| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Debugger |
Assuming that you are talking about xxx86 CPU, you can insert the breakpoint into the actual (or simulated) address as a byte operand. OXC3 seems to come to mind (that is a one-byte RET instruction). The clever bit is what you do to restore the original code when you reach the breakpoint. The ret instruction fills the bill because it pops the return address off the stack and allows you to implement a standard procedure at that point. Best Wishes, Bill. ---* Origin: Escan BBS (2:25/200) SEEN-BY: 633/267 270 @PATH: 25/200 108 252/110 250/501 140/1 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.