Dr. Memory is a memory monitoring tool capable of identifying memory-related programming errors such as accesses of uninitialized memory, accesses to unaddressable memory (including outside of allocated heap units and heap underflow and overflow), accesses to freed memory, double frees, memory leaks, and (on Windows) handle leaks, GDI API usage errors, and accesses to un-reserved thread local storage slots. Dr. Memory operates on unmodified application binaries running on Windows, Linux, Mac, or Android on commodity IA-32, AMD64, and ARM hardware. Dr. Memory is released under an LGPL license and binary packages are available for download . Dr. Memory is built on the DynamoRIO dynamic instrumentation tool plaform. Dr. Memory Performance Dr. Memory is faster than comparable tools, including Valgrind, as shown in our CGO 2011 paper Practical Memory Checking with Dr. Memory , where we compare the two tools on Linux on the SPECCPU 2006 benchmark suite: (Valgrind is unable to run 434.zeusmp and 447.dealII). Documentation Documentation is included in the release package. We also maintain a copy for online browsing . System call tracer for Windows The Dr. Memory package includes an "strace for Windows" tool called drstrace . Obtaining help Dr. Memory has its own discussion list . To report a bug, use the issue tracker . See also the Dr. Memory home page : http://drmemory.org/ Download…
http://govanguard.com/wp-content/uploads/2018/04/Header_Logo.png 0 0 govanguard http://govanguard.com/wp-content/uploads/2018/04/Header_Logo.png govanguard2019-11-02 16:30:002019-11-02 16:30:00Dr. Memory - Memory Debugger For Windows, Linux, Mac, And Android
Our Standard Office Hours
Monday – Friday: 8:00AM – 5:00PM EDT
Saturday – Sunday: Closed
Where to Find Us
Data Privacy Notice
- – All product names, logos, and brands are property of their respective owners.
- – The use of these names, logos, and brands is for identification purposes only and does not imply endorsement.
- – Content syndication and aggregation of public information is solely for the purpose of identifying information security trends, all syndicated content contains source links to the content creator website. All content is owned by it’s respective content creators.
- – If you are an owner of some content and want it to be removed, please email email@example.com