Академический Документы
Профессиональный Документы
Культура Документы
Command
k (kn, kM, knL)
dv
Description
View call stack
Display local variables
Sample usage
kn 10
dv v
.frame N
.frame 1
r (rReg)
x Symbol
Examine Symbol
reax
X user32!SendMessageA
X this
x user32!SendMessage*
.for (op1;op2;op3)
{Commands}
db 0x012345 0x012345 +
0x10
Dd 0x012345 0x012345 +
0x10
dt Type Address
? or ??
Displays contents of
Address as a structure of
type Type
Evaluate Expression
dt vWM_COMMAND
0037ef48
?0n20
??this->msg
eb Address Value
eb 0x1234 3
eza 0x012345 hello world
u (uf Method)
Unassemble
Comments
Shows top 0x10 frames
Display local variables and
show registry or address
Switch context to frame 1
(topmost frame is 0)
Displays all registry values
including current line
executed
Displays value of registry eax
Shows address and signature
of function
user32!SendMessageA
Shows address and value of
this pointer
Shows address and signature
of all functions beginning in
user32!SendMessage (e.g. x
user32!SendMessageW)
Loops virtual register $t1
from value 0 to value 0x10, in
steps of 1 and for each step
runs the command r$t1,
which displays the value of
the register.
Displays all memory contents
between addresses 0x012345
and 0x012345 + 0x10
inclusively
Displays all memory contents
between addresses 0x012345
and 0x012345 + 0x10
inclusively as DWORD values
(32bit)
Display contents of address
0037ef48 as type
vWM_COMMAND
Evaluates expression 0x20 to
0x14 (using default
evaluator, which is ASM)
Evaluates C++ expression
this->msg, which displays the
field msg of object this.
Writes byte value 3 to
Address 0x1234
Writes zero-terminated ASCII
value hello world to
Address 0x012345
Writes zero-terminated
Unicode value hello world
to Address 0x012345
Unassemble the next eight
instructions
uf user32!SendMessageA
lmvm user32
lmfsm
!lmi Module
!lmi user32.dll
Control execution
p (pc)
Step over
pc
t (tc)
Step into
tc
Continue execution
gu
Step out
gu
wt
t;wt
Breakpoints
bp Method
Add a breakpoint on
method call
bp user32!MessageBoxW
bp USER32!DialogBox2 ".if
(poi(fOwnerIsActiveWindow)==1)
{.echo One;gc;} .else {.echo
Zero;gc;}"
ba w4 0x0abcdef
ba r4 0x01234567
bm Pattern
bm user32!Meth*d
be N
bd N
Enable breakpoint N
Disable breakpoint N
be1
bd*
Memory
!heap Options Address
!heap s
!address Options
!address summary
!peb
!peb
!teb
!teb
!gle
!runaway
!runaway
~N e Command
~1kn
!vprot Address
!vprot 30c191c
Symbols
ln Address
ln mso + 0x00abe98
.symopt Flags
.symopt +40
!sym Option
!sym noisy
!sym quiet
.reload /f /s user32.dll
Extensions
.load Path
.chain
.chain
!idna.tt Percent
!idna.tt 50
.time
.time -s
!idna.position
!idna.position -a
!idna.index
p-
p-c
t-
t-c
Loads extension
wow64exts.dll from default
extension path
(C:\debuggers\winext,
C:\debuggers\winxp).
Execute command sw from
first extension in search
chain.
The command sw switches
context between 32bit and
64bit.
Shows extension search
path and search chain
g-
MEX
!mex.help
!mex.update
!mex.olanalyze
!mex.wdanalyze
!mex.err Code
!mex.rop Code
!mex.dumpconnections
Dumps Outlook's
connection list
Dump type with DML
!mex.fos
!mex.err 0x80040115
!mex.rop 9
!mex.ddt 0x0c9aee08
user32!Message
Interprets 0x80040115 =
MAPI_E_NETWORK_ERROR
Interprets ROP 9 to
ropGetPropList
Managed
!psscor2.help
!psscor4.help
!Analysis
!CLRStack
!dumpstack
!printexeption
!psscor.threads
!pde.help
!pde.seek Symbol Command
!pde.analyze -v
Exception analysis
!pde.deep 30
!seek ReadFile dv
!pde.vmem
!pde.dpx