Everyone makes mistakes. These words are certainly true for developers involved in low-level coding, where such common tools as print debugging and software debuggers run into limits. To solve this problem, software and firmware developers at the beginning of x86 age used in-circuit emulators. Now they use JTAG debugging interface. These hardware debugging facilities are also of interest to security researchers. These tools grant low-level system access and bypass important security protections, making it easier for researchers to study a platform's behavior and undocumented features. With Intel Skylake processors, debugging mechanisms were built into the Platform Controller Hub, which opened it up to ordinary users, including malicious ones, who could use it to gain total control over the processor. For security reasons, these mechanisms are not activated by default, but as we show in this research, they can be activated on the equipment sold in common computer stores.