On 22 January 2013 18:14, Jonathan Dumaresq <jdumar...@cimeq.qc.ca> wrote: > Hi Spen, > > I did this as a test > > volatile uint32_t *test = (uint32_t *)0x20001000; > > while(1) > *test = *test + 1; > > Whould I been able to break on access to memory location 0x20001000 ? > > wp 0x20001000 4 rw > > Nothing stop ! >
strange, i will add this to the todo list. Cheers Spen ------------------------------------------------------------------------------ Master Visual Studio, SharePoint, SQL, ASP.NET, C# 2012, HTML5, CSS, MVC, Windows 8 Apps, JavaScript and much more. Keep your skills current with LearnDevNow - 3,200 step-by-step video tutorials by Microsoft MVPs and experts. ON SALE this month only -- learn more at: http://p.sf.net/sfu/learnnow-d2d _______________________________________________ OpenOCD-devel mailing list OpenOCD-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openocd-devel