Renesas 32186 Computer Hardware User Manual


 
32185/32186/32192/32195/32196 Group
Starter Kit User’s Manual M3A-2154G52B
REJ10B0223-0140/Rev.1.40 Jan. 2007 Page 6 of 79
3.4 About M3T-PD32RM
The following describes precautions to be observed when using M3T-PD32RM.
3.4.1 Operating Manuals
To use M3T-PD32RM of M3A-2154G52B, see the manuals shown below.
- M3T-PD32RM release notes
- PD32RM Help
3.4.2 About Break Operation
M3T-PD32RM uses the M32R core’s internal debug circuit (SDI) to realize break functions. For
this reason, the break functions of M3T-PD32RM behave differently from those in conventional
emulators.
Furthermore, because M3T-PD32RM does not have SDI trace pins as corresponding hardware
resources, the trace pin corresponding break functions available with M3T-PD32R-compatible
emulators are not supported.
The following explains the four types of breaks that can be executed with M3T-PD32RM.
(1) Software break
Up to 64 software breakpoints can be set and executed in RAM areas accessible by the target
MCU. No software breakpoints can be set and executed in ROM areas such as the internal flash
memory.
(2) Pre-execution PC break
The M32R core’s internal debug circuit (SDI) allows setting breakpoints, at which to break the
program immediately before executing an instruction (at the address indicated by the program
counter).
For the M3A-2154G52B (32185/32186/32192/32195/32196 Group MCU), four such breakpoints
can be set.
(3) Post-execution PC break
The M32R core’s internal debug circuit (SDI) allows setting one breakpoint, at which to break the
program immediately after executing an instruction (at the address indicated by the program
counter).
(4) Chip break
The M32R core’s internal debug circuit (SDI) allows setting breakpoints, at which to break the
program when accessing memory for read/write.
For M3A-2154G52B (32185/32186/32192/32195/32196 Group MCU), two such breakpoints (level
2) can be set.
* The differences between levels 1 and 2 are outlined below.
Level 1: Whether data which is maskable matches or not can be detected.
Level 2: Data is maskable and an address range can be specified for the target data.