Solved

I want to make the color distingusher.

Posted on 2011-09-11
4
227 Views
Last Modified: 2012-05-12
first , I want to know the color under the mouse cursor.
second , want to magnify the range of 100 by 100 pixels under the mouse cursor.


please recommend me the functions.
Thanks in advance.
0
Comment
Question by:gamjaradio
  • 3
4 Comments
 
LVL 25

Accepted Solution

by:
epasquier earned 500 total points
ID: 36521227
first, here is how to write a dll that will 'hook' to all mouse events, even outside your application, and send that to your application
http://forum.codecall.net/pascal-delphi-tutorials/33993-mouse-hook-tutorial-delphi-codes.html

I'm writting the application that will use that dll, capture the screen portion under the mouse and display it along with the pixel color underneath
0
 
LVL 25

Assisted Solution

by:epasquier
epasquier earned 500 total points
ID: 36521553
Full projects :
- MouseHook.dpr => MouseHook.dll
- MouseZoom.dpr => MouseZoom.exe
both binaries must be in the same directory when running

 MouseZoom.zip

 Mouse Zoom
0
 

Author Comment

by:gamjaradio
ID: 36527023
Thanks a lot ,

Please , just One advice more .

I changed mouse cursor , 'fountainpen filler' shape , but it is just when it in my form .
If the cursor off the form , is changed to as windows want.

How can I keep mouse cursor ,even off my application form.
0
 
LVL 25

Expert Comment

by:epasquier
ID: 36529351
I would have been inclined to say it's not possible, as every applications can set it's own cursor and the OS is changing the cursor accordingly each time the mouse move over an application.

but I checked if someone has an idea about it, and yes, apparently you could implement a workaround by setting ALL system cursors image to the one you want.
check this
http://www.experts-exchange.com/Programming/Languages/Pascal/Delphi/Q_20665275.html

I haven't tested any of it, and if you need help about that, post a new question
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The uses clause is one of those things that just tends to grow and grow. Most of the time this is in the main form, as it's from this form that all others are called. If you have a big application (including many forms), the uses clause in the in…
Introduction The parallel port is a very commonly known port, it was widely used to connect a printer to the PC, if you look at the back of your computer, for those who don't have newer computers, there will be a port with 25 pins and a small print…
This Micro Tutorial will give you a basic overview how to record your screen with Microsoft Expression Encoder. This program is still free and open for the public to download. This will be demonstrated using Microsoft Expression Encoder 4.
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now