Skip to content

Latest commit

 

History

History
43 lines (35 loc) · 1.78 KB

readme.md

File metadata and controls

43 lines (35 loc) · 1.78 KB

the original syser debugger now is opensource

reverse engineering old syser win32 debugger
improved handle x64 arch and fix some bugs
my syser IDA reverse engineering database idb
you able to see about my reverse engineering skills

struct viewer
note: pdb2sds.exe .pdb .sds must be same arch!
for source level debugging don't convert .exe to .sds
syser debugger will automatic detect .pdb for .exe
pdb2sds.exe while convert doest include source level debug info
only structs and variables

convert any .pdb or .exe by util pdb2sds.exe
load .sds file from syser menu
Menu "File"->"Load Symbol File"
check from console by command

sdsmod
File BP(s) Size(k) CheckSum TimeStamp ModuleName
0 0k 00000001 00000001 testx64.pdb
1 Module(s)

start debug .exe
open popup menu on data window by right mouse button
choose a struct by select it
choose "Attach type to Addr"
choose "Lock Type"
enter at "Address" address of struct

sources

If you want to thank me

    BTC 3HdQ9tLRoZ1uRGV6rfoDoUhF75DqzJa4UM