QuickBookmarks - Easy way to navigate in your code

It is a hard work to switch among several functions all day long. That is why I wrote several functions to ease this common task.

You can define up to 10 hotkeys, each bound to specific place  in your code. These bookmarks can be saved and reloaded in any time.
I am using unnamed bookmarks, so they stay valid after insertion or removal of previous lines.

Remarks:

  • Select meaningful text and press hotkey to set bookmark
  • Make sure that there is no selected text in the line and press the hotkey to go to the bookmark
  • Use  'Alt+Num1', 'Alt+Num2',... hotkeys for  bookmarks, 'Alt+Num-' -  to clear current bookmark, and   'Alt+Num/' for list of  bookmarks, if you do not have better idea
  • Do not set unnamed bookmarks by using standard SetBookmark function
  • Do not remove text with bookmark, redifine this bookmark at first
  • Do not forget to save you bookmarks, they are saved only after you press 'Yes' in the list of bookmark dialog
  • Call list of bookmarks if you forget the number

Look at http://members.tripod.com/~DanKozub to see screenshots.
Any comments and suggestions will be appreciated.

History:
v 1.1:  A function to display list of all bookmarks was added. Assign 'Alt+Num/' hotkey to ShowQuickBookmarks()
v 1.2:  It is now possible to simply clear bookmark instead of resetting it. Assign 'Alt+ Num-' hotkey to ClearCurrentBookmark()

Download source - 2 KB

Date Last Updated: March 23, 1999



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • On-demand Event Event Date: September 10, 2014 Modern mobile applications connect systems-of-engagement (mobile apps) with systems-of-record (traditional IT) to deliver new and innovative business value. But the lifecycle for development of mobile apps is also new and different. Emerging trends in mobile development call for faster delivery of incremental features, coupled with feedback from the users of the app "in the wild." This loop of continuous delivery and continuous feedback is how the best mobile …

  • Targeted attacks and advanced threats are customized to infiltrate your unique IT infrastructure, evade conventional defenses, and remain hidden while stealing your corporate data. To detect these criminal intrusions, analysts and security experts agree that organizations should deploy advanced threat protection as part of an expanded security monitoring strategy. For this comparative analysis of breach detection systems, product analysis reports and comparative analysis reports are used to create the security …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds