Static code analysis for Renesas RX MCUs, in IAR toolset

July 08, 2015 // By Graham Prophet
IAR Systems has extended its Renesas RX tools with static code analysis; Embedded Workbench for RX now has the static analysis tool C-STAT fully integrated.

IAR Systems’ (Uppsala, Sweden) version 2.80 of its Embedded Workbench for RX, complete C/C++ compiler and debugger toolchain adds integrated static code analysis through C-STAT, which makes it possible for RX developers to take full control of their code.

Static analysis finds potential issues in code by doing an analysis on the source code level. Such errors as memory leaks, access violations, arithmetic errors and array and string overruns can cause security issues and affect the performance and quality of a product. By using static analysis, developers can identify these errors early and minimise their impact on the finished product and the project timeline. In addition to raising the code quality, the analysis can aid alignment with industry coding standards.

C-STAT is a static analysis tool that checks compliance with rules as defined by the MISRA C:2004, MISRA C++:2008 and MISRA C:2012 coding standards, as well as hundreds of rules based on, for example, CWE (the Common Weakness Enumeration) and the CERT C/C++ Secure Coding Standards. Users can select which ruleset and which individual rules to check the code against, and the analysis results are provided directly in the IAR Embedded Workbench IDE.

IAR Embedded Workbench for RX provides a complete development toolchain that includes the highly optimising IAR C/C++ Compiler with Renesas RX ABI compliance as well as the C-SPY Debugger with support for Renesas E1 and E20 emulators. Version 2.80 of the toolchain also adds support for Renesas’ new E2 Lite on-chip debugging emulator.

IAR Systems; and