这是一款8位单片机的反汇编软件。
反汇编相关的操作非常简单。
取消反汇编进度指示器弹出窗口的显示。
Suppresses the disassembly progress indicator pop-up window.
绝对没有,除非你使用的是旧的反汇编。
Absolutely nothing, unless you count using an old disassembler.
图1是反汇编程序生成的分帧输出的屏幕快照。
Figure 1 is a screen capture of the framed output generated by the disassembler.
反汇编清单显示了该main函数的汇编语言清单。
This disassembly listing shows the assembler-language listing of the main function.
图6 - 8如图所示。之前反汇编的代码访问了数据。
Figure 6-8 - Data are accessed by previously disassembled code, as shown here.
我自己使用BCEL时,发现HTML反汇编程序特别有用。
In my own use of BCEL, I've found the HTML disassembler especially useful.
当反汇编时,每行都打印完整地址。这是旧的反汇编格式。
When disassembling, print the complete address on each line.
“反汇编”窗口显示与编译器所创建的指令对应的汇编代码。
TheDisassembly window shows assembly code corresponding to the instructions created by the compiler.
图6 - 7反汇编器处理二进制代码并生成如图所示的汇编代码。
Figure 6-7 - a disassembler takes binary code and creates assembly code that looks like this.
入口点依次可以通过(在反汇编阶段)鉴定CALL指令来标识。
The entry points in turn could be identified by identifying the CALL instructions (in the disassembly stage).
在托管应用程序中,反汇编限于一个函数,因而您可以正常滚动。
In managed applications, disassembly is limited to one function and you can scroll normally.
如果你已经对代码进行反汇编,代码就可以提供数据位置的蛛丝马迹。
If you have disassembled the code, the code can provide hints as to the location of data.
本文讨论了反汇编环境下高级语言函数及其参数、变量的识别问题。
This paper focuses on the identifications of high-level function, its arguments and variables under disassembling environment.
反汇编是程序分析与理解的基础,也是软件逆向工程的起点和关键。
Disassembly is the basis of program analysis and understanding, and is also the starting point for software reverse engineering.
如果指令对齐的时候出现错误,可以在反汇编的时候指定起始地址。
If there alignment error occurs, you can disassemble part of binary file by assigning the begin address.
除了它的反汇编能力外,你还可以用它来分析导入表,导出表及资源数据。
In addition to its disassembling ability, you can employ it to analyze import, export and resource data directories data.
代码在当前位置停止执行,但调试器不能显示当前位置的源代码或反汇编。
The debugger cannot display source code or disassembly for the current location where execution has stopped.
图6 - 7显示当二进制数据通过反汇编器后,翻译出来的汇编语言的样子。
Figure 6-7 shows what assembly language looks like once binary has been through a disassembler.
在“反汇编”窗口中,单击代码行,然后从“调试”菜单中选择“切换断点”。
In the Disassembly window, click on a line of code and choose Toggle Breakpoint from the Debug menu.
您不得对产品进行反向工程、反编译或反汇编,或试图获得对产品原码的访问权。
You may not reverse engineer, decompile or disassemble the Products or attempt to gain access to the source code for the Products.
反汇编:正是在这里,一个消息得到完全转换成XML格式,这样的消息传递引擎可以理解。
Disassembler: it is here that a message gets converted entirely into XML format so that the messaging engine can understand it.
如果您无法阅读汇编语言但又想充分利用“反汇编”窗口,请参考有关汇编语言编程的好书。
If you cannot read assembly language and want to take full advantage of the Disassembly window, consult a good book on assembly-language programming.
IDA是世界上最敏捷和多功能的反编译工具,被众多软件安全专家所熟知的交互的反汇编工具。
IDA is the Interactive disassembler: the world's smartest and most feature-full disassembler, which many software security specialists are familiar with.
Hopper反汇编工具,是逆向工程的工具,能够让你进行反汇编、反编译并且调试你的应用。
Hopper Disassembler, the reverse engineering tool that lets you disassemble, decompile and debug your applications.
它们是从计算机程序设计原料——反汇编代码、API调用、内存地址和子程序创建而来的视觉想像。
They are visual imaginings built from the raw stuff of computer programming - disassembled code, API calls, memory addresses and subroutines.
在Web环境中,可以将此结构反汇编成个别主题,并在生成的导航映射或目录表中保留其层次结构。
In a Web environment you could disassemble this structure into individual topics and preserve the hierarchy in a generated navigation map or table of contents.
Ksymoops反汇编代码部分,指出发生错误的指令,并显示一个跟踪部分表明代码如何被调用。
Ksymoops disassembles the code section, points to the failing instruction, and displays a trace section that shows how the code was called.
Ksymoops反汇编代码部分,指出发生错误的指令,并显示一个跟踪部分表明代码如何被调用。
Ksymoops disassembles the code section, points to the failing instruction, and displays a trace section that shows how the code was called.
应用推荐