This thread has been locked.

If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.

TMDSEMUPROTRACE: BlackHawk XDS560v2 system trace & emulator : usage for debug & tracing

Expert 1965 points
Part Number: TMDSEMUPROTRACE

I'm considering BlackHawk XDS560v2 System Trace Emulator with the Eth interface too, and I got some questions on it.

https://www.blackhawk-dsp.com/products/jtag-emulators/xds560v2

It says it's based on TI's XDS560v2 reference design, 

https://www.ti.com/tool/TMDSEMUPROTRACE

Anyone experienced with BlackHawk? I'm wondering if it works just as good? ..  Does it work same with CCS?

Also, do I need to use some extra license / need extra license to be able to use this probe from CCS?

From TI's XDS 560v2 description, it says it supports ETM  (which description calls "ARM core pin trace", which is a bit confusing, shoulnd' it be Embedded Trace Macrocells..) , but I don't quite see same for the BlackHawk probe, they mention System Trace Module and I don't know if that only covers ETB, or ..  Ultimately I would like to be able to do tracing on all Cortexes from Ti which provide the ETM.

Does tracing work well with this probe.? Does CCS have any module to work with the trace functionality?  Is it some extra license that would be needed to use it ?

Also I'm interested in using the network / Eth interface, and, need to know if the CCS's XDS560v2 configuration allows for actually accessing the emulator over IP.   

So if anyone could clarify any of the above would be great...