I am running Amplifier 2013 update2 on SandyBridge. OS is Linux.
From snb-general-exploration, I can see a function has a lot of OFFCORE_RESPONSE.ANY_DATA_RD.LLC_MISS_ANY.REMOTE_HITM_1. I want to dig further and see the memory access patten and the source code associate with it.
This question was asked earlier, but I would like to confirm if there is a way to do it now.