International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 1 | Views: 135 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article | Software Engineering | India | Volume 11 Issue 8, August 2022 | Popularity: 4.7 / 10


     

Virtual Memory to Memory Scaler Hardware Device Using QEMU

Karthik Poduval


Abstract: This paper describes the methods to build a virtual memory to memory device attached to QEMU?s ARM virt generic hardware device. This virtual hardware device could be used as a development platform to demonstrate Linux device driver development for Video4Linux2 M2M (Memory to Mem- ory) drivers.


Keywords: QEMU, Scaler, Virtual, Hardware Emulation, M2M, V4L2 M2M


Edition: Volume 11 Issue 8, August 2022


Pages: 1507 - 1509


DOI: https://www.doi.org/10.21275/SR24506180220



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Karthik Poduval, "Virtual Memory to Memory Scaler Hardware Device Using QEMU", International Journal of Science and Research (IJSR), Volume 11 Issue 8, August 2022, pp. 1507-1509, https://www.ijsr.net/getabstract.php?paperid=SR24506180220, DOI: https://www.doi.org/10.21275/SR24506180220



Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Software Engineering, United States of America, Volume 13 Issue 6, June 2024

Pages: 1072 - 1077

Digital Twins: A New Era in P&C Insurance Underwriting and Risk Management

Imran Ur Rehman

Share this Article

Downloads: 15 | Weekly Hits: ⮙2 | Monthly Hits: ⮙6

Review Papers, Software Engineering, India, Volume 12 Issue 8, August 2023

Pages: 2008 - 2014

A Comprehensive Review of Performance Testing Methodologies and Best Practices: Software Quality Engineering

Shravan Pargaonkar

Share this Article

Downloads: 91

Research Paper, Software Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2320 - 2324

Malware Seeker: A Network Intrusion Detection and Correlation Technique against Peer to Peer Botnet

A. Shameem, M. Parveentaj

Share this Article



Top