About SourcePoint for Intel

SourcePoint is a powerful debugger for complex multiprocessor software for the latest Intel processors. Its support for Intel silicon soon after it’s available, and Intel CScripts support, ensure timely board bring-up and platform validation.

SourcePoint is the premier UEFI debugger for code development. Navigating the ever-growing UEFI code base is critical to minimizing bug identification cycles and shortening development time.

By working with the latest silicon trace features, like Intel Processor Trace and Trace Hub, SourcePoint finds bugs fast, slashing debug time.

SourcePoint operates in multiprocessor environments and runs on MS Windows. Features are added constantly to keep up with the ever-changing nature of software development challenges.

SourcePoint Intel Screenshot
SourcePoint for Intel Features

UEFI debug

Powerful run-control and macro features to make SEC, PEI, DXE and BDS debug a breeze


Intel Architectural Event Trace, CSME Trace, UEFI Message Trace, Processor Trace, and more


Hundreds of platform validation, test and debug scripts courtesy of Intel

Latest Intel silicon

Sapphire Rapids, Alder Lake, Rocket Lake, and every other codename you can imagine

More Great Features
  • Source code debug
  • Multicore/socket support
  • Trace data mining
  • Trace statistics
  • Code profiling
  • Call charts
  • High-speed downloads
  • Advanced breakpoints
  • Auto-target acquisition
  • Fast symbol search
  • Command language
  • Macro support

SourcePoint for Intel Software

Users in organizations such as Dell, HP Enterprise, HP, Cisco, EMC, Fujitsu, Intel, Lenovo, Lockheed, NEC and many others agree that SourcePoint’s usability and visibility lead the industry, especially when it comes to UEFI debug. From examining code execution at a system-level to bit-level, as well as scrutinizing the most hardware intensive code

SourcePoint has the ability to traverse code hierarchy. Users are provided insight into performance bottlenecks so code can be tuned as necessary. And finding bit-level problems within the most challenging bugs has never been so easy.

Related Products

Wow! Powerful new features in Intel silicon just for the software developers! Are you taking advantage of these features? Or more accurately are your tools enabling you to minimize your debug time by exposing the features?
Intel’s new Trace Hub and Intel Processor Trace are but two of the newer features from Intel and SourcePoint is first to market with support.

Woman Engineer Working
Hardware for SourcePoint Intel

Intel JTAG debugger products are designed to make the developer’s job easier. We have worked with Intel for over fifteen years, providing tools that are feature-rich in both hardware and software, making it easy for the user to accelerate development time. An example is UEFI development, where we provide macro files that allow for context-sensitive debugging in the PEIM, DXE and other boot phases.

SourcePoint for Intel Highlights

Intel Processors Supported

  • Intel Atom
  • Intel Core
  • Intel Xeon

Platform Support

  • Purley
  • Whitley
  • Eagle Stream
  • Skylake Clients
  • Coffee Lake
  • Rocket Lake
  • Tiger Lake
  • Alder Lake
  • Apollo Lake
  • Gemini Lake
  • Jasper/Elkhart Lake
  • and more…

Compiler Support

  • GNU C/C++
  • Intel® C/C++ Compiler
  • Microsoft® Visual Studio®
  • Borland C++ Compiler
  • Wind River® Workbench
  • Wind River® Tornado® II C/C++
  • CAD-UL C

Intel Programs

IoTsa Logo

SourcePoint for Intel Resources

SourcePoint for Intel eResources

SourcePoint has native support for all UEFI-based platforms. Set breakpoints, single step,watch variables, view the stack, and use powerful tracing features in SEC, PEI, DXE and BDS boot phases of UEFI.

Blog Posts About SourcePoint for Intel

JTAG debug of Windows Hyper-V / Secure Kernel with WinDbg and EXDI: Part 7

Architectural Event Trace (AET) can only be used with JTAG. This blog describes the use of AET to explore Windows Hyper-V and the Secure Kernel.

JTAG debug of Windows Hyper-V / Secure Kernel with WinDbg and EXDI: Part 6

Learning more about Hyper-V by following Connor McGarr's footsteps in his blog, Windows Internals: Dissecting Secure Image Objects - Part 1.

JTAG debug of Windows Hyper-V / Secure Kernel with WinDbg and EXDI: Part 5

In the last couple of articles in this series, I’ve focused on basic run-control debugging used in conjunction with Intel Processor Trace (Intel PT). In this installment, we’ll start looking at the use of Architectural Event Trace (AET) to explore the Windows hypervisor, and how MSR accesses in particular are handled.

JTAG debug of Windows Hyper-V / Secure Kernel with WinDbg and EXDI: Part 4

In this article, we’ll look at some of the fields within the VMCS, and change them to combat some of the mitigations against instruction trace within Windows.

SourcePoint for Intel Videos

Learn More Live

Here’s your chance to see how easy it is to validate and test using SourcePoint or ScanWorks. Let us walk you through it!