zoukankan      html  css  js  c++  java
  • Pseudo-variables in Watch Windows

    调试时,一些有用的伪寄存器。
    //z 2014-08-09 23:37:04 L.144' 1376 BG57IV3@BYH T159269209 .K.F3103894817[T1,L90,R2,V15] IS2120

    Suppose you are writing a native code application and want to see the number of handles allocated in your application. In the Watch window, you can enter the following pseudovariable in the Name column, then press Return to evaluate it:

    $handles

    In native code, you can use the pseudovariables shown in this table:

    Pseudovariable

    Function

    $err

    Displays the last error value set with the function SetLastError. The value that is displayed represents what would be returned by the GetLastError function.

    Use $err,hr to see the decoded form of this value. For example, if the last error was 3, the $err,hr would display ERROR_PATH_NOT_FOUND : The system cannot find the path specified.

    $handles

    Displays the number of handles allocated in your application.

    $vframe

    Displays the address of the current stack frame.

    $tid

    Displays the thread ID for the current thread.

    $env

    Displays the environment block in the string viewer.

    $cmdline

    Displays the command line string that launched the program.

    $pid

    Displays the process id.

    $registername

    or

    @registername

    Displays the contents of the register registername.

    Normally, you can display register contents just by entering the register name. The only time you need to use this syntax is when the register name overloads a variable name. If the register name is the same as a variable name in the current scope, the debugger interprets the name as a variable name. That's when $registername or @registername comes in handy.

    $clk

    Displays the time in clock cycles.

    $user

    Displays a structure with account information for the account running the application. For security reasons, the password information is not displayed.

    $exceptionstack

    Displays the stack trace of the current Windows Runtime exception. $ exceptionstack works only in Store apps that are running on Windows 8.1 or later.$ exceptionstack is not supported for C++ and SHE exceptions

    $ReturnValue

    Displays the return value of a .NET Framework method. See Examine return values of method calls
    @EAX for x86,@rax for x64

    In C# and Visual Basic, you can use the pseudovariables shown in this table:

    Pseudovariable

    Function

    $exception

    Displays information on the last exception. If no exception has occurred, evaluating $exception displays an error message.

    In Visual C# only, when the Exception Assistant is disabled, $exception is automatically added to the Locals window when an exception occurs.

    $user

    Displays a structure with account information for the account running the application. For security reasons, the password information is not displayed.

    In Visual Basic, you can use the pseudovariables shown in the following table:

    Pseudovariable

    Function

    $delete or$$delete

    Deletes an implicit variable that was created in the Immediate window. The syntax is $delete, variable or$delete, variable.

    $objectids or$listobjectids

    Displays all active Object IDs as children of the specified expression. The syntax is $objectid, expression or$listobjectids, expression.

    $N#

    Displays object with Object ID equal to N.

    $dynamic

    Displays the special Dynamic View node for an object that implements the IDynamicMetaObjectProvider. Interface. The syntax is $dynamic, object. This feature applies only to code that uses .NET Framework version 4. See Dynamic View.


    @IS2120#CNBLOGS.T2169364049[T1,L65,R1,V259]:备忘
    $ € ₤ ₭ ₪ ₩ ₮ ₦ ₱ ฿ ₡ ₫ ﷼ ¥ ﷼ ₫ ₡ ฿ ₱ ₦ ₮ ₩ ₪ ₭ ₤ € $
  • 相关阅读:
    用R语言完成的交通可视化报告
    二维码(带有图片)的生成
    大文件数据去重复
    shell 脚本大文件处理
    Domain-specific language 领域特定语言
    cacheed 限制 4节点 3000万 es 批量删除 shell脚本练习 elasticsearch_action
    cached
    广告中嵌入非广告 非广告中嵌入广告
    js 四种调用方式 Method Invocation Pattern
    js 变量作用域
  • 原文地址:https://www.cnblogs.com/IS2120/p/6745637.html
Copyright © 2011-2022 走看看