Ending toolchain fragmentation for RH850 developers, TASKING introduces a unified approach, signalling faster workflows, fewer vendors, and a shift in automotive software development.
TASKING has launched a high-performance compiler upgrade for the Renesas RH850/U2x microcontroller family, extending support to the upcoming RH850/U2C series. Built for automotive and industrial applications, the enhanced compiler works in tandem with TASKING’s debugging and testing solutions to deliver a fully unified development environment for RH850-based systems.
Developers working across multiple microcontroller platforms have long struggled with fragmented toolchains sourced from different vendors. TASKING’s latest release addresses this complexity by bringing together compile, debug, and test capabilities into a single integrated platform. The environment supports a wide range of automotive architectures—including TriCore architecture, Arm architecture, and RISC-V architecture—within a TÜV-certified framework for functional safety and cybersecurity.
Frank Krämer, Director of Microcontroller Partnerships at TASKING, highlighted that the solution is designed to simplify vendor management while improving efficiency and accelerating development timelines. By consolidating tools into a single ecosystem, developers can seamlessly transition between architectures without disrupting established workflows.
Echoing this, Sandra Stehr of Renesas Electronics emphasized the strength of the long-standing partnership between the two companies. She noted that the upgraded compiler enables developers to extract greater performance from the RH850 platform and better utilize the capabilities of the latest silicon.
Currently in pre-release, the TASKING RH850 Compiler is set to be available to select customers in April, with a broader public release expected in the second quarter. The solution supports the existing RH850/U2x family and is aligned with the future roadmap of RH850 microcontrollers, while maintaining full TÜV certification for safety and security requirements.



















