Reverse Engineering Asked by KeyC0de on October 5, 2021
I’m using x32dbg and I’ve set a hardware memory breakpoint. It triggers successfully for a specified module and the debugger pauses and a message on the bottom says:
Hardware breakpoint (byte, read/write) at mscorlib.ni.69`9d3d9 (6919d3d9)!
All good so far. Now naturally I want to go to address 6919d3d9
, which I assume to be the starting memory address of the code that accessed my target memory location.
So I go to Breakpoints view (Alt+B) double click on the breakpoint and it gets me to Dump, ie the memory view.. This is where I’m confused. I can’t find out how to go to address 6919D3D9
to see the disassembled instructions. Kindly help if you can.
Normally the debugger should pause at the location where breakpoint is triggered, or you can use "jump to EIP" or similar command to navigate to the instruction being executed (which should be the one that triggered the exception).
Correct answer by Igor Skochinsky on October 5, 2021
Get help from others!
Recent Answers
Recent Questions
© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP