Real Insight from Code to Silicon
More Visibility Where It Counts
Software Debug
All the tools you need to debug and trace Intel, AMD and Arm embedded applications in one place.
Hardware Validation
Quickly validate both hardware/firmware interactions and operating margins in our design.
Chip Debug
Verify, test and characterize SoCs, FPGAs and ASICs pre- and post-tapeout.
Manufacturing Test
Non-intrusive test technologies to maximize test coverage and diagnostics.
Product eBooks
Building upon the board-level and system-level guidelines presented in the Design for Test eBook series, in this fourth eBook, we examine a software application developed by ASSET InterTech named ScanWorks Dispatcher.
Latest Articles & Press Releases
JTAG debug of Windows Hyper-V / Secure Kernel with WinDbg and EXDI: Part 5
In the last couple of articles in this series, Iโve focused on basic run-control debugging used in conjunction with Intel Processor Trace (Intel PT). In this installment, weโll start looking at the use of Architectural Event Trace (AET) to explore the Windows hypervisor, and how MSR accesses in particular are handled.
JTAG debug of Windows Hyper-V / Secure Kernel with WinDbg and EXDI: Part 4
In this article, weโll look at some of the fields within the VMCS, and change them to combat some of the mitigations against instruction trace within Windows.
JTAG debug of Windows Hyper-V / Secure Kernel with WinDbg and EXDI: Part 3
Debugging the Secure Kernel with JTAG, EXDI, LBR and Intel PT.
JTAG debug of Windows Hyper-V / Secure Kernel with WinDbg and EXDI: Part 2
In Part 1 of this article series, I demonstrated the use of EXDI with DCI to explore the Windows hypervisor. In this article, weโll take a first look at the Windows Secure Kernel.
Learn More Live
Hereโs your chance to see how easy it is to debug and test using SourcePoint or ScanWorks. Let us walk you through it!