Macro For Stepping Into #import Wrapped COM Methods

When using #import to create wrapper classes for your own C++ COM objects, debugging and stepping into the COM methods can be tedious because you have to first step into the wrapper class and then COM object wrappers for many of the method's paramenters (e.g. _bstr_t and _variant_t), before you finally get to the raw method. To solve this I have written the macro StepInComFunc to do all the stepping in and out automatically for you, effectively stepping you directly into the source code for the method being called. Obviously the COM object will have to have been built with debug information. I find it useful to map this macro to the shortcut key ALT+F11.
Sub StepInComFunc()
'DESCRIPTION: A description was not provided.

 Application.Debugger.StepInto

 Dim nMaxParams, nCount
 nCount = 0
 nMaxParams = 20

 Do While ((ActiveDocument.Name = "COMUTIL.H" 
 Or ActiveDocument.Name = "ATLBASE.H") 
 And nCount < nMaxParams)

  Application.Debugger.StepOut
  Application.Debugger.StepInto
  nCount = nCount + 1
 Loop

 if (ActiveDocument.Name = "COMIP.H") then
  Application.Debugger.StepOut
  Application.Debugger.StepInto
 End If

 if (ActiveDocument.Name = "COMIP.H") then
  Application.Debugger.StepOut
  Application.Debugger.StepInto
 End If

 if (InStr(ActiveDocument.Name, ".tli") > 0) then
  Application.Debugger.StepOver
  Application.Debugger.StepInto
 End If

 nCount = 0
 Do While ((ActiveDocument.Name = "COMUTIL.H" 
 Or ActiveDocument.Name = "ATLBASE.H") 
 And nCount < nMaxParams)
  Application.Debugger.StepOut
  Application.Debugger.StepInto
  nCount = nCount + 1
 Loop

End Sub


Comments

  • That's is pretty cool!

    Posted by Legacy on 07/13/2001 12:00am

    Originally posted by: hn

    If you want to close those files as well, add ActiveDocument.Close

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Given today's threat environment and the increasing connectivity of digital infrastructures, security teams now realize that they must assume their IT environments are subject to periodic compromise. Gone are the days when preventive measures to secure the perimeter or trying to detect malware problems using signature-match technologies were enough. New practices based on an understanding of the phases of an attack, continuous threat monitoring, and rapid attack detection and remediation are necessary. This …

  • You probably have several goals for your patient portal of choice. Is "community" one of them? With a bevy of vendors offering portal solutions, it can be challenging for a hospital to know where to start. Fortunately, YourCareCommunity helps ease the decision-making process. Read this white paper to learn more. "3 Ways Clinicians can Leverage a Patient Portal to Craft a Healthcare Community" is a published document owned by www.medhost.com

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds