fwtool
fwtool is a command-line utility for creating, updating, inspecting, and verifying
a custom firmware metadata header prepended to a binary image.
It is intended for firmware packaging workflows where a raw application binary is post-processed into a single flashable image:
a fixed-size header is placed at the beginning that contains version, firmware size, and CRC information
the firmware firmware follows immediately after
This is useful for bootloaders or firmware update logic that need to validate and identify an application image before booting or programming it.
What it does
fwtool supports four subcommands:
attach — prepend a new header to a raw firmware binary
edit — replace the header of an already packaged binary
inspect — print the parsed contents of an existing header
verify — verify that an existing header matches the firmware
Header format
The tool generates a header with the following layout:
Offset |
Size |
Field |
Description |
|---|---|---|---|
|
4 |
magic |
ASCII string |
|
4 |
version |
Little-endian bytes: |
|
4 |
size |
firmware size in bytes, little-endian |
|
4 |
crc32 |
CRC-32/MPEG-2 of firmware, little-endian |
|
— |
padding |
Filled with |
The total header size defaults to 512 bytes and is configurable via
--header-size. It must be a power of two (minimum 16 bytes) so that the
application vector table following it in flash is correctly aligned.
With the default 512-byte header, the padding region spans 0x10..0x1FF
(496 bytes of 0xFF).
Notes
The CRC is calculated over the firmware only, not over the header.
The size stored in the header is the firmware size only.
The version is stored as:
byte 0:
0x00byte 1: patch
byte 2: minor
byte 3: major
For example, version 1.2.3 is stored as:
0x00030201
Typical use case
A common workflow looks like this:
Link the firmware application so that it expects to execute after the reserved header space.
Build the raw application binary.
Use
fwtoolto prepend the metadata header.Program the resulting combined binary into flash.
For example, with the default 512-byte header:
Flash address 0x08004000:
[512-byte metadata header]
[firmware payload]
Installation
Install using pip
pip install fwtool
Install using pipx
pipx install fwtool
Install using uv
uv tool install fwtool
Check installation
fwtool --version
Usage
fwtool <command> [arguments] [options]
Subcommands
Command Description
attach Attach a new header to a raw firmware binary
edit Replace the header of a packaged binary
inspect Print header fields from a packaged binary
verify Verify header of a packaged binary
Common options
--version Show program version and exit
--help Show help message and exit
attach:
fwtool attach <binary> <version> <output> [options]
fwtool attach <binary> <version> --in-place [options]
Argument / Option Description
binary Path to raw input binary file
version Firmware version string (e.g. 1, 1.2, 1.2.3)
output Path to output file
--in-place Modify the input file directly instead of writing output
--header-size N Total header size in bytes; must be a power of 2 (default: 512)
edit:
fwtool edit <binary> <version> <output> [options]
fwtool edit <binary> <version> --in-place [options]
Argument / Option Description
binary Path to packaged binary file with existing header
version New firmware version string
output Path to output file
--in-place Modify the input file directly instead of writing output
--header-size N Total header size in bytes; must be a power of 2 (default: inferred from file)
inspect:
fwtool inspect <binary> [options]
Argument / Option Description
binary Path to packaged binary file
--json Emit machine-readable JSON output
verify:
fwtool verify <binary> [options]
Argument / Option Description
binary Path to packaged binary file
--json Emit machine-readable JSON output
--quiet Suppress output; use exit code only
--header-size N Total header size in bytes; must be a power of 2 (default: inferred from file)
Examples
Attach a new header to a raw binary
fwtool attach firmware.bin 1.2.3 packaged.bin
This creates:
packaged.bin = [512-byte header][firmware.bin firmware]
Attach with a custom header size
fwtool attach firmware.bin 1.2.3 packaged.bin --header-size 1024
Replace the header of an existing packaged binary
fwtool edit packaged.bin 1.2.4 updated.bin
This keeps the firmware but replaces the header with updated metadata.
Replace the header in place
fwtool edit packaged.bin 1.2.4 --in-place
This modifies packaged.bin directly.
Attach a header in place
fwtool attach firmware.bin 1.2.3 --in-place
This replaces the raw input file with a packaged binary containing the header.
Print header contents
fwtool inspect packaged.bin
Example output:
magic: b'XLAB'
version: 1.2.3
size: 123456 bytes
crc32: 0x1a2b3c4d
Print header contents as JSON
fwtool inspect packaged.bin --json
Example output:
{
"magic_ascii": "XLAB",
"magic_hex": "584c4142",
"version": {
"major": 1,
"minor": 2,
"patch": 3,
"string": "1.2.3"
},
"size": 123456,
"crc": {
"int": 439041101,
"hex": "0x1a2b3c4d"
}
}
Verify a packaged binary
fwtool verify packaged.bin
Example output:
magic: OK
version: 1.2.3
header size: 512 bytes
size: OK (header=123456, actual=123456)
crc32: OK (header=0x1a2b3c4d, actual=0x1a2b3c4d)
verification: OK
Verify quietly using only the exit code
fwtool verify packaged.bin --quiet
echo $?
Exit code meanings:
0: verification passed
1: verification failed
Verify with JSON output
fwtool verify packaged.bin --json
Example output:
{
"ok": true,
"magic_ok": true,
"size_ok": true,
"crc_ok": true,
"header_size": 512,
"header": {
"magic_ascii": "XLAB",
"magic_hex": "584c4142",
"version": {
"major": 1,
"minor": 2,
"patch": 3,
"string": "1.2.3"
},
"size": 123456,
"crc": {
"int": 439041101,
"hex": "0x1a2b3c4d"
}
},
"firmware": {
"size": 123456,
"crc": {
"int": 439041101,
"hex": "0x1a2b3c4d"
}
}
}
Header size
The header size is configurable and defaults to 512 bytes.
Rules:
must be a power of two (16, 32, 64, 128, 256, 512, 1024, …)
must be at least 16 bytes (the minimum to hold the metadata fields)
ensures the application vector table following the header is correctly aligned
For edit and verify, if –header-size is not specified, the tool infers the header size from the stored firmware size field:
header_size = file_size - stored_firmware_size
If inference fails (e.g. corrupted size field), use –header-size to specify the size explicitly.
Version handling
Accepted version formats:
1->1.0.01.2->1.2.01.2.3->1.2.3
Rules:
missing components are filled with zero
extra components are ignored
each component must be in the range 0..255
Verification behavior
When fwtool verify is used, the tool checks:
the magic field is
XLABthe firmware size matches the size stored in the header
the firmware CRC matches the CRC stored in the header
The header itself is not included in the size or CRC calculation.
Exit codes
General operations
0on successnon-zero on failure
verify
0if verification succeeds1if verification fails
Common workflow example
Build a raw firmware image:
arm-none-eabi-objcopy -O binary app.elf app.bin
Attach metadata header:
fwtool attach app.bin 1.2.3 app_packed.bin
Verify the packaged image:
fwtool verify app_packed.bin
Program the combined image to flash:
st-flash write app_packed.bin 0x08004000
Notes for embedded use
If your firmware image is packaged with a prepended header, the application must typically be linked to execute after the reserved header region.
Example with the default 512-byte (0x200) header:
metadata region starts at
0x08004000header size is
0x200(512 bytes)application is linked to start at
0x08004200Then the combined image can be programmed at
0x08004000, and the applicationfirmware will land at the correct runtime address.
Development
Run tests
pytest -q
License
MIT License