{"id":5223,"date":"2014-03-30T19:55:53","date_gmt":"2014-03-30T19:55:53","guid":{"rendered":"https:\/\/unknownerror.org\/index.php\/2014\/03\/30\/windows-process-tool-to-see-function-and-change-arguments-collection-of-common-programming-errors\/"},"modified":"2014-03-30T19:55:53","modified_gmt":"2014-03-30T19:55:53","slug":"windows-process-tool-to-see-function-and-change-arguments-collection-of-common-programming-errors","status":"publish","type":"post","link":"https:\/\/unknownerror.org\/index.php\/2014\/03\/30\/windows-process-tool-to-see-function-and-change-arguments-collection-of-common-programming-errors\/","title":{"rendered":"Windows Process : Tool to see Function and change arguments-Collection of common programming errors"},"content":{"rendered":"<p>Another useful tool is DebugView from SysInternals \/ Microsoft. Also, Process Monitor is pretty useful for seeing how other APIs work when interacting with them. Additionally, Process Hacker is a great runtime tool for inspecting memory regions, threads, DLL hooks, and so on. You can even modify the bits of memory if you wish, a bit like POKEs on the C64.<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/img168.imageshack.us\/img168\/4676\/esfsef.png\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Another useful tool is DebugView from SysInternals \/ Microsoft. Also, Process Monitor is pretty useful for seeing how other APIs work when interacting with them. Additionally, Process Hacker is a great runtime tool for inspecting memory regions, threads, DLL hooks, and so on. You can even modify the bits of memory if you wish, a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-5223","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/unknownerror.org\/index.php\/wp-json\/wp\/v2\/posts\/5223","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/unknownerror.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/unknownerror.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/unknownerror.org\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/unknownerror.org\/index.php\/wp-json\/wp\/v2\/comments?post=5223"}],"version-history":[{"count":0,"href":"https:\/\/unknownerror.org\/index.php\/wp-json\/wp\/v2\/posts\/5223\/revisions"}],"wp:attachment":[{"href":"https:\/\/unknownerror.org\/index.php\/wp-json\/wp\/v2\/media?parent=5223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/unknownerror.org\/index.php\/wp-json\/wp\/v2\/categories?post=5223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/unknownerror.org\/index.php\/wp-json\/wp\/v2\/tags?post=5223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}