AnswerBun.com

IDA memory mirroring

Reverse Engineering Asked by dajolelor on September 21, 2020

I am trying to reverse engineer an embedded firmware in IDA. It mirrors memory address 0x80000000-0x81FFFFF to 0xA0000000-0xA1FFFFFF.
How do I setup IDA to recognise memory mirroring.

One Answer

Edit->Segments->Rebase program

You could also do manual load and specify your image base.

Answered by ArcherCreat on September 21, 2020

Add your own answers!

Related Questions

Watching a TLS Slot value in x64dbg

0  Asked on November 14, 2020 by ashutosh-raina

     

IDA – tracing strings

0  Asked on November 8, 2020 by bojan-vukasovic

   

Unknown chip on PCB

0  Asked on October 26, 2020 by ilfreddy

 

Why do we need to know the address of shellcode?

1  Asked on October 22, 2020 by sathyam-lokare

         

How to clone flash memory over JTAG connection?

0  Asked on October 13, 2020 by cem-kaan

   

Use Android Shared library (.so) files in Linux

3  Asked on October 3, 2020 by irajtaghlidi

       

What does xchg means when accessing array element?

1  Asked on September 30, 2020 by yudjin

     

IDA memory mirroring

1  Asked on September 21, 2020 by dajolelor

   

c-sky family based gx6605 firmware analysis to read data

0  Asked on September 17, 2020 by sandeep-singh

 

C166/C167 code analyzing

0  Asked on September 12, 2020 by unicornux

       

idapython: getting a list of all segments

1  Asked on September 12, 2020 by ericg

   

Reference address by name in Radare2/Cutter

1  Asked on September 11, 2020 by pehat

   

Nested Structures in IDA

2  Asked on September 5, 2020 by xeroxducati

       

Ask a Question

Get help from others!

© 2023 AnswerBun.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP