Macro For Stepping Into #import Wrapped COM Methods

When using #import to create wrapper classes for your own C++ COM objects, debugging and stepping into the COM methods can be tedious because you have to first step into the wrapper class and then COM object wrappers for many of the method's paramenters (e.g. _bstr_t and _variant_t), before you finally get to the raw method. To solve this I have written the macro StepInComFunc to do all the stepping in and out automatically for you, effectively stepping you directly into the source code for the method being called. Obviously the COM object will have to have been built with debug information. I find it useful to map this macro to the shortcut key ALT+F11.
Sub StepInComFunc()
'DESCRIPTION: A description was not provided.

 Application.Debugger.StepInto

 Dim nMaxParams, nCount
 nCount = 0
 nMaxParams = 20

 Do While ((ActiveDocument.Name = "COMUTIL.H" 
 Or ActiveDocument.Name = "ATLBASE.H") 
 And nCount < nMaxParams)

  Application.Debugger.StepOut
  Application.Debugger.StepInto
  nCount = nCount + 1
 Loop

 if (ActiveDocument.Name = "COMIP.H") then
  Application.Debugger.StepOut
  Application.Debugger.StepInto
 End If

 if (ActiveDocument.Name = "COMIP.H") then
  Application.Debugger.StepOut
  Application.Debugger.StepInto
 End If

 if (InStr(ActiveDocument.Name, ".tli") > 0) then
  Application.Debugger.StepOver
  Application.Debugger.StepInto
 End If

 nCount = 0
 Do While ((ActiveDocument.Name = "COMUTIL.H" 
 Or ActiveDocument.Name = "ATLBASE.H") 
 And nCount < nMaxParams)
  Application.Debugger.StepOut
  Application.Debugger.StepInto
  nCount = nCount + 1
 Loop

End Sub


Comments

  • That's is pretty cool!

    Posted by Legacy on 07/13/2001 12:00am

    Originally posted by: hn

    If you want to close those files as well, add ActiveDocument.Close

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Live Event Date: February 25, 2015 @ 2:00 p.m. ET / 11:00 a.m. PT Secure Shell (SSH) keys provide unmitigated access for privileged users and applications. However, managing and securing these critical privileged credentials poses a real challenge for organizations, putting sensitive data at risk. In fact, more than 50% of organizations report experiencing an SSH Key related compromise. Check out this upcoming eSeminar and join Adam Bosnian, EVP of Global Business Development at CyberArk, as he discusses the …

  • Today's agile organizations pose operations teams with a tremendous challenge: to deploy new releases to production immediately after development and testing is completed. To ensure that applications are deployed successfully, an automatic and transparent process is required. We refer to this process as Zero Touch Deployment™. This white paper reviews two approaches to Zero Touch Deployment--a script-based solution and a release automation platform. The article discusses how each can solve the key …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date