TIP: Click on subject to list as thread! ANSI
echo: c_echo
to: Bill Birrell
from: Jasen Betts
date: 2004-05-21 06:52:32
subject: Debugger

Hi Bill.

19-May-04 23:27:01, Bill Birrell wrote to Neil Heller


 BB> Assuming that you are talking about xxx86 CPU, you can insert the
 BB> breakpoint into the actual (or simulated) address as a byte
 BB> operand. OXC3 seems to come to mind (that is a one-byte RET
 BB> instruction). The clever bit is what you do to restore the
 BB> original code when you reach the breakpoint. The ret instruction
 BB> fills the bill because it pops the return address off the stack
 BB> and allows you to implement a standard procedure at that point

Data breakpoints are activated when an operation accesse a data location.

It's like setting a breakpoint on a variable "x" and every the
variable "x"
is used (or optionaly only when modified) the execution halts in the debugger.

Extremely hard to do in software without interpreting the entire program.

 -=> Bye <=-

---
* Origin: Keyboard not connected, press to continue. (3:640/1042)
SEEN-BY: 633/267 270
@PATH: 640/1042 531 954 774/605 123/500 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.