DatasheetQ Logo
Electronic component search and free download site. Transistors,MosFET ,Diode,Integrated circuits

ST20 Просмотр технического описания (PDF) - STMicroelectronics

Номер в каталоге
Компоненты Описание
производитель
ST20 Datasheet PDF : 21 Pages
1 2 3 4 5 6 7 8 9 10 Next Last
ST20–SWC
3 INQUEST windowing debugger
The INQUEST debugger can debug ANSI C ST20 programs either interactively or post-mortem. A
user interface displays source code or disassembled code and enables the user to interact with the
debugger by means of buttons and menus, mouse and keyboard. The interface is built using the X
Window System and OSF/Motif for Sun-4s or Microsoft Windows for PCs.
The program being debugged may consist of any number of tasks (or threads of execution) some
of which may be running while others are stopped or being single stepped. The host debugger
program is asynchronous and holds a copy of the last stopped state of each thread, so values may
be inspected by the host while the user program is running on the ST20. Multiple debugging windows
may be opened to view different parts of the program simultaneously.
The INQUEST debugger has three debugging modes:
interactive debugging, i.e. monitoring the application as it executes on the target processor;
post-mortem debugging on the target processor when the application has stopped;
post-mortem debugging on the host from a dump file.
Inquest
File Ex ecution E vents Variables O ptions W indow H elp
Program : C :\INQUEST\EXAMPLES\APP_C\APP .BTL
C:\INQUEST\EXAMPLES\APP_C\control.c
30
do
31
{
32
printf(”Please type n : ”);
33
} while (scanf(”%d”, &n) !=1);
34
35
return (n);
36
}
37
38
void close_down (Channel *in, Channel *o
Inquest - Cmdline
3 1 app main : breakpoint 6 at <app.c 26 0>
0 0 > continue
0 0 > interrupt
3 2 app control : interrupted at #8001130d
Inquest - Browser
Processes
app main : running
app control: stopped at #8001130d
app sum: chan-waiting
app feed: chan-waiting
Continue
Interrupt
FAreg: 0.000000 FBreg: 0.000000 FCreg: 0.000000
Step Step Out Break
Next
Step T o Watch
Delete
Print
3 2>
Jump
Print *
Locate
Last Evt
Figure 2 The Microsoft Windows debugger display
Processes
Threads
Inquest - Browser
3 factorial( ) at <facs.c 25 0>
2 factorial( ) at <facs.c 27 0>
1*main( ) at <facs.c 49 0>
FAreg: 0.000000 FBreg: 0.000000 FCreg: 0.000000
Figure 3 A Microsoft Windows stack trace
Inquest - Cmdline
3 3 > print *p
{
link = 00000000,
wsret = -2147422152,
wbase = 8002cde0,
wsize = 4096,
chan = *empty*
}
00>
Figure 4 Displaying a structured variable on Microsoft Windows
9/21

Share Link: 

datasheetq.com  [ Privacy Policy ]Request Datasheet ] [ Contact Us ]