Peeking and Poking IP Registers

Two small executables calledmrdandmwrare available to peek and poke registers in memory-mapped programmable logic. These executables are invoked with the physical address to be accessed.

For example:mrd 0x80000000 10reads ten 4-byte values starting at physical address 0x80000000 and prints them to standard output, whilemwr 0x80000000 20writes the value 20 to the address 0x8000000.

These executables can be used to monitor and change the state of memory-mapped registers in hardware functions and in other IP generated by the SDSoC™ environment.

CAUTION:
Trying to access non-existent addresses can cause the system to hang.