Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Automatically decode backtrace addresses #24

Open
lptr opened this issue Nov 27, 2024 · 0 comments
Open

Automatically decode backtrace addresses #24

lptr opened this issue Nov 27, 2024 · 0 comments

Comments

@lptr
Copy link

lptr commented Nov 27, 2024

When using ESP-IDF's idf.py monitor, backtrace addresses from exceptions and other sources are automatically decoded -- see https://docs.espressif.com/projects/esp-idf/en/stable/esp32/api-guides/tools/idf-monitor.html#automatic-address-decoding.

The same does not work in the Wokwi terminal, though, and the only option is to manually look up addresses with:

$ xtensa-esp32-elf-addr2line -pfiaC -e build/PROJECT.elf ADDRESS

It would be great if Wokwi CLI would automatically do this, just like idf.py monitor.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant