Use this file to discover all available pages before exploring further.
Memory tools provide direct access to the IDB’s virtual address space. You can read raw bytes or typed integers at any address, decode null-terminated strings, retrieve the compile-time value of global variables by name or address, and write bytes or integers back — including support for endian selection and all standard integer widths.
Read the compile-time value of a global variable by address or symbol name. The format of the returned value adapts to the variable’s type: integers are returned as hex, arrays of char as quoted strings, and larger blobs as hex byte sequences.
get_global_value automatically detects whether the input looks like an address or a symbol name. Address-like strings (hex or numeric) are tried as addresses first; everything else is resolved as a name.
Write raw bytes to one or more addresses. The data field is a plain hex string (no spaces required, though spaces are accepted in some contexts — use a contiguous hex string to be safe).
patch operates directly on the IDB. There is no automatic undo. Use IDA’s Edit → Patch program → Restore original byte to revert individual bytes if needed.
Overwrite four bytes with NOPs
{ "addr": "0x401045", "data": "90909090"}
For assembly-level patching, see patch_asm in the Modification tools.