I have found the “bug” sample application that uses the “adl_errStartBacktraceAnalysis()” group of functions:
c:\Program Files\Sierra Wireless\Embedded Software\com.wavecom.openat.ide.spm.lib.os.model.6.32.0.03_6.32.0.03\resources\ADL\samples\Bug\
I am able to run it and download a backtrace dump file via XMODEM. How do I view / decode this file?
I believe the backtraces are “encrypted” so you cannot inspect the contents.
I’ve heard that the next release of M2M Studio will contain something like the Target Monitoring Tool to allow you to do backtrace analysis - being released next January-ish.