SourcePoint

Platform for Software Debug and Trace

About SourcePoint

SourcePoint is a platform of debug and trace tools for C/C++ embedded software and firmware for either Intel, AMD and Arm systems.

This robust environment features multiple views into code execution so that bugs are found fast and problems resolved quickly. 

SourcePoint Screenshot
SourcePoint Products

SourcePoint for Intel

Powerful debugger for complex multiprocessor software on the latest Intel® processors. By working with Intel® Processor Trace and Trace Hub, SourcePoint slashes debug time.

SourcePoint for Arm

Multi-view debug and trace tools for multi-core, multi-threaded Arm SoC software. In tandem with CoreSight’s trace macrocells, SourcePoint quickly identifies root causes of bugs.

SourcePoint for Intel Trace

SourcePoint Trace captures all the details of code execution, with data, enabling pin-point root-cause detection; reducing debug time by as much as 50%.

SourcePoint for Arm Trace

Arm’s built in trace cells add power for the developer to extract execution data. SourcePoint Trace delivers the trace visualization needed for clear insight to the most difficult software bugs.

SourcePoint CScripts

Platform bring up is challenging and time-consuming. SourcePoint supports Intel CScripts to enable rapid insight for UEFI code debug and hardware problems, shortening platform power-on cycles.

SourcePoint for AMD

With new support for AMD’s server product CPUs, SourcePoint brings powerful run-control and UEFI source-level debug capabilities to the latest EPYC processors.

Hardware for SourcePoint

Arium hardware probes and trace port analyzer products are designed to make the developer’s job easier, and we take great care in developing hardware and software that is easy for the user to set up and configure to speed their development time.

Blog Posts About SourcePoint

JTAG debug of Windows Hyper-V / Secure Kernel with WinDbg and EXDI: Part 6

Learning more about Hyper-V by following Connor McGarr's footsteps in his blog, Windows Internals: Dissecting Secure Image Objects - Part 1.

JTAG debug of Windows Hyper-V / Secure Kernel with WinDbg and EXDI: Part 5

In the last couple of articles in this series, I’ve focused on basic run-control debugging used in conjunction with Intel Processor Trace (Intel PT). In this installment, we’ll start looking at the use of Architectural Event Trace (AET) to explore the Windows hypervisor, and how MSR accesses in particular are handled.

JTAG debug of Windows Hyper-V / Secure Kernel with WinDbg and EXDI: Part 4

In this article, we’ll look at some of the fields within the VMCS, and change them to combat some of the mitigations against instruction trace within Windows.

JTAG debug of Windows Hyper-V / Secure Kernel with WinDbg and EXDI: Part 3

Debugging the Secure Kernel with JTAG, EXDI, LBR and Intel PT.

SourcePoint Videos