On 22 January 2013 18:14, Jonathan Dumaresq <jdumar...@cimeq.qc.ca> wrote:
> Hi Spen,
>
> I did this as a test
>
>         volatile uint32_t *test = (uint32_t *)0x20001000;
>
>         while(1)
>                 *test = *test + 1;
>
> Whould I been able to break on access to memory location 0x20001000 ?
>
> wp 0x20001000 4 rw
>
> Nothing stop !
>

strange, i will add this to the todo list.

Cheers
Spen

------------------------------------------------------------------------------
Master Visual Studio, SharePoint, SQL, ASP.NET, C# 2012, HTML5, CSS,
MVC, Windows 8 Apps, JavaScript and much more. Keep your skills current
with LearnDevNow - 3,200 step-by-step video tutorials by Microsoft
MVPs and experts. ON SALE this month only -- learn more at:
http://p.sf.net/sfu/learnnow-d2d
_______________________________________________
OpenOCD-devel mailing list
OpenOCD-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openocd-devel

Reply via email to