IDA memory mirroring

Reverse Engineering Asked by dajolelor on September 21, 2020

I am trying to reverse engineer an embedded firmware in IDA. It mirrors memory address 0x80000000-0x81FFFFF to 0xA0000000-0xA1FFFFFF.
How do I setup IDA to recognise memory mirroring.

One Answer

Edit->Segments->Rebase program

You could also do manual load and specify your image base.

Answered by ArcherCreat on September 21, 2020

Add your own answers!

Related Questions

Watching a TLS Slot value in x64dbg

0  Asked on November 14, 2020 by ashutosh-raina


IDA – tracing strings

0  Asked on November 8, 2020 by bojan-vukasovic


Unknown chip on PCB

0  Asked on October 26, 2020 by ilfreddy


Why do we need to know the address of shellcode?

1  Asked on October 22, 2020 by sathyam-lokare


How to clone flash memory over JTAG connection?

0  Asked on October 13, 2020 by cem-kaan


Use Android Shared library (.so) files in Linux

3  Asked on October 3, 2020 by irajtaghlidi


What does xchg means when accessing array element?

1  Asked on September 30, 2020 by yudjin


IDA memory mirroring

1  Asked on September 21, 2020 by dajolelor


c-sky family based gx6605 firmware analysis to read data

0  Asked on September 17, 2020 by sandeep-singh


C166/C167 code analyzing

0  Asked on September 12, 2020 by unicornux


idapython: getting a list of all segments

1  Asked on September 12, 2020 by ericg


Reference address by name in Radare2/Cutter

1  Asked on September 11, 2020 by pehat


Nested Structures in IDA

2  Asked on September 5, 2020 by xeroxducati


Ask a Question

Get help from others!

© 2023 All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP