I have a small command line application named "debugger" which acts as a debugger for a process A. Now this application works fine with x86 and x64. Now I have to migrate this "debugger" to ARM64 architecture. What this debugger very briefly does is attach breakpoints aka writes instruction int3(0xcc) to the start of functions it finds in the map file of the Process A. Now whenever I try to run my application via this "debugger" app I am able to set breakpoints but the app continuously gets "access_violation" and crashes violently. My hunch is that for ARM64 architecture the instruction "0xcc" which I am writing to the start of the functions is causing the access_violation. I have tried using instructions "0x150", "0xF000" instead of "0xcc". For more info please refer my earlier question.
To make sure that this is the only issue I want an instruction adding which does not impact code execution in any way so that I can confirm that the only issue is the instruction I am writing as breakpoint in my debugger code. Please help me narrow down my issue, also provide links for all your answers.