39
8. For th e result by software trace, a value in the [Data] item is not correct (that value is correct
for window trace).
2.2.3 Notes on Using the JTAG (H-UDI) Clock (TCK)
1. Set the JTAG clock (TCK) frequency to lower than the frequency of the peripheral module
clock.
2. The initial v alue of the JTAG clock (TCK) is 1.25 MHz.
3. A valu e to be set for the JTAG clock (TCK) is initialized after executing [Reset CPU] or
[Reset Go]. Thus the TCK value will be 1.25 MHz.
2.2.4 Notes on Setting the [Breakpoint] Dialog Box
1. When an odd address is set, the next lowest even address is used.
2. A BREAKPOINT is accomplished by replacing instructions of the specified address.
It cannot be set to the following addresses:
An area other than CS and the internal RAM
An instruction in which Break Condition 2 is satisfied
A slot instruction of a delayed branch instruction
3. During step operation, specifying BREAKPOINTs and Event Condition breaks are disabled.
4. When execution resumes from the address where a BREAKPOINT is specified and a break
occurs before Event Condition execution, single-step operation is performed at the address
before execution resumes. Therefore, realtime operation cannot be performed.
5. When a BREAKPOINT is set to the slot instruction of a delayed branch instruction, the PC
value becomes an illegal value. Accordingly, do not set a BREAKPOINT to the slot
instruction of a delayed branch instruction.
6. If an address of a BREAKPOINT cannot be correctly set in the ROM or flash memory area, a
mark z will be displayed in the [BP] area of the address on the [Source] or [Disassembly]
window by refreshing the [Memory] window, etc. after Go execution. However, no break will
occur at this address. When the program halts with the event condition, the mark z disappears.
7. If you wish to use a BREAKPOINT (software break), specify the SH2A_SBSTK command to
enable use of a user stack before setting a PC break. While enabled, extra four bytes of a user
stack are used when a break occurs. The value of the stack pointer (R15) must be correctly set
in advance because a user stack is to be used. By default, use of a user stack is disabled. For
details on the command, refer to the help file.
Example
To enable use of a user stack:
>SH2A_SBSTK enable