输入d(0x12345678, 32)即可查看内存地址0x12345678处的32个字节的内容。
运行效果:
[root@localhost ~]# cd linux-dev-framework
[root@localhost ~]# make
...
[root@localhost linux-dev-framework]# ./target/symbol_utils_test.exe
****symbol_shell started****
you can input var names to see var info
you can input d(addrress, len) to see memory contents
you can input xxx(1, 0x2, "abc") to execute function xxx
caution: every args‘s size of function xxx must == sizeof(long)
[symbol_shell]my_var
[var address] : 0x6030cc
[values] :
1 byte :0xd2 (-46)
2 bytes:0x4d2 (1234)
4 bytes:0x4d2 (1234)
8 bytes:0x63d87640000004d2 (7194630421974353106)
[symbol_shell]my_func(1, "hello", 0x64)
para1=1 para2=0x7fe8639cae1b para3=100
para2 contents = hello
[symbol_shell]
本程序源码在linux-dev-framework源码包中。
linux-dev-framework源码包的介绍:http://blog.csdn.net/crazycoder8848/article/details/22491525
版权声明:本文为博主原创文章,未经博主允许不得转载。
原文地址:http://blog.csdn.net/crazycoder8848/article/details/47079607