Skip to content

Commit 3c5eba7

Browse files
docs: add steps to open wpa + minor rectifications
1 parent 3891ca4 commit 3c5eba7

File tree

4 files changed

+23
-5
lines changed

4 files changed

+23
-5
lines changed

content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/_index.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ prerequisites:
1414
- Windows desktop or development machine
1515
- Windows Performance Analyzer installed
1616
- WindowsPerf WPA Plugin installed
17-
- (Optional) WindowsPerf installed on a WoA machine [(Installation guide)](/install-guides/wperf/)
17+
- (Optional) [WindowsPerf](/install-guides/wperf/) installed on a WoA machine [(Installation guide)](/install-guides/wperf/)
1818

1919
author_primary: Alaaeddine Chakroun
2020

@@ -23,6 +23,7 @@ skilllevels: Introductory
2323
subjects: Performance and Architecture
2424
armips:
2525
- Cortex-A
26+
- neoverse
2627
operatingsystems:
2728
- Windows
2829
tools_software_languages:
27.1 KB
Loading
32.2 KB
Loading

content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/windowsperf_wpa_plugin.md

Lines changed: 21 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,13 +20,30 @@ For installation instructions see the [install guide](/install-guides/windows-pe
2020

2121
## Using WindowsPerf WPA Plugin
2222

23-
In order to use the `WindowsPerf WPA Plugin`, we first need to get a `.json` output from a `wperf stat` command running on a Windows on Arm machine.
23+
In order to use the `WindowsPerf WPA Plugin`, we first need to get a `.json` output from a WindowsPerf `wperf stat` command running on a Windows on Arm machine.
24+
> In order to get a `.json` output from WindowsPerf, we need to use the `--output` command followed by the filename.
25+
26+
Example:
27+
28+
```command
29+
wperf stat -e ld_spec --output example.json
30+
```
31+
32+
Upon opening Windows Performance Analyzer, we are greeted with the following window:
33+
![wpa-first-screen](figures/wpa-first-screen.png)
34+
35+
As we can see, the WindowsPerf WPA Plugin is installed correctly and it appears under the Installed Plugins section. We can then click on "Open file..." from the start menu on the left side and we're prompted to choose a `.json` file.
36+
37+
![wpa-open-file](figures/wpa-open-file.png)
38+
39+
By clicking "Open", the output file is then validated to check its format and compatibility with the plugin, and finally the main WPA window opens up.
40+
2441

2542
### Timeline
2643

2744
For this example we will be running the following command:
2845

29-
```bash
46+
```command
3047
wperf stat -m dcache -c 0,1,2,3,4,5,6,7 -t -i 0 -n 50 --json
3148
```
3249

@@ -40,7 +57,7 @@ The WindowsPerf WPA Plugin also generates a graph per event note in order to pro
4057

4158
For this example, the following command was used instead:
4259

43-
```bash
60+
```command
4461
wperf stat -t -i 0 -m imix,l1d_cache_miss_ratio,l1d_cache_mpki,l1d_tlb_miss_ratio,l1d_tlb_mpki -e inst_spec,vfp_spec,ld_spec,st_spec -c 1 --json
4562
```
4663

@@ -54,7 +71,7 @@ The WindowsPerf WPA Plugin also allows the visualization of telemetry metrics co
5471

5572
For this example, the following command was used:
5673

57-
```bash
74+
```command
5875
wperf stat -t -i 0 -m imix,l1d_cache_miss_ratio,l1d_cache_mpki,l1d_tlb_miss_ratio,l1d_tlb_mpki -e inst_spec,vfp_spec,ld_spec,st_spec -c 1 --json
5976
```
6077

0 commit comments

Comments
 (0)