When using ESP-IDF's `idf.py monitor`, backtrace addresses from exceptions and other sources are automatically decoded -- see https://docs.espressif.com/projects/esp-idf/en/stable/esp32/api-guides/tools/idf-monitor.html#automatic-address-decoding. The same does not work in the Wokwi terminal, though, and the only option is to manually look up addresses with: ```bash $ xtensa-esp32-elf-addr2line -pfiaC -e build/PROJECT.elf ADDRESS ``` It would be great if Wokwi CLI would automatically do this, just like `idf.py monitor`.