Skip to content

Graphical Debugger for x64 and x86 on Windows

Notifications You must be signed in to change notification settings

zengbiao/Nanomite

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

78 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

#Nanomite - Graphical Debugger for x64 and x86 on Windows

Features

  • Debugging x86 and x64 (+ WOW64) processes
  • Breakpoints
    • Software
    • Memory
    • Hardware
  • Step In
  • Step Over
  • Step Out
  • Step back to user code
  • Attaching
  • Detaching
  • Single Step Tracing
  • Supporting child processes
  • Supporting multithreading
  • Display source code
  • Detailed view of:
    • disassembly
    • windows
    • handles
    • debug strings
    • threads
    • (child)processes
    • exceptions
    • process privileges
    • loaded modules
    • strings
    • callstack
    • stack
    • memory
    • heap
    • cpu registers
    • functions
    • pe header

Changelog

###Version 0.1 beta 12

  • fixed scrollbar in trace view
  • fixed a possible crash in disassembler
  • fixed a memory leak in the window settings
  • fixed a memory leak in dll and process name receiving
  • fixed a memory leak in trace view
  • fixed display of ascii strings in ascii view
  • fixed a bug which could cause wrong run to user code if debugging more than one process
  • fixed a bug which lead to incorrect restarts on slow systems
  • fixed a bug which caused double calling of some functions in context menus
  • fixed a bug in hex view which may showed wrong data
  • fixed a bug in heap view which caused a crash when copying the whole line to clipboard
  • added PatchManager
  • added process privilege view
  • added commandline options
  • added possibility to set process priorities
  • added possibility to set memory protection
  • added display of current priority in detail view - context menu
  • added display of segment registers in reg view
  • added background worker to string view, hex view and functions view
  • removed processes we can´t access from the attach dialog

####Notes: - Patches can be saved to file (only on the debugged one) - In the memory view you can set the protection of a page using the context menu - Commandline options - "-s": specifies a file - "-c": specifies the commandline for the target if not given you will be asked later - "-p": attachs to the given pid

###For the full changelog click here

About

Graphical Debugger for x64 and x86 on Windows

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published