Check for loaded DLLs

Hi , I wanted to pass on one of the methods that has helped in the past, in debugging client server applications, in which you may have several version of your dll. Making use of small utilities like WPS/Killer/Nuke in determing the DLL that is lodaed at run time. This helps you to sometimes sort of understand in which portion of your application, a problem occurs.

This becomes really useful when you distribute your software to users not necessarily in the same location and on diverse platforms (w3.1,w95, nt and so on). Sometimes a dump of the active dll's helps you nail down the problem.



Comments

  • 뭔소리여

    Posted by Legacy on 01/16/2004 12:00am

    Originally posted by: 흐미

    영어를 모른게 뭔소린지 하나도 모르겄네 ㅡ.ㅡ;

    Reply
  • Here's some utilities

    Posted by Legacy on 03/09/1999 12:00am

    Originally posted by: Steve Greenland

    There is a nice DLL listing tool at http://www.sysinternals.com/ , along
    with a bunch of other cool tools.

    steve

    Reply
  • Here this should work

    Posted by Legacy on 03/02/1999 12:00am

    Originally posted by: Michael

    // MODULE INFORMATION
    
    // maybe from MSDN listing - modified since then

    unsigned char *p = NULL;
    MEMORY_BASIC_INFORMATION info;
    char mod_list[2048]; // space for retrieved mod names.
    char mod_name[MAX_PATH];
    mod_list[0] = '\0';

    for( p = NULL;
    VirtualQuery(p, &info, sizeof(info)) == sizeof(info);
    p += info.RegionSize )
    {
    if ( (info.AllocationBase == info.BaseAddress) &&
    (GetModuleFileName((HINSTANCE)info.AllocationBase,
    mod_name, sizeof(mod_name))) )
    {
    strcat(mod_list, mod_name);
    strcat(mod_list, "\r\n");
    }
    }
    MessageBox(NULL, mod_list, "Modules", MB_OK);

    Reply
  • Check for loaded DLLs

    Posted by Legacy on 01/05/1999 12:00am

    Originally posted by: T. Sandy Matthews

    Sounds like a good idea. But I am reminded of the old joke:
    Do you know how to keep an idot in suspense?
    I'll tell you tomarow!
    What I am getting at of course, is where is the example?

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Live Event Date: February 25, 2015 @ 2:00 p.m. ET / 11:00 a.m. PT Secure Shell (SSH) keys provide unmitigated access for privileged users and applications. However, managing and securing these critical privileged credentials poses a real challenge for organizations, putting sensitive data at risk. In fact, more than 50% of organizations report experiencing an SSH Key related compromise. Check out this upcoming eSeminar and join Adam Bosnian, EVP of Global Business Development at CyberArk, as he discusses the …

  • On-demand Event Event Date: January 28, 2015 Check out this webcast and join Jeff Sloyer, IBM Developer Evangelist and Master Inventor, for a tutorial for building cloud-based applications. Using IBM's platform as a service, Bluemix, Jeff will show you how to architect and assemble cloud-based applications built for cloud scale. Leveraging the power of microservices, developers can quickly translate monolithic applications to a cloud-based microarchitecture. This hour-long session introduces the concepts and …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date