- IAR Embedded Workbench for RISC-V 3.40
- C-SPY Debugging
- The C-SPY command line utility—cspybat
- Summary of C-SPY command line options
Summary of C-SPY command line options
General cspybat options
Passes command line arguments to the debugged application. | |
Makes the debugger attach to a running application at its current location, without resetting the target system. | |
Marks the beginning of the parameters to be sent to the C-SPY driver (mandatory). | |
Enables the generation of code coverage information and places it in a specified file. | |
Specifies the maximum number of cycles to run. | |
Specifies an alternative debug file. | |
Specifies a C-SPY device macro file. | |
Downloads a code image without starting a debug session afterwards. | |
Extends the command line. | |
Specifies a flash loader specification XML file. | |
Makes the debugger leave the application running on the target hardware after the debug session is closed. | |
Specifies a macro file to be used. | |
Assigns a value to a C-SPY macro parameter. | |
Specifies a plugin file to be used. | |
Omits the sign-on message. | |
Makes the debugger use sockets instead of pipes for its internal communication. | |
Disables the warning when the ELF entry point is at address | |
Limits the maximum allowed execution time. |
Options available for all C-SPY drivers
Options available for the simulator driver
Disables the interrupt simulation. | |
Allows accesses to misaligned data. | |
Analyzes your source code to find where the most time is spent during execution. | |
Activates memory access checking. | |
Specifies the number of cores on the device for multicore debugging. |
Options available for all hardware debugger drivers
Specifies the communication link to be used. | |
Creates a log file. | |
Sets the type of breakpoint resource to be used when setting breakpoints. | |
Excludes memory ranges from being verified. | |
Omits setting the | |
Restores automatically any breakpoints that were destroyed during system startup. | |
Specifies the location of the Cortex-M reset vector and the initial stack pointer value. |
Options available for the C-SPY I-jet driver
Makes the application stop for certain exceptions. | |
Selects the communication interface. | |
Specifies the JTAG interface speed. | |
Suppresses download of the executable image. For reference information, see Download, specifically the option Suppress download. | |
Enables Live Watch and Live Memory reads for devices that support system bus access. | |
Verifies the target program. For reference information, see Download, specifically the option Verify download. | |
Specifies a probe configuration file. | |
Selects which CPU to debug on a multicore system. | |
Specifies the number of IR bits preceding the core to connect to. | |
Sends text to the | |
Specifies the power supply from the I-jet or I-jet Trace probe. | |
Specifies the reset script file. | |
Sets the main trace mode for the debug probe. | |
Selects the reset strategy to be used when C-SPY starts. | |
Prolongs the time that the C-SPY driver tries to connect to the target board. | |
Selects a specific device in the JTAG scan chain. | |
Specifies the reset strategies that will be available when debugging. |
Options available for the C-SPY GDB Server driver
Sends a command string to the GDB Server. |
Options available for the C-SPY third-party drivers
For information about any options specific to the third-party driver you are using, see its documentation.