For many years the JTAG interface has been used for ARM-based SoC debugging. With this JTAG style debugging, the developer has been granted the ability to debug software at the high-level. This article outlines the method which enables the Lauterbach debugger to analyze a program trace, despite these process-dependent virtual addresses. But before tackling the topic at hand, lets take a deeper look at this ETM technology.

Reprinted in its entirety from ARM IQ Vol. 5, No. 1, 2006