readelf -l adas_parking_fun_app_mcu1_0_release_strip.xer5f Elf file type is EXEC (Executable file) Entry point 0x41010000 There are 15 program headers, starting at offset 758496 Program Headers: Type Offset VirtAddr PhysAddr FileSiz MemSiz Flg Align LOAD 0x000038 0x41010000 0x41010000 0x00040 0x00040 R 0x8 LOAD 0x000080 0x41010100 0x41010100 0x00548 0x00548 R E 0x10 LOAD 0x000600 0xa0400000 0xa0400000 0x00000 0x32042e RW 0x80 LOAD 0x000600 0xa0720430 0xa0720430 0x49c38 0x49c38 R 0x8 LOAD 0x04a238 0xa076a068 0xa076a068 0x00000 0x00004 RW 0x4 LOAD 0x04a240 0xa076a070 0xa076a070 0x413e0 0x413e0 R E 0x10 LOAD 0x08b620 0xa07ab450 0xa07ab450 0x04dc0 0x04dc0 RW 0x4 LOAD 0x0903e0 0xa07b0210 0xa07b0210 0x05b40 0x05b40 R E 0x4 LOAD 0x095f20 0xa07b5d50 0xa07b5d50 0x00000 0x02000 RW 0x8 LOAD 0x095f20 0xa07b7d50 0xa07b7d50 0x0000a 0x0000a R 0x4 LOAD 0x095f80 0xa07b7d80 0xa07b7d80 0x01700 0x01700 R 0x80 LOAD 0x097680 0xa07b9480 0xa07b9480 0x00000 0x02798 RW 0x4 LOAD 0x097680 0xa07bbc18 0xa07bbc18 0x00770 0x00770 R 0x4 LOAD 0x097df0 0xa07bc388 0xa07bc388 0x00000 0x003ec RW 0x4 LOAD 0x097df0 0xa07bc778 0xa07bc778 0x20fe0 0x20fe0 R 0x8 Section to Segment mapping: Segment Sections... 00 .vecs .vecs 01 .init_text .text:xdc_runtime_Startup_reset__I .utilsCopyVecsToAtcm 02 .bss .data __llvm_prf_cnts 03 .const 04 .bss.devgroup.DMSC_INTERNAL 05 .text 06 McalNoInitSection 07 .const.devgroup.MAIN McalTextSection 08 .stack 09 .const.devgroup.DMSC_INTERNAL 10 .boardcfg_data 11 .bss.devgroup.MAIN McalConstSection UtilityNoInitSection 12 .const.devgroup.MCU_WAKEUP 13 .bss.devgroup.MCU_WAKEUP McalInitSection