diff options
author | Angelos Mouzakitis <a.mouzakitis@virtualopensystems.com> | 2023-10-10 14:33:42 +0000 |
---|---|---|
committer | Angelos Mouzakitis <a.mouzakitis@virtualopensystems.com> | 2023-10-10 14:33:42 +0000 |
commit | af1a266670d040d2f4083ff309d732d648afba2a (patch) | |
tree | 2fc46203448ddcc6f81546d379abfaeb323575e9 /roms/edk2/EmbeddedPkg/Scripts/LauterbachT32/Readme.md | |
parent | e02cda008591317b1625707ff8e115a4841aa889 (diff) |
Change-Id: Iaf8d18082d3991dec7c0ebbea540f092188eb4ec
Diffstat (limited to 'roms/edk2/EmbeddedPkg/Scripts/LauterbachT32/Readme.md')
-rw-r--r-- | roms/edk2/EmbeddedPkg/Scripts/LauterbachT32/Readme.md | 16 |
1 files changed, 16 insertions, 0 deletions
diff --git a/roms/edk2/EmbeddedPkg/Scripts/LauterbachT32/Readme.md b/roms/edk2/EmbeddedPkg/Scripts/LauterbachT32/Readme.md new file mode 100644 index 000000000..51d2c8da5 --- /dev/null +++ b/roms/edk2/EmbeddedPkg/Scripts/LauterbachT32/Readme.md @@ -0,0 +1,16 @@ +# DXE Phase Debug
+Update the memsize variable in EfiLoadDxe.cmm for the actual amount of memory
+available in your system. Allow your system to boot to the point that the DXE
+core is initialized (so that the System Table and Debug Information table is
+present in memory) and execute this script (using the toolbar button or
+'do EfiLoadDxe' from the command area). It will scan memory for the debug info
+table and load modules in it.
+
+# SEC/PEI Phase Debug
+There is no way to autodetect where these images reside so you must pass an
+address for the memory-mapped Firmware Volume containing these images. To do
+this, enter 'do EfiLoadFv <addr>' where <addr> is the base address for the
+firmware volume containing the SEC or PEI code. To be more efficient you may
+want to create a script that calls this, like MyBoardLoadSec.cmm which contains
+the call to EfiLoadFv. You can them map this script to a T32 menu or toolbar
+button for quick access.
|