SourcePoint

Platform for Software Debug and Trace

About SourcePoint

SourcePoint is a platform of debug and trace tools for C/C++ embedded software and firmware for either Intel, AMD and Arm systems.

This robust environment features multiple views into code execution so that bugs are found fast and problems resolved quickly.ย 

SourcePoint Screenshot
SourcePoint Products

SourcePoint for Intel

Powerful debugger for complex multiprocessor software on the latest Intelยฎ processors. By working with Intelยฎ Processor Trace and Trace Hub, SourcePoint slashes debug time.

SourcePoint for Arm

Multi-view debug and trace tools for multi-core, multi-threaded Arm SoC software. In tandem with CoreSightโ€™s trace macrocells, SourcePoint quickly identifies root causes of bugs.

SourcePoint for Intel Trace

SourcePoint Trace captures all the details of code execution, with data, enabling pin-point root-cause detection; reducing debug time by as much as 50%.

SourcePoint for Arm Trace

Armโ€™s built in trace cells add power for the developer to extract execution data. SourcePoint Trace delivers the trace visualization needed for clear insight to the most difficult software bugs.

SourcePoint CScripts

Platform bring up is challenging and time-consuming. SourcePoint supports Intel CScripts to enable rapid insight for UEFI code debug and hardware problems, shortening platform power-on cycles.

SourcePoint for AMD

With new support for AMDโ€™s server product CPUs, SourcePoint brings powerful run-control and UEFI source-level debug capabilities to the latest EPYC processors.

Hardware for SourcePoint

Arium hardware probes and trace port analyzer products are designed to make the developerโ€™s job easier, and we take great care in developing hardware and software that is easy for the user to set up and configure to speed their development time.

Blog Posts About SourcePoint

JTAG debug of Windows Hyper-V / Secure Kernel with WinDbg and EXDI: Part 4

In this article, weโ€™ll look at some of the fields within the VMCS, and change them to combat some of the mitigations against instruction trace within Windows.

JTAG debug of Windows Hyper-V / Secure Kernel with WinDbg and EXDI: Part 3

Debugging the Secure Kernel with JTAG, EXDI, LBR and Intel PT.

JTAG debug of Windows Hyper-V / Secure Kernel with WinDbg and EXDI: Part 2

In Part 1 of this article series, I demonstrated the use of EXDI with DCI to explore the Windows hypervisor. In this article, weโ€™ll take a first look at the Windows Secure Kernel.

JTAG debug of Windows Hyper-V / Secure Kernel with WinDbg and EXDI: Part 1

Iโ€™m having a tremendous amount of fun learning about Windows internals with the new support of WinDbg via our SourcePoint JTAG debugger. This is a multi-part series on exploring some of the undebuggable code within the Windows hypervisor and secure kernel.

SourcePoint Videos