QB-V850E2
(3) Access event
An access event is detected when an address has been accessed (read or written). The following
detection conditions can be specified for an access event.
Up to six accesses event points can be specified, but if the access address has been specified as a
range, two points will be consumed. When the access address has been specified as a range for all
events, three event points can be specified.
[Detection conditions that can be specified]
- Access address (can be specified as a range)
- Access data
- Access size
- Access status (read, write, both read and write)
1.3.7
Event link function (event combinations)
The event link function is used to combine into one event, events that have been registered by using the
event function (1.3.6 Event function (specific CPU operation detection)). It is used to detect a specific
sequence, such as when an address has been executed after a variable was accessed.
1.3.8
Peripheral break function
When the break function has been used to stop program execution, peripheral functions other than the
watchdog timer continue to operate in general, but some peripheral functions can be stopped by using the
peripheral break function. The following peripheral functions can be stopped.
• Following functions always stopped upon a breakpoint hit
- Watch dog timer (WDTA)
• Following functions can be stopped or continue upon a breakpoint hit by user option
- Timers (TAUA, TAUB, TAUC, TAUJ, ENCA, RTCA, CNTA, OSTM, TAPA)
- Serial interfaces (UARTE, CSIH, CSIG, I2CB)
- A/D converter (ADC)
1.3.9
Mask function
The mask function can be used to mask the following sources.
- _RESET terminal
- Internal reset (For example, watch dog timer)
R20UT0824EJ0101 Rev.1.01
2013.01.08
1.GENERAL
Page 14 of 26