Solved

How to debug or understand an access violation error?

Posted on 2001-07-22
4
1,612 Views
Last Modified: 2012-08-13
Any idea of how actually to debug or understand an access violation error?  If I got an access violation such as "Access violation at address 004396CB in module 'IVY.exe' at address 3A20708E. Please guide !
0
Comment
Question by:ivylnm
4 Comments
 
LVL 14

Accepted Solution

by:
DragonSlayer earned 50 total points
Comment Utility
When you see access violation thingy, go back to Delphi IDE (without terminating your app), click on the Search menu, and choose Find Error.

Enter the address with the error, and Delphi will attempt to locate the line number for you.

You should also check out Madshi's nice components at www.madshi.net, it has a nice exception handler package (madExcept)... 'nuff said :)
0
 
LVL 17

Expert Comment

by:inthe
Comment Utility
>>Enter the address with the error

& dont forget to add a $ in front of address ;-)
0
 
LVL 20

Expert Comment

by:Madshi
Comment Utility
Hi guys!

Thanx, DragonSlayer!   :-)

BTW, in a day or two there will be madExcept 2.0 with lots of new features...

Regards, Madshi.
0
 
LVL 1

Expert Comment

by:hobiecat16
Comment Utility
jclDebug is also excellent for this type of problems, and provides stack dumping (=>> call list before the "crash"), etc.

www.delphi-jedi.org if i remember
it's freeware
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Objective: - This article will help user in how to convert their numeric value become words. How to use 1. You can copy this code in your Unit as function 2. than you can perform your function by type this code The Code   (CODE) The Im…
Introduction The parallel port is a very commonly known port, it was widely used to connect a printer to the PC, if you look at the back of your computer, for those who don't have newer computers, there will be a port with 25 pins and a small print…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now