Hi
I do not know what GDW could be but for tracing prog launched in an ECC system you can use the security audit log (SM19 / SM20).
I do not think there are a standard mechanism to trace access to SE80.
Why do you have such requirements ?
Regards
539404 - FAQ: Answers to questions about the Security Audit Log