Looks up a variable or address within the maps of the debuggee.
whatmap EXPRESSION
Before using the script it must be loaded in to the debugger:
source PATHTOADDONS/what_map/what_map.py
whatmap my_variable
: looks up the map containing the named variable.
whatmap *0x1234
: looks up the map containing the address 0x1234.
Note that the argument to whatmap
needs to be addressable - in other words, you should use an
argument that you would pass to watch
.
This command works with vanilla GDB or within UDB. When run under UDB it will inspect the maps of the currently active child process - note that these don't exactly match the maps that were present at record time.