Reading DWARF debug information from a PE executable

Jan Kratochvil jan.kratochvil@redhat.com
Thu Apr 18 10:12:00 GMT 2019


On Wed, 17 Apr 2019 18:20:58 +0200, Artem Razin wrote:
> Or probably there are other ways to work with DWARF in case of PE
> executables...

liblldb parses DWARF in PE for you with its SB* public C++ and Python API.

(lldb) target create "2.exe"
Current executable set to '2.exe' (x86_64).
(lldb) b main
Breakpoint 1: where = 2.exe`main + 13 at 2.c:4:10, address = 0x000000000040156d
(lldb) p s
(s) $0 = (i = 0)


Jan



More information about the Gdb mailing list