The backdoor paths in the register model are accessed via DPI, not through direct hierarchical access - that is how the package scoping restrictions are avoided.
The backdoor paths in the register model are accessed via DPI, not through direct hierarchical access - that is how the package scoping restrictions are avoided.