ResFile

Environment: VC6, SP5
  • Warning Level 4.0 compliant
  • Documentation is doxygen compatible

ResFile is a nice project that allows reading from the resources of an ordinary DLL (or EXE) just as if it were a normal CFile. There are many useful scenarios. I used it to compile default INI files in my application, for example.

The class CResourceFile is derived from CFile and therefore may be used at any place where CFile could be used. Use it in conjunction with a CArchive to have buffered string reading capabilities.

Remember that, at the moment, only read-only access is implemented. Write access is theoretically also possible (via UpdateResource), but not yet implemented.

CResourceFile reads the complete file when opening it (this is the nature of Windows resource memory reading), keeping it in a buffer. Following Read() Operations are just returning from the buffer.

It is simple to use; just follow these points:

  • You can extract just the class (the two files, ResFile.cpp and ResFile.h, out of the sample project).
  • Just include a resource of type "BINARY" (use the quotation marks in Resource Editor).
  • Pass the constructor the module's own instance handle; for example, AfxGetApp()->m_hInst.
  • Call Open() and pass the resource name (use MAKEINTRESOURCE if you have only numerical IDs) and CFile::modeRead.
  • Then, call a read and you will have CFile-like access on your resources.

Downloads

Download source - 11 Kb


Comments

  • is not yet implement write func??

    Posted by pegas on 03/04/2004 09:11pm

    it's so cool idea.. not use registry or dummy file.. but,, i feel at a loss with-out Write func. is not yet implement??

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • You may already know about some of the benefits of Bluemix, IBM's open platform for developing and deploying mobile and web applications. Check out this webcast that focuses on building an Android application using the MobileData service, with a walk-through of the real process and workflow used to build and link the MobileData service within your application. Join IBM's subject matter experts as they show you the way to build a base application that will jumpstart you into building your own more complex app …

  • Targeted attacks and advanced threats are customized to infiltrate your unique IT infrastructure, evade conventional defenses, and remain hidden while stealing your corporate data. To detect these criminal intrusions, analysts and security experts agree that organizations should deploy advanced threat protection as part of an expanded security monitoring strategy. For this comparative analysis of breach detection systems, product analysis reports and comparative analysis reports are used to create the security …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds