Reverse Engineering Asked by Notoriouss on December 25, 2020
When i’m debugging a code in decompiler mode, one problem i face is that when i double click on a variable, it goes to "stack locations" instead of the actual address that the variable/structure is stored :
-0000002C KeyHandle dd ? ; offset
-00000028 RegistryPath LSA_UNICODE_STRING ?
-00000020 var_20 dd ?
-0000001C var_1C dd ?
-00000018 var_18 dd ?
-00000014 var_14 dd ?
-00000010 var_10 dd ?
-0000000C var_C dd ?
-00000008 var_8 dd ?
And clicking on the variable names in above tab doesn’t go to the address either.
also I’m not sure why but everytime, all the values of this place are "?", which is not really useful, so in order for me to go to actually go to the address this variable is stored, i have to point my mouse on it, find its address, then write it in cntrl+g to go there.
it would be a lot better if i could just click on the variable and it went to the address that this variable is stored, is there any way i can do this?
3 Asked on May 26, 2021 by chase-kanipe
1 Asked on May 26, 2021 by machine-yadav
0 Asked on May 24, 2021 by kojuda
0 Asked on May 23, 2021 by rahul-rc
0 Asked on May 23, 2021 by alcao758
2 Asked on May 22, 2021 by polly
0 Asked on May 21, 2021 by nikk-mann
4 Asked on May 21, 2021
1 Asked on May 20, 2021 by blackrussian
1 Asked on May 19, 2021 by n0t0r1us
0 Asked on May 19, 2021 by fawkes
1 Asked on May 16, 2021 by user503997
Get help from others!
Recent Answers
© 2022 AnswerBun.com. All rights reserved. Sites we Love: PCI Database, MenuIva, UKBizDB, Menu Kuliner, Sharing RPP