This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

ELA-600 Trace Data Decoding

Greetings,

I’ve obtained some trace data using the ETF ( Trace captured in CB mode). The data is currently in its raw form—unformatted and uncompressed. The structure appears as follows:

I’m seeking assistance to decode this data. I’ve consulted the “Arm CoreSight ELA-600 Embedded Logic Analyzer Technical Reference Manual r2p0 (Arm CoreSight ELA-600 Embedded Logic Analyzer Technical Reference Manual r2p0  ),” which details the synchronization byte (sync 00), the header (header 1c), followed by the payload. However, the manual does not provide instructions on how to interpret the payload data.

Could anyone provide guidance or point me towards resources that explain the process of decoding the payload?

Raw Data
0x3ee4c100
0x0150f030
0x00f03001
0x11ffe0c2
0x059d5a19
0x3ee0c100
0x5802d030
0xd0300101
0xffe0c200
0xc6a1472b
0xe4c10005
0x4cd0303e
0xd0300101
0xffe0c200
0xcf2e9b3a
0xe0c10005
0x03d0303e
0xd0300101
0xffe0c200
0xcf2e9b3a
0xe0c10005
0x03d0303e
0x30010158
0xe0c200d0
0xba45beff
0x000105d5
0x00000000
0x00000000
Parents
  • Hello,

    Do you have access to Arm Development Studio?

    This includes some python scripts for (collecting and) processing such data.

    Use File > Import > Arm Development Studio > Examples and Programming Languages, and search for the below.

    The supplied readme explains how to use.

Reply
  • Hello,

    Do you have access to Arm Development Studio?

    This includes some python scripts for (collecting and) processing such data.

    Use File > Import > Arm Development Studio > Examples and Programming Languages, and search for the below.

    The supplied readme explains how to use.

Children
No data