - TJA1041 - high speed CAN transceiver
U10 - ???SPI Flash???
U11 - TDA8541 - 1 W BTL audio amplifier