Using the 162Bug Debugger

 

162Bug>RD

 

 

 

 

 

 

 

 

 

 

PC

=00010000

SR

 

=2708=TR:OFF_S._7_.N...

VBR

=00000000

 

USP

=0000DFFC

MSP

 

=0000EFFC ISP* =0000FFFC

SFC

=0=F0

 

DFC

=0=F0

CACR

=0=

 

 

 

 

 

D0

=00000001

D1

 

=00000001

D2

=00000000

D3

 

=00000000

 

D4

=00000000

D5

 

=00000002

D6

=00000000

D7

 

=00000000

 

A0

=00000000

A1

 

=00000000

A2

=00000000

A3

 

=00000000

4

 

 

A4

=00000000

A5

 

=00000000

A6

=00000000

A7

 

=0000FFFC

 

 

 

 

00010000 203900F0

0000

MOVE.L

($F00000).L,D0

 

162Bug>T

 

 

 

 

 

 

 

 

 

 

Exception: Access

Fault (Local Off Board)

 

 

 

 

PC =FF839154 SR =2704

 

 

 

 

 

 

 

Format/Vector =7008

 

 

 

 

 

 

 

 

SSW =0145 Fault Address =00F00000 Effective Address =0000D4E8

 

PC

=00010000

SR

 

=2708=TR:OFF_S._7_.N...

VBR

=00000000

 

USP

=0000DFFC

MSP

 

=0000EFFC ISP* =0000FFFC

SFC

=0=F0

 

DFC

=0=F0

CACR

=0=

 

 

 

 

 

D0

=00000001

D1

 

=00000001

D2

=00000000

D3

 

=00000000

 

D4

=00000000

D5

 

=00000002

D6

=00000000

D7

 

=00000000

 

A0

=00000000

A1

 

=00000000

A2

=00000000

A3

 

=00000000

 

A4

=00000000

A5

 

=00000000

A6

=00000000

A7

 

=0000FFC0

 

00010000 203900F0

0000

MOVE.L

($F00000).L,D0

 

162Bug>

 

 

 

 

 

 

 

 

 

 

Notice that the target stack pointer is different. The target stack pointer now

 

points to the last value of the exception stack frame that was stacked. The

 

exception stack frame may now be examined using the MD command.

 

162Bug>MD (A7):&30

 

 

 

 

 

 

 

 

 

0000FFC0 2708 0001 0000 7008

0000 FFFC 0105 0005

’.....p

 

0000FFD0 0005 0005 00F0 0000

0000 0A64 0000 FFF4

...........d....

 

0000FFE0 00F0 0000 FFFF FFFF

00F0 0000 FFFF FFFF

 

0000FFF0 2708 0001 A708 0001

 

0000 0000

 

 

 

162Bug>

 

 

 

 

 

 

 

 

 

4-16

MVME162 Embedded Controller Installation Guide

Page 100
Image 100
Motorola MVME162 manual 162BugMD A7&30