Text search | Alt+T |
Show strings window | Shift+F12 |
Show operand as hex value | Q |
Insert comment | : |
Follow jump or call in view | Enter |
Return to previous view | Esc |
Go to next view | Ctrl+Enter |
Show names window | Shift+F4 |
Display function's flow chart | F12 |
Display graph of function calls | Ctrl+F12 |
Go to program's entry point | Ctrl+E |
Go to specific address | G |
Rename a variable or function | N |
Show listing of names | Ctrl+L |
Display listing of segments | Ctrl+S |
Show cross-references to selected function | Select function name » Ctrl+X |
Show stack of current function | Ctrl+K |
'Security > Reverse Engineering' 카테고리의 다른 글
[Reversing] MASM32 Install and *.asm files compile (0) | 2011.01.19 |
---|---|
[Revsering] ASCII Code List (0) | 2010.10.17 |
[Reversing] Segment, Offset (0) | 2010.07.02 |
[Reversing] Ollydbg 단축키 (0) | 2010.07.02 |
[Reversing]구조화된 예외 처리(SEH) (0) | 2010.05.10 |