IDA memory mirroring

Reverse Engineering Asked by dajolelor on September 21, 2020

I am trying to reverse engineer an embedded firmware in IDA. It mirrors memory address 0x80000000-0x81FFFFF to 0xA0000000-0xA1FFFFFF.
How do I setup IDA to recognise memory mirroring.

One Answer

Edit->Segments->Rebase program

You could also do manual load and specify your image base.

Answered by ArcherCreat on September 21, 2020

Add your own answers!

Related Questions

Disassembling ARM based Camera Firmware

1  Asked on August 14, 2021 by arkod


How to know when a subroutine starts when reversing an ARM64 file?

1  Asked on August 12, 2021 by user11144725


Show full name in symbols panel of Ghidra

0  Asked on August 12, 2021 by sieutruc


Wrap-around MCU memory map definition with negative addresses

1  Asked on August 11, 2021 by brainstorm


Confused about the use of the shl instruction in this disassembly

1  Asked on August 8, 2021 by constructive


IDA python : reading n bytes from an offset

1  Asked on August 8, 2021 by user3714670


LOG Urls that APK requests using smali

1  Asked on August 4, 2021 by sitedude


Reverse engineering android native packer

1  Asked on August 3, 2021


Delphi mt38 CRC (Tricore 1766 Arch)

0  Asked on August 2, 2021 by bahar


How to dump firmware from ATWINC1510

1  Asked on July 31, 2021 by cobz


Ask a Question

Get help from others!

© 2022 All rights reserved. Sites we Love: PCI Database, MenuIva, UKBizDB, Menu Kuliner, Sharing RPP, SolveDir