This file contained what looked like windows 1250 encoded single
quotation marks. Convert them to UTF-8.

Cc: Ard Biesheuvel <ard.biesheu...@linaro.org>
Signed-off-by: Leif Lindholm <leif.lindh...@linaro.org>
---
 EmbeddedPkg/Scripts/LauterbachT32/README.txt | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/EmbeddedPkg/Scripts/LauterbachT32/README.txt 
b/EmbeddedPkg/Scripts/LauterbachT32/README.txt
index 06602ab8763a..5b323375ae35 100644
--- a/EmbeddedPkg/Scripts/LauterbachT32/README.txt
+++ b/EmbeddedPkg/Scripts/LauterbachT32/README.txt
@@ -1,7 +1,7 @@
 DXE Phase Debug
 ===============
-Update the memsize variable in EfiLoadDxe.cmm for the actual amount of memory 
available in your system.  Allow your system to boot to the point that the DXE 
core is initialized (so that the System Table and Debug Information table is 
present in memory) and execute this script (using the toolbar button or �do 
EfiLoadDxe� from the command area).  It will scan memory for the debug info 
table and load modules in it.
+Update the memsize variable in EfiLoadDxe.cmm for the actual amount of memory 
available in your system.  Allow your system to boot to the point that the DXE 
core is initialized (so that the System Table and Debug Information table is 
present in memory) and execute this script (using the toolbar button or ‘do 
EfiLoadDxe’ from the command area).  It will scan memory for the debug info 
table and load modules in it.
  
 SEC/PEI Phase Debug
 ===================
-There is no way to autodetect where these images reside so you must pass an 
address for the memory-mapped Firmware Volume containing these images.  To do 
this, enter �do EfiLoadFv <addr>� where <addr> is the base address for the 
firmware volume containing the SEC or PEI code.  To be more efficient you may 
want to create a script that calls this, like MyBoardLoadSec.cmm which contains 
the call to EfiLoadFv.  You can them map this script to a T32 menu or toolbar 
button for quick access.
+There is no way to autodetect where these images reside so you must pass an 
address for the memory-mapped Firmware Volume containing these images.  To do 
this, enter ‘do EfiLoadFv <addr>’ where <addr> is the base address for the 
firmware volume containing the SEC or PEI code.  To be more efficient you may 
want to create a script that calls this, like MyBoardLoadSec.cmm which contains 
the call to EfiLoadFv.  You can them map this script to a T32 menu or toolbar 
button for quick access.
-- 
2.20.1


-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.

View/Reply Online (#47507): https://edk2.groups.io/g/devel/message/47507
Mute This Topic: https://groups.io/mt/34193909/21656
Group Owner: devel+ow...@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub  [arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to