Updated in 2024-08. Note: The article will likely get frequent updates in the next few days. This article describes some approaches to distribute debug information. Commands below will use two simple| MaskRay
This is part of a new series I am starting on the blog where we’ll explore RISC-V by breaking down real programs and explaining how they work. You can view all posts in this series on the RISC-V Bytes page. To start of the series, we are just going to get setup to do some exploration. I am going to assume you will not primarily be using a RISC-V machine1, so we need to configure our local development environment for cross-platform compiling, emulation, and debugging.| danielmangum.com