Skip to content

marakew/syser

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

27 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

the original syser debugger now is opensource

reverse engineering old syser win32 debugger
improved handle x64 arch and fix some bugs
my syser IDA reverse engineering database idb
you able to see about my reverse engineering skills

struct viewer
note: pdb2sds.exe .pdb .sds must be same arch!
for source level debugging don't convert .exe to .sds
syser debugger will automatic detect .pdb for .exe
pdb2sds.exe while convert doest include source level debug info
only structs and variables

convert any .pdb or .exe by util pdb2sds.exe
load .sds file from syser menu
Menu "File"->"Load Symbol File"
check from console by command

sdsmod
File BP(s) Size(k) CheckSum TimeStamp ModuleName
0 0k 00000001 00000001 testx64.pdb
1 Module(s)

start debug .exe
open popup menu on data window by right mouse button
choose a struct by select it
choose "Attach type to Addr"
choose "Lock Type"
enter at "Address" address of struct

sources

If you want to thank me

    BTC 3HdQ9tLRoZ1uRGV6rfoDoUhF75DqzJa4UM

About

syser debugger x32/x64 ring3 with source level debugging/watch view/struct view

Topics

Resources

Stars

Watchers

Forks

Languages