Is it possible to dump a copy of the original USBizi firmware by using a JTAG debugger/programmer? Such as http://www.sparkfun.com/products/7834
from my research, I need to wire up the JTAG, and then use OpenOCD, the commands for reading flash memory are here:
reading the LPC2387 datasheet, there are three levels of code protection, and any one of them disables JTAG.
So does anybody know if the code is protected?