Hello,
An alternate title for this issue is:
is it possible to enable/disable data acces breakpoint in code
I am trying to debug a memory corruption issue on a Nordic nRF52832 processor. I have used SES 4.22 and Ozone 3.10e.
Using SES, I am able to define an expression like this: ((char[480])0x2000486c) && (@pc > 0x47953)
However this did not work. The issues I see are:
Questions:
An alternate title for this issue is:
is it possible to enable/disable data acces breakpoint in code
I am trying to debug a memory corruption issue on a Nordic nRF52832 processor. I have used SES 4.22 and Ozone 3.10e.
Using SES, I am able to define an expression like this: ((char[480])0x2000486c) && (@pc > 0x47953)
However this did not work. The issues I see are:
- The cast to treat the address as an array of 480 bytes is not working. The breakpoint only triggers when the local variable p_node matches the expression. This is a 2 dimensional byte array [15][32]. The other array locations do not trigger the break.
- The @pc portion of the expression is ignored. Both PC and LR are less than 0x4c600
Questions:
- Is it possible to make a data access breakpoint conditional on the @pc value?
- If you create a data access like this ((char[100])0x00046778), it there a limitation on the array length specified?