Hello AmForth-ers, *Background* A brief visit to Atmel's Studio while debugging the wlscope ("wordlist scope") patch convinced me that this magnificant tool is not really good at Forth level debugging as it has no concept of the Forth VM.
*Idea* Let us take advantage of Atmel's documented JTAG protocol (e.g., AVR067: JTAGICE mkII Communication Protocol) and some reverse engineered data (from AVaRICE) to explore the possibility of enhancing amforth-shell.py with several commands that set VM breakpoints and examine data unintrusively. *Needed* People with Python and C skills to show interest and share the burden. Did anyone attempt this approach before? Any interest? Thanks, Enoch. ------------------------------------------------------------------------------ Everyone hates slow websites. So do we. Make your web apps faster with AppDynamics Download AppDynamics Lite for free today: http://p.sf.net/sfu/appdyn_d2d_mar _______________________________________________ Amforth-devel mailing list for http://amforth.sf.net/ Amforth-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/amforth-devel