Index ¦ Archives ¦ Atom > Category: reverse engineering ¦ Atom

Visualizing memory accesses of an executable

Memory visualizations can often give quick insight into code and its algorithms. See this post for example visualizations of memory accesses by pngcheck, printf and t206 and the tool to draw them.

© Otto Ebeling. Built using Pelican. Theme by Giulio Fidente on github.