simple_appcall_win
summary: execute code into the application being debugged (on Windows)
- description:
Using the ida_idd.Appcall utility to execute code in the process being debugged.
This example will run the test program and stop wherever the cursor currently is, and then perform an appcall to execute the ref4 and ref8 functions.
To use this example:
run ida on test program simple_appcall_win64.exe, or ida on test program simple_appcall_win32.exe, and wait for auto-analysis to finish
select the ‘windows debugger’ (either local, or remote)
run this script
Note: the real body of code is in simple_appcall_common.py.
level: advanced
Attributes
Module Contents
- simple_appcall_win.ref4_ea = 5368713216
- simple_appcall_win.appcall_hooks