mirror of
https://github.com/capstone-engine/capstone.git
synced 2024-12-04 03:32:05 +00:00
21f7bc85f9
* Fix leaks * Remove unnecessary new lines * Add checks for actual buffer length before attempting reading it. * Xtensa: add xtensa support * Xtensa fixes - fix MCExpr - fix Xtensa_add_cs_detail - add `add_cs_detail` - add `MCExpr *MCOperand_getExpr(const MCOperand *MC)` `void printExpr(const MCExpr *E, SStream *O)` autosync fix - fix StreamOperation.py - replace `report_fatal_error` with `CS_ASSERT` - fix patch StreamOperation.py - replace `assert` with `CS_ASSERT` - fix AddCSDetail.py - fix QualifiedIdentifier * Xtensa fix * Xtensa fix .py * add Xtensa to the fuzzer * Xtensa `LITBASE`: add a basic implementation * Xtensa `LITBASE`: add a integration test * Xtensa: fix cs_v6_release_guide.md * Xtensa: fix `XTENSA_OP_GROUP_MEMOPERAND` * Xtensa: fix * Xtensa: fix Targets.py * Use isUint and isInt all over Xtensa * Add documentation about LITBASE functionality * Fix typo * Replace hard with Capstone assert * Xtensa: fix arch_config.json * Xtensa: fix --------- Co-authored-by: Rot127 <unisono@quyllur.org> |
||
---|---|---|
.. | ||
cstool_aarch64.c | ||
cstool_alpha.c | ||
cstool_arm.c | ||
cstool_bpf.c | ||
cstool_evm.c | ||
cstool_hppa.c | ||
cstool_loongarch.c | ||
cstool_m68k.c | ||
cstool_m680x.c | ||
cstool_mips.c | ||
cstool_mos65xx.c | ||
cstool_powerpc.c | ||
cstool_riscv.c | ||
cstool_sh.c | ||
cstool_sparc.c | ||
cstool_systemz.c | ||
cstool_tms320c64x.c | ||
cstool_tricore.c | ||
cstool_wasm.c | ||
cstool_x86.c | ||
cstool_xcore.c | ||
cstool_xtensa.c | ||
cstool.c | ||
cstool.h | ||
getopt.c | ||
getopt.h | ||
Makefile | ||
README |
This directory contains cstool of Capstone Engine. Cstool is a command-line tool to disassemble assembly hex-string. For example, to decode a hexcode string for Intel 32bit, run: $ cstool x32 "90 91" 0 90 nop 1 91 xchg eax, ecx Cstool disassembles the input and prints out the assembly instructions. On each line, the first column is the instruction offset, the second column is opcodes, and the rest is the instruction itself. Cstool is flexible enough to accept all kind of hexcode format. The following inputs have the same output with the example above. $ cstool x32 "0x90 0x91" $ cstool x32 "\x90\x91" $ cstool x32 "90,91" $ cstool x32 "90;91" $ cstool x32 "90+91" $ cstool x32 "90:91" To print out instruction details, run Cstool with -d option, like below. $ cstool -d x32 "01 d8" 0 01d8 add eax, ebx Prefix:0x00 0x00 0x00 0x00 Opcode:0x01 0x00 0x00 0x00 rex: 0x0 addr_size: 4 modrm: 0xd8 disp: 0x0 sib: 0x0 op_count: 2 operands[0].type: REG = eax operands[0].size: 4 operands[0].access: READ | WRITE operands[1].type: REG = ebx operands[1].size: 4 operands[1].access: READ Registers read: eax ebx Registers modified: eflags eax EFLAGS: MOD_AF MOD_CF MOD_SF MOD_ZF MOD_PF MOD_OF To see all the supported options, run ./cstool