Adds further support for tools that want information beyond just memory addresses by adding an API to leverage the raw2trace code to map in the binaries used during traced execution and examine the instruction bytes. This takes the shape of two new routines: raw2trace_t::do_module_parsing_and_mapping() and raw2trace_t::find_mapped_trace_address().
Adds a new simulator tool "opcode_mix" which uses the new API to decode the opcode for each executed instruction and print out the dynamic count of each opcode. The tool only operates with offline traces and needs access to the modules.log and binaries of the traced execution.
Adds documentation and a test.
Issue: #2006 (closed)