the original syser debugger now is opensource
reverse engineering old syser win32 debugger
improved handle x64 arch and fix some bugs
my syser IDA reverse engineering database idb
you able to see about my reverse engineering skills
struct viewer
note: pdb2sds.exe .pdb .sds must be same arch!
for source level debugging don't convert .exe to .sds
syser debugger will automatic detect .pdb for .exe
pdb2sds.exe while convert doest include source level debug info
only structs and variables
convert any .pdb or .exe by util pdb2sds.exe
load .sds file from syser menu
Menu "File"->"Load Symbol File"
check from console by command
sdsmod
File BP(s) Size(k) CheckSum TimeStamp ModuleName
0 0k 00000001 00000001 testx64.pdb
1 Module(s)
start debug .exe
open popup menu on data window by right mouse button
choose a struct by select it
choose "Attach type to Addr"
choose "Lock Type"
enter at "Address" address of struct
If you want to thank me
BTC 3HdQ9tLRoZ1uRGV6rfoDoUhF75DqzJa4UM