Peeking and Poking IP Registers

Two small executables called mrd and mwr are available to peek and poke registers in memory-mapped programmable logic. These executables are invoked with the physical address to be accessed.

For example: mrd 0x80000000 10 reads ten 4-byte values starting at physical address 0x80000000 and prints them to standard output, while mwr 0x80000000 20writes the value 20 to the address 0x8000000.

These executables can be used to monitor and change the state of memory-mapped registers in hardware functions and in other IP generated by the SDSoC™ environment.

CAUTION:
Trying to access non-existent addresses can cause the system to hang.