Greetings,
I’ve obtained some trace data using the ETF ( Trace captured in CB mode). The data is currently in its raw form—unformatted and uncompressed. The structure appears as follows:
I’m seeking assistance to decode this data. I’ve consulted the “Arm CoreSight ELA-600 Embedded Logic Analyzer Technical Reference Manual r2p0 (Arm CoreSight ELA-600 Embedded Logic Analyzer Technical Reference Manual r2p0 ),” which details the synchronization byte (sync 00), the header (header 1c), followed by the payload. However, the manual does not provide instructions on how to interpret the payload data.
Could anyone provide guidance or point me towards resources that explain the process of decoding the payload?
Hello,
Do you have access to Arm Development Studio?
This includes some python scripts for (collecting and) processing such data.
Use File > Import > Arm Development Studio > Examples and Programming Languages, and search for the below.
The supplied readme explains how to use.
Also - I moved your query to the Arm Development Studio specific forum.