But you can read EDMAC register values from shadow memory. On M3 it begins from 0x01040000.
Thanks! this works quite well.
Tested with camera recording 1080p video.
Result from my version of EDMAC:
Connection : write=0x80000000 read=0xff
Base: c0f04300 Address : 353fb00
State : 4
Size A : 0 (0 x 0)
Size B : 1670500 (1280 x 359)
Size N : 0 (0 x 0)
off1a : 0
off1b : 0
off2a : 0
off2b : 0
off3 : 0
off40 : 0
Results from multiple rmem's
con 1> rmem -i32 0x01044300 32
0x01044300 128
0x01044300: 0x00000004 0x20008000 0x033e2b00 0x00000000
0x01044310: 0x01670500 0x00000000 0x00000000 0x00000000
0x01044320: 0x00000000 0x00000000 0x00000000 0x00000000
con 1> rmem -i32 0x01044300 32
0x01044300 128
0x01044300: 0x00000004 0x20008000 0x0353fb00 0x00000000
0x01044310: 0x01670500 0x00000000 0x00000000 0x00000000
0x01044320: 0x00000000 0x00000000 0x00000000 0x00000000
0x01044330: 0x00000000 0x00000000 0x00000000 0x00000000
con 1> rmem -i32 0x01044300 32
0x01044300 128
0x01044300: 0x00000001 0x20008000 0x03491300 0x00000000
0x01044310: 0x01670500 0x00000000 0x00000000 0x00000000
0x01044320: 0x00000000 0x00000000 0x00000000 0x00000000
0x01044330: 0x00000000 0x00000000 0x00000000 0x00000000
Now if I understand correctly this is a DMA transfer of units 1280 bytes performed 360 times to address 0x03491300 or 0x0353fb00 or 0x033e2b00
which seems consistent for a 16:9 video which would be 640:360 on the LCD.
However I do not recognize the addresses:
0x03491300 0x0353fb00 0x033e2b00
Edit: but dumping one of the above addresses with rmem to a file reveals a digic6 uyvy image (live view)