EDWAR, External Debug Watchpoint Address Register

The EDWAR characteristics are:

Purpose

Returns the virtual data address being accessed when a Watchpoint Debug Event was triggered.

Configuration

EDWAR is in the Core power domain.

The value of this register is UNKNOWN if the PE is in Non-debug state, or if EDSCR.STATUS is not 0b101011.

Attributes

EDWAR is a 64-bit register.

Field descriptions

6362616059585756555453525150494847464544434241403938373635343332
313029282726252423222120191817161514131211109876543210
Watchpoint address
Watchpoint address

Bits [63:0]

Watchpoint address. The data virtual address being accessed when a Watchpoint Debug Event was triggered and caused entry to Debug state. This address must be within a naturally-aligned block of memory of power-of-two size no larger than the DC ZVA block size.

When the PE sets EDHSR.{FnP, FnV} to {0,1} on taking a Watchpoint exception, the PE sets EDWAR to any address within the naturally-aligned fault granule that contains the virtual address of the memory access that generated the Watchpoint exception.

The value of this register is UNKNOWN if the PE is in Non-debug state, or if Debug state was entered other than for a Watchpoint debug event.

The value of EDWAR[63:32] is UNKNOWN if Debug state was entered for a Watchpoint debug event taken from AArch32 state.

The EDWAR is subject to the same alignment rules as the reporting of a watchpointed address in the FAR. See 'Determining the memory location that caused a Watchpoint exception'.

The reset behavior of this field is:

Accessing EDWAR

EDWAR can be accessed through the external debug interface:

ComponentOffsetInstance
Debug0x030EDWAR

This interface is accessible as follows:


15/03/2024 21:50; 3156453dc257d36c4630671c3d896bfc69048210

Copyright © 2010-2023 Arm Limited or its affiliates. All rights reserved. This document is Non-Confidential.