This board can be programmed via the SE UART interface using the Alif Security Toolkit. MicroPython uses a custom version of the toolkit, which can be downloaded from here or cloned:
git clone https://github.com/micropython/alif-security-toolkit/
If needed, update the SE firmware to match the version used by MicroPython. Ensure you have the correct port, part number, and chip revision.
python alif-security-toolkit/toolkit/updateSystemPackage.py --port /dev/ttyACM0 --cfg-part AE722F80F55D5LS --cfg-rev B4
Note: The board must be power-cycled after this step.
Download (or build) the firmware package, unzip it, then deploy it:
python alif-security-toolkit/toolkit/app-write-mram.py --port /dev/ttyACM0 --cfg-part AE722F80F55D5LS --cfg-rev B4 --pad --images file:build-ALIF_ENSEMBLE/application_package.ds
The MicroPython REPL is available on the second USB serial port, eg /dev/ttyACM1
.