
R0E417250MCU00 User
’s Manual
R20UT3587EJ0302 Rev.3.02
Page 190 of 232
Sep.01. 21
(3) Methods of setting protection
There are the following two methods:
-
Automatic setting by section information in a downloaded module
-
Individually specifying an access attribute for an area
(4) Method of detection
Violation of access protection is detected by internal resources (blocks 1–16) of the emulator.
The blocks are automatically allocated by an original algorithm of the emulator.
CAUTION
Since the emulator’s internal resources are limited, not all blocks can be protected. If an error occurs, reduce the number of
assigned blocks by using the ‘Delete’ button before setting protection again.
Access attribute
Read/Write
Write
->
Read Only
->
Violation detected
Read
->
Write Only
->
Violation detected
Read
->
Disable
->
Violation detected
Write
Figure 5.107 Patterns for detecting violation
(5) Action taken when violation of access protection is detected
The following actions are selectable.
- Display a warning.
After the Violation of access protection checkbox has been selected on the Exception Warning page of the Configuration
properties dialog box, you will see a warning in the Status window and in a status bar balloon when errors of this type occur.
- Make the detection of violation of access protection a condition of a hardware breakpoint.
- Make the detection of violation of access protection a condition of a trace point.