Solved

read memory

Posted on 2003-10-31
8
218 Views
Last Modified: 2010-04-05
how to read memory used by other program that run in window
0
Comment
Question by:Andi4883
8 Comments
 
LVL 17

Accepted Solution

by:
Wim ten Brink earned 50 total points
ID: 9656741
Not!

Windows protects the memory space of every application so you can't just access the memory space of another application just like that. Your application just gets 4 GB of memory all for itself. Most of it non-existant but still, all your application can see is it's own memory space.

Now, it is possible to access memory from another process but if I'm not mistaken then this requires the injection of a DLL into another process. A complicated technique that requires a good knowledge of the Windows API and a good experience in software development in general. You then have to communicate with this DLL in the other process in some way to tell that DLL to retrieve data from somewhere.
It could be possible that there's an easier technique than DLL injection but I haven't heard about it.
0
 
LVL 12

Assisted Solution

by:andrewjb
andrewjb earned 50 total points
ID: 9656809
Windows 95/98/ME aren't protected, though.
0
 
LVL 6

Assisted Solution

by:GloomyFriar
GloomyFriar earned 50 total points
ID: 9657038
ReadProcessMemory
WriteProcessMemory
0
Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

 
LVL 5

Assisted Solution

by:DeerBear
DeerBear earned 50 total points
ID: 9659666
Hi,

ReadProcessMemory and WriteProcessMemory are what you're
looking for. But BEWARE:

Doing it is OUTRAGEOUSLY dangerous.

When you're at it, no one can stop you.
That means that processes are at your mercy and if you
don't know *exacty* what you're doing... well...
I warmly discourage it.

HTH,

Andrew
0
 
LVL 5

Assisted Solution

by:Gwena
Gwena earned 50 total points
ID: 9661622
Madshi is the guy that can help you with this sort of thing...

Paging Madshi :-)
0
 
LVL 2

Expert Comment

by:TheLeader
ID: 9780248
listen
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Hello everybody This Article will show you how to validate number with TEdit control, What's the TEdit control? TEdit is a standard Windows edit control on a form, it allows to user to write, read and copy/paste single line of text. Usua…
Introduction I have seen many questions in this Delphi topic area where queries in threads are needed or suggested. I know bumped into a similar need. This article will address some of the concepts when dealing with a multithreaded delphi database…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now