Check for loaded DLLs

Hi , I wanted to pass on one of the methods that has helped in the past, in debugging client server applications, in which you may have several version of your dll. Making use of small utilities like WPS/Killer/Nuke in determing the DLL that is lodaed at run time. This helps you to sometimes sort of understand in which portion of your application, a problem occurs.

This becomes really useful when you distribute your software to users not necessarily in the same location and on diverse platforms (w3.1,w95, nt and so on). Sometimes a dump of the active dll's helps you nail down the problem.



Comments

  • 뭔소리여

    Posted by Legacy on 01/16/2004 12:00am

    Originally posted by: 흐미

    영어를 모른게 뭔소린지 하나도 모르겄네 ㅡ.ㅡ;

    Reply
  • Here's some utilities

    Posted by Legacy on 03/09/1999 12:00am

    Originally posted by: Steve Greenland

    There is a nice DLL listing tool at http://www.sysinternals.com/ , along
    with a bunch of other cool tools.

    steve

    Reply
  • Here this should work

    Posted by Legacy on 03/02/1999 12:00am

    Originally posted by: Michael

    // MODULE INFORMATION
    
    // maybe from MSDN listing - modified since then

    unsigned char *p = NULL;
    MEMORY_BASIC_INFORMATION info;
    char mod_list[2048]; // space for retrieved mod names.
    char mod_name[MAX_PATH];
    mod_list[0] = '\0';

    for( p = NULL;
    VirtualQuery(p, &info, sizeof(info)) == sizeof(info);
    p += info.RegionSize )
    {
    if ( (info.AllocationBase == info.BaseAddress) &&
    (GetModuleFileName((HINSTANCE)info.AllocationBase,
    mod_name, sizeof(mod_name))) )
    {
    strcat(mod_list, mod_name);
    strcat(mod_list, "\r\n");
    }
    }
    MessageBox(NULL, mod_list, "Modules", MB_OK);

    Reply
  • Check for loaded DLLs

    Posted by Legacy on 01/05/1999 12:00am

    Originally posted by: T. Sandy Matthews

    Sounds like a good idea. But I am reminded of the old joke:
    Do you know how to keep an idot in suspense?
    I'll tell you tomarow!
    What I am getting at of course, is where is the example?

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • On-demand Event Event Date: September 10, 2014 Modern mobile applications connect systems-of-engagement (mobile apps) with systems-of-record (traditional IT) to deliver new and innovative business value. But the lifecycle for development of mobile apps is also new and different. Emerging trends in mobile development call for faster delivery of incremental features, coupled with feedback from the users of the app "in the wild." This loop of continuous delivery and continuous feedback is how the best mobile …

  • One of the most foolproof ways for an online system to confirm, "Is it really you?" is by adding two-factor authentication. Modern two-factor solutions have evolved to support new, complex technology models that change how we use data, including cloud computing and bring-your-own-device (BYOD). However, not all two-factor authentication solutions are created equal. This guide walks through some of the key area of differentiation between two-factor authentication solutions and provides some concrete criteria …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds