Hello AmForth-ers,

*Background* A brief visit to Atmel's Studio while debugging the wlscope
("wordlist scope") patch convinced me that this magnificant tool is not
really good at Forth level debugging as it has no concept of the Forth
VM.

*Idea* Let us take advantage of Atmel's documented JTAG protocol (e.g.,
AVR067: JTAGICE mkII Communication Protocol) and some reverse engineered
data (from AVaRICE) to explore the possibility of enhancing
amforth-shell.py with several commands that set VM breakpoints and
examine data unintrusively.

*Needed* People with Python and C skills to show interest and share the
burden.

Did anyone attempt this approach before? Any interest?

Thanks, Enoch.












------------------------------------------------------------------------------
Everyone hates slow websites. So do we.
Make your web apps faster with AppDynamics
Download AppDynamics Lite for free today:
http://p.sf.net/sfu/appdyn_d2d_mar
_______________________________________________
Amforth-devel mailing list for http://amforth.sf.net/
Amforth-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/amforth-devel

Reply via email to