摘要: 在使用sosex调试时,如果想查看某一个方法的反汇编代码时,可以使用命令!muf,只需提供方法地址,如:0:029> !muf 000007ff001b064bWebApplication1._Default.Go(int, string): void tmp:int 000007ff`001b05d0 4c89442418 mov qword ptr [rsp+18h],r8 000007ff`001b05d5 89542410 mov dword ptr [rsp+10h],edx 000007ff`001b05d9 48894c2408 mov ... 阅读全文
posted @ 2012-09-22 21:35 袁晓平 阅读(331) 评论(0) 推荐(0) 编辑
摘要: 0:029> !help mkSOSEX - Copyright 2007-2012 by Steve Johnson - http://www.stevestechspot.com/To report bugs or offer feedback about SOSEX, please email sjjohnson@pobox.commkUsage: !sosex.mk [-l] [-p] [-a] [-c] [-cc]Produces and displays a merged stack trace of managed and unmanaged frames.Local va 阅读全文
posted @ 2012-09-22 20:59 袁晓平 阅读(540) 评论(0) 推荐(0) 编辑
摘要: !mdtallows you to dump the fields of a given type by type name or to examine the fields of an object or value type instance. Not only can you examine the fields of an object or value type instance, but you can also examine an entire object graph by specifying the “-r” (recursive) switch. Want to exa 阅读全文
posted @ 2012-09-22 16:32 袁晓平 阅读(319) 评论(0) 推荐(0) 编辑
摘要: !mk 显示当前的调用堆栈0:029> !mkThread 29: SP IP00:U 00000000053ce1a0 000007fefd2ccacd KERNELBASE!RaiseException+0x3d01:U 00000000053ce270 000007fef1a79413 mscorwks!StrongNameFreeBuffer+0x53b702:U 00000000053ce360 000007fef1fb3310 mscorwks!CorLaunchApplication+0xee9003:M 00000000053ce510 000007ff0... 阅读全文
posted @ 2012-09-22 16:31 袁晓平 阅读(254) 评论(0) 推荐(0) 编辑