AnswerBun.com

IDA memory mirroring

Reverse Engineering Asked by dajolelor on September 21, 2020

I am trying to reverse engineer an embedded firmware in IDA. It mirrors memory address 0x80000000-0x81FFFFF to 0xA0000000-0xA1FFFFFF.
How do I setup IDA to recognise memory mirroring.

One Answer

Edit->Segments->Rebase program

You could also do manual load and specify your image base.

Answered by ArcherCreat on September 21, 2020

Add your own answers!

Related Questions

Disassembling ARM based Camera Firmware

1  Asked on August 14, 2021 by arkod

       

How to know when a subroutine starts when reversing an ARM64 file?

1  Asked on August 12, 2021 by user11144725

   

Show full name in symbols panel of Ghidra

0  Asked on August 12, 2021 by sieutruc

 

Wrap-around MCU memory map definition with negative addresses

1  Asked on August 11, 2021 by brainstorm

 

Confused about the use of the shl instruction in this disassembly

1  Asked on August 8, 2021 by constructive

       

IDA python : reading n bytes from an offset

1  Asked on August 8, 2021 by user3714670

   

LOG Urls that APK requests using smali

1  Asked on August 4, 2021 by sitedude

 

Reverse engineering android native packer

1  Asked on August 3, 2021

     

Delphi mt38 CRC (Tricore 1766 Arch)

0  Asked on August 2, 2021 by bahar

       

How to dump firmware from ATWINC1510

1  Asked on July 31, 2021 by cobz

         

Ask a Question

Get help from others!

© 2022 AnswerBun.com. All rights reserved. Sites we Love: PCI Database, MenuIva, UKBizDB, Menu Kuliner, Sharing RPP, SolveDir