Peeking and Poking IP Registers
Two small executables called mrd
and mwr
are
available to peek and poke registers in memory-mapped programmable logic. These
executables are invoked with the physical address to be accessed.
For example: mrd 0x80000000 10
reads ten 4-byte values starting at
physical address 0x80000000 and prints them to standard output, while mwr
0x80000000 20
writes the value 20 to the address 0x8000000.
These executables can be used to monitor and change the state of memory-mapped registers in hardware functions and in other IP generated by the SDSoC™ environment.
CAUTION:
Trying to access non-existent addresses can cause the system to
hang.