Hex Edit Control with Input and Length Checking

Environment: VC6

I don't know how many times I've wanted to put a hex edit control in my application, but wanted to limit the user's input and length. CEdit only has the ability to limit the input to numbers. That's all fixed now with my program, CHexEdit class. The following features are supported in this program:

  • Limit input to upper case, lower case, or both cases
  • Increment and decrement max input length (1-16 characters)
  • Convert hex string to decimal

Downloads

Download source - 19 Kb



Comments

  • Saved me some time, thanks!

    Posted by Legacy on 06/14/2002 12:00am

    Originally posted by: Eric Thorbjornsen

    I just happened to need a Hex Edit control (again) so
    
    I thought I would take a look around to see if anyone
    had posted anything (if not, finally time to bite the
    bullet and write one myself). And there it was!!!

    Thanks for sharing, this class will get lots'o'work.

    If you are looking for suggestions, I made a small
    change to the OnChar() method. Basically, instead
    of ignoring, say, lower case when case is set to
    only upper case, I converted the character to upper case.
    That way, the user can type either 'a' or 'A' and an 'A'
    will appear in the text box (ease of use type of thing).

    Eric

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • What if you could rapidly grow your business while eliminating the complexity and multiple operating systems, administration and management tools, and security and compliance requirements? See how many good things happen when you standardize on open, flexible infrastructure solutions.

  • Live Event Date: February 11, 2015 @ 1:00 p.m. ET / 10:00 a.m. PT New computing platforms, expanding information environments, recurrent security breaches and evolving regulatory frameworks are factors that security executives must contend with and address when developing their security strategy. In response to these dynamics, security executives are seeking stronger, more nimble and more pervasive security technologies to help protect business-critical information from unauthorized disclosure, loss or …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date