Hi,

Concerning the following Fast Model Component:
https://developer.arm.com/documentation/100964/1121/Fast-Models-components/Bus-components/PVMemoryProtectionEngine?lang=en

This component is already publicly documented although it is not integrated yet into the AEM FVP.

The main usage is to identify software mis-programming, where the same Physical address is accessed through more than one Physical Address Space (PAS). As such, it is intended as a development / debugging tool only. If such a mis-programming scenario happened then the memory page corresponding to the accessed physical address would get corrupted.

Notice memory encryption is not yet supported in TF-A's SW stacks. You won't find a reference for this feature in TF-A / TF-a-tests just now.

Best regards,
Sandrine