This is an early WIP to make a 68k GDB run against the Jaguar.

JSERVE.EXE is the Windows program that opens a port for GDB to connect to.
JDB is the stub that loads onto the Jaguar to respond to GDB.

Very little documentation is currently available for this, though it does work. 

We invite applications from anyone who'd like to update and maintain it.

In the meantime, use of this code is at your own risk. :)

-------------------------------------------------------------

Quick usage -- not all commands work (for instance, 'run' breaks things). use this order:

1 - Run jserve.exe. It must be able to find the files in this folder to work, and the SKunkboard
must be idle at the green screen. It will load and send both turbow.bin (EZHost CPU code) and
JDB.COF (GDB stub for the Jaguar). It will create jdb.log for debug once connected. When all is
up it will listen on port 4567 for a GDB connection.

2 - make sure your program is compiled with debug information. For GCC this means adding
the -g flag to compiler and linker, and making sure the link does not strip symbols with -s
and your makefile does not strip later with strip. ;)

3 - launch your cross GDB specifying the COF file. It's easiest to launch from the same
folder as the source and executable, to make it easier for GDB to find the files.

4 - Make sure GDB found symbols before you continue. It will comment if it didn't.

5 - connect to the Jaguar from GDB with "target remote :4567" (alternately, if JSERVE is
running on a different PC, you can specify it's IP address as well).

6 - You can read and write memory and registers, set and clear breakpoints, step, and that 
is about it. :) Debugging to ROM will probably not work since breakpoints can not be inserted.

7 - For example, "break main" will make GDB stop when it gets to the main() function.

8 - use "c" to continue the program - there's no guarantee anything else will work. It should
start from the correct address.

Check my YouTube channel for a simple example. https://www.youtube.com/watch?v=BFKp00xROcU


