DataChi / memdb
Tools to track memory accesses in applications and visualize the patterns to reveal opportunities for optimization.
☆90Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for memdb
- PIN-tool to produce multi-threaded atomic memory traces☆33Updated 11 years ago
- ☆31Updated last year
- An LLVM pass to profile dynamic LLVM IR instructions and runtime values☆135Updated 3 years ago
- Repeated access to L2-containable loops to look for snoop filter conflicts on Intel Skylake Xeon processors.☆29Updated 6 years ago
- a Pin tool for collecting microarchitecture-independent workload characteristics☆59Updated 9 months ago
- Memory access tracing QEMU☆94Updated 7 years ago
- some tlb experimentation code: calculate L1, L2 miss penalties and show cross-HT interference.☆13Updated 5 years ago
- Creating beautiful gem5 simulations☆45Updated 3 years ago
- The Contech analysis framework provides the means for generating and analyzing task graphs that enable computer architects and programmer…☆50Updated 4 years ago
- Test suite for the Linux perf_event subsystem☆110Updated last month
- An unofficial mirror of the core PARSEC 3.0 benchmark suite with patches to run on x86_64 Arch Linux and generalize builds.☆99Updated 2 years ago
- ☆35Updated this week
- A small library and kernel module for easy access to x86 performance monitor counters under Linux.☆94Updated 6 months ago
- Haystack is an analytical cache model that given a program computes the number of cache misses.☆42Updated 5 years ago
- A collection of C/C++ programs and Python scripts to be used in conjunction with Intel Software Development Emulator (Intel SDE, availabl…☆28Updated last week
- This repository contains some tools to monitor the UNC_CBO_CACHE_LOOKUP event of the C-Boxes.☆11Updated 7 years ago
- Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.☆57Updated 4 years ago
- ☆23Updated 3 years ago
- ☆34Updated 2 years ago
- A false sharing detection and repair tool☆12Updated 5 years ago
- A blog for LLVM(v9.0.0 or v11.0.0) beginner, step by step, with detailed documents and comments. Record the way I learn LLVM and accompli…☆100Updated 2 years ago
- PTLsim and QEMU based Computer Architecture Research Simulator☆129Updated 2 years ago
- Hands on with side-channels: a tutorial on covert-channels built using shared CPU resources. Three different covert-channel implementatio…☆42Updated 5 years ago
- A tool for measuring the cache-coherence latencies of a processor (i.e., the latencies of loads, stores, CAS, FAI, TAS, and SWAP).☆75Updated 2 years ago
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆22Updated last month
- Memory System Microbenchmarks☆61Updated last year
- Hardware-assisted Data-flow Isolation☆26Updated 6 years ago
- ☆18Updated 4 years ago
- Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser☆60Updated 2 years ago
- The Splash-3 benchmark suite☆42Updated last year