1.9.2 LGPL (GNU Lesser General Public License)    
  not rated
A feature rich memory debugger for C and C++ programs; i





It currently works for Linux only. DBGMEM is released under the terms of the GNU Lesser General Public License

The tool helps you to find problems such as

 1. memory leaks
 2. heap memory corruption
 3. Misuse, illegal argument to selected standard library functions.
 4. stack corruption
 5. Use of freed or un-initialized heap memory.
 6. Allows you to extend the tool, check additional API's arguments

The tool overrides GLIBC memory allocation functions, memory and string manipulation functions in order to add its features.

DBGMEM does not require any changes to your program, though you might wish to change your program in order to use some advanced features.

DBGMEM is an open source memory debugger for C and C++ programs and runs under the Linux operating system, and is released under the GNU Lesser General Public License. DBGMEM adds debugging checks to parts of the of Glibc standard library; it is implemented as shared libraries that are loaded into the address space of the debugged process.


DBGMEM has several memory debugging tools, each can be loaded into the debugged program; The Simple tool keeps track of all allocated memory blocks, and adds book keeping information, such as the stack at the time when the block was allocated, into an arena header that precedes the allocated memory block; it also adds a guard word before and after the allocated block; The simple tool is best used for detection of memory leak problems; as the arena header can get corrupted by the program that is being debugged. The checking took keeps all book-keeping information off the stack in an anonymous Memory-mapped file; this makes the tool more robust to withstand memory overwriting bugs. The checking tool also adds ability to quickly look up information on any heap block for a pointer value contained within that heap block; the checking tool adds validation of parameters to common string and memory manipulation functions, and checks for possible stack smashing by these functions.

Mode of operation

You can run most programs with the debugger as is; the tool does not require the debugged program to be linked with any specific libraries; The tool is a shared library that is loaded into the address space of a process that is checked by means of the technique of DLL Injection. The LD_PRELOAD feature of the Dynamic linker is used to load the tools shared library first, before any other library is loaded; memory allocation and string manipulation function are intercepted and first called from the tool library; this enables the tool to add its checks. During runtime of the debugged process a raw report is written which is further processed after termination of the debugged process; the augmented report adds symbolic function names to stack traces contained in the raw report. The Gdb debugger is used to turn numeric addresses into symbolic addresses during further processing of raw report.
Last updated on June 2nd, 2009

0 User reviews so far.