darchr / gem5-skylake-configView external linksLinks
gem5 configuration for intel's skylake micro-architecture
☆53Jan 6, 2022Updated 4 years ago
Alternatives and similar repositories for gem5-skylake-config
Users that are interested in gem5-skylake-config are comparing it to the libraries listed below
Sorting:
- ☆21Feb 6, 2020Updated 6 years ago
- Extremely Simple Microbenchmarks☆19Jun 27, 2023Updated 2 years ago
- A simulator integrates ChampSim and Ramulator.☆19Aug 18, 2025Updated 5 months ago
- Gem5 with chinese comment and introduction (master) and some other std gem5 version.☆42Jan 2, 2022Updated 4 years ago
- ☆19Feb 18, 2021Updated 4 years ago
- contains TLM2 based interfaces for AXI, ACE, CHI and other standard protocols☆63Jan 12, 2026Updated last month
- A speculative mechanism to accelerate long-latency off-chip load requests by removing on-chip cache access latency from their critical pa…☆76Sep 10, 2025Updated 5 months ago
- Joint HPS and ETH Repository to work towards open sourcing Scarab and Ramulator☆83Sep 8, 2025Updated 5 months ago
- Instruction Pointer Classifier and Dynamic Degree Stream based Hardware Cache Prefetching☆16Nov 16, 2019Updated 6 years ago
- Data-centric defense mechanism against Spectre attacks. (DAC'19)☆11Nov 6, 2019Updated 6 years ago
- Lower chisel memories to SRAM macros☆13Mar 25, 2024Updated last year
- Minimal RISC-V Chisel design strictly reflecting the ISA document for verification.☆18Feb 3, 2026Updated last week
- [ICML 2025] EffiCoder: Enhancing Code Generation in Large Language Models through Efficiency-Aware Fine-tuning☆16May 24, 2025Updated 8 months ago
- MESIF cache coherency protocol for the GEM5 simulator☆15Jun 2, 2016Updated 9 years ago
- The official repository for the gem5 computer-system architecture simulator.☆14May 16, 2025Updated 9 months ago
- This repository contains some tools to monitor the UNC_CBO_CACHE_LOOKUP event of the C-Boxes.☆12Oct 11, 2017Updated 8 years ago
- ☆13Jun 22, 2019Updated 6 years ago
- ☆12May 21, 2020Updated 5 years ago
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆28Jun 25, 2025Updated 7 months ago
- Official repository of the Arm Research Starter Kit on System Modeling using gem5☆118Jun 13, 2025Updated 8 months ago
- ☆15Dec 15, 2022Updated 3 years ago
- GenStore is the first in-storage processing system designed for genome sequence analysis that greatly reduces both data movement and comp…☆15Apr 6, 2022Updated 3 years ago
- A graph coloring register allocator for LLVM.☆11Jan 23, 2017Updated 9 years ago
- A cycle-accurate RISC-V CPU simulator + RTL modeling library in pure Python.☆18Aug 27, 2025Updated 5 months ago
- About the source code of "Merging Similar Patterns for Hardware Prefetching" paper, which is accepted in MICRO 2022.☆14Mar 1, 2023Updated 2 years ago
- Cycle-accurate C++ & SystemC simulator for the RISC-V GPGPU Ventus☆31Dec 24, 2025Updated last month
- Gem5 implementation of "InvisiSpec", a defense mechanism of speculative execution attacks on cache hierarchy.☆61Apr 27, 2020Updated 5 years ago
- ChampSim is an open-source trace based simulator maintained at Texas A&M University and through the support of the computer architecture …☆669Feb 1, 2026Updated 2 weeks ago
- A modified version of McPAT for the COSSIM framework. The code is based on McPAT v1.3 and integrates with cgem5.☆18Mar 21, 2022Updated 3 years ago
- ☆36Apr 20, 2021Updated 4 years ago
- SystemC training aimed at TLM.☆35Jul 31, 2020Updated 5 years ago
- A customizable hardware prefetching framework using online reinforcement learning as described in the MICRO 2021 paper by Bera et al. (ht…☆159Mar 25, 2025Updated 10 months ago
- Konata is an instruction pipeline visualizer for Onikiri2-Kanata/Gem5-O3PipeView formats. You can download the pre-built binaries from ht…☆517Apr 8, 2024Updated last year
- ☆42Mar 31, 2025Updated 10 months ago
- ☆64Dec 4, 2022Updated 3 years ago
- CleanupSpec (MICRO-2019)☆16Oct 22, 2020Updated 5 years ago
- Microarchitecture diagrams of several CPUs☆47Feb 7, 2026Updated last week
- ☆33Apr 8, 2020Updated 5 years ago
- Using Data Memory-Dependent Prefetchers to Leak Data at Rest☆38Sep 6, 2022Updated 3 years ago