Windows Process:查看函数和更改参数的工具
不久前,我使用 Windows 工具来查看进程正在做什么。这个工具允许我检查从 DLL 导出的函数。它还允许我动态更改传递给函数的值。
我记不起这个名字了(不确定是免费的还是商业的)。有人能给我指出可以做到这一点的解决方案吗?
(像 ProcessExplorer、ProcessMonitor 这样的工具有一点帮助......这更好)
干杯, 贾扬
Sometime back I used a windows tool to see what a process is doing. This tool allowed me to inspect functions exported from DLL. It also allowed me to change the values passed to a function on the fly.
I cannot recollect the name(not sure if that was free or commercial one). Could any one point to me solution that can do this?
(Tools like ProcessExplorer, ProcessMonitor helps a bit.. this was better)
Cheers,
Jayan
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(3)
Windbg 允许您附加到进程并调试它们,包括设置断点、观察堆栈和操作状态。
Windbg lets you attach to processes and debug them, including set breakpoints, observe the stack and manipulate state.
另一个有用的工具是 SysInternals / Microsoft 的 DebugView。此外,进程监视器对于查看其他 API 在以下情况下如何工作非常有用:与他们互动。此外,Process Hacker 是一个很棒的运行时工具,用于检查内存区域、线程、DLL 挂钩等。如果您愿意,您甚至可以修改内存位,有点像 C64 上的 POKE。
替代文本 http://img168.imageshack.us/img168/4676/esfsef.png< /a>
Another useful tool is DebugView from SysInternals / Microsoft. Also, Process Monitor is pretty useful for seeing how other APIs work when interacting with them. Additionally, Process Hacker is a great runtime tool for inspecting memory regions, threads, DLL hooks, and so on. You can even modify the bits of memory if you wish, a bit like POKEs on the C64.
alt text http://img168.imageshack.us/img168/4676/esfsef.png
depends 将向您显示导出的符号(但不允许您使用参数)
depends will show you exported symbols (doesn't let you play with arguments though)