Real Insight from Code to Silicon

SourcePoint Logo
Platform for Software Debug and Trace
ScanWorksยฎ
Platform for Embedded Instruments
More Visibility Where It Counts

Software Debug

All the tools you need to debug and trace Intel, AMD and Arm embedded applications in one place.

Hardware Validation

Quickly validate both hardware/firmware interactions and operating margins in our design.

Chip Debug

Verify, test and characterize SoCs, FPGAs and ASICs pre- and post-tapeout.

Manufacturing Test

Non-intrusive test technologies to maximize test coverage and diagnostics.

Product eBooks

Building upon the board-level and system-level guidelines presented in the Design for Test eBook series, in this fourth eBook, we examine a software application developed by ASSET InterTech named ScanWorks Dispatcher.

Latest Articles & Press Releases

JTAG debug of Windows Hyper-V / Secure Kernel with WinDbg and EXDI: Part 5

In the last couple of articles in this series, Iโ€™ve focused on basic run-control debugging used in conjunction with Intel Processor Trace (Intel PT). In this installment, weโ€™ll start looking at the use of Architectural Event Trace (AET) to explore the Windows hypervisor, and how MSR accesses in particular are handled.

JTAG debug of Windows Hyper-V / Secure Kernel with WinDbg and EXDI: Part 4

In this article, weโ€™ll look at some of the fields within the VMCS, and change them to combat some of the mitigations against instruction trace within Windows.

JTAG debug of Windows Hyper-V / Secure Kernel with WinDbg and EXDI: Part 3

Debugging the Secure Kernel with JTAG, EXDI, LBR and Intel PT.

JTAG debug of Windows Hyper-V / Secure Kernel with WinDbg and EXDI: Part 2

In Part 1 of this article series, I demonstrated the use of EXDI with DCI to explore the Windows hypervisor. In this article, weโ€™ll take a first look at the Windows Secure Kernel.

Learn More Live

Hereโ€™s your chance to see how easy it is to debug and test using SourcePoint or ScanWorks. Let us walk you through it!