Real Insight from Code to Silicon

SourcePoint Logo
Platform for Software Debug and Trace
ScanWorksยฎ
Platform for Embedded Instruments
More Visibility Where It Counts

Software Debug

All the tools you need to debug and trace Intel, AMD and Arm embedded applications in one place.

Hardware Validation

Quickly validate both hardware/firmware interactions and operating margins in our design.

Chip Debug

Verify, test and characterize SoCs, FPGAs and ASICs pre- and post-tapeout.

Manufacturing Test

Non-intrusive test technologies to maximize test coverage and diagnostics.

Product eBooks

Building upon the board-level and system-level guidelines presented in the Design for Test eBook series, in this fourth eBook, we examine a software application developed by ASSET InterTech named ScanWorks Dispatcher.

Latest Articles & Press Releases

JTAG debug of Windows Hyper-V / Secure Kernel with WinDbg and EXDI: Part 7

Architectural Event Trace (AET) can only be used with JTAG. This blog describes the use of AET to explore Windows Hyper-V and the Secure Kernel.

Dramatically Reduce Test Times With Fast Programming

New techniques are significantly reducing in-system programming times. Learn about the three mechanisms for programming flash memory via ScanWorks.

JTAG debug of Windows Hyper-V / Secure Kernel with WinDbg and EXDI: Part 6

Learning more about Hyper-V by following Connor McGarr's footsteps in his blog, Windows Internals: Dissecting Secure Image Objects - Part 1.

JTAG debug of Windows Hyper-V / Secure Kernel with WinDbg and EXDI: Part 5

In the last couple of articles in this series, Iโ€™ve focused on basic run-control debugging used in conjunction with Intel Processor Trace (Intel PT). In this installment, weโ€™ll start looking at the use of Architectural Event Trace (AET) to explore the Windows hypervisor, and how MSR accesses in particular are handled.

Learn More Live

Hereโ€™s your chance to see how easy it is to debug and test using SourcePoint or ScanWorks. Let us walk you through it!