capstone/cstool
2017-03-10 20:31:23 +08:00
..
cstool_arm64.c cstool: print out insn groups 2016-11-05 00:50:44 +08:00
cstool_arm.c cstool: print out insn groups 2016-11-05 00:50:44 +08:00
cstool_mips.c cstool: print out insn groups 2016-11-05 00:50:44 +08:00
cstool_ppc.c cstool: print out insn groups 2016-11-05 00:50:44 +08:00
cstool_sparc.c cstool: print out insn groups 2016-11-05 00:50:44 +08:00
cstool_systemz.c cstool: print out insn groups 2016-11-05 00:50:44 +08:00
cstool_x86.c cstool: print out insn groups 2016-11-05 00:50:44 +08:00
cstool_xcore.c cstool: cleanup 2016-10-21 16:42:47 +08:00
cstool.c cstool: support armbe mode 2017-03-10 20:31:23 +08:00
Makefile x86: fix movw instruction in #789 2016-11-08 10:56:42 +08:00
README cstool: update README 2016-10-28 21:23:42 +08:00

This directory contains cstool of Capstone Engine.

Cstool is a command-line tool to disassemble assembly hex-string.
For example, to decode a hexcode string for Intel 32bit, run:

	$ cstool x32 "90 91"

	0	90	nop
	1	91	xchg	eax, ecx

Cstool disassembles the input and prints out the assembly instructions.
On each line, the first column is the instruction offset, the second
column is opcodes, and the rest is the instruction itself.

Cstool is flexible enough to accept all kind of hexcode format. The following
inputs have the same output with the example above.

	$ cstool x32 "0x90 0x91"
	$ cstool x32 "\x90\x91"
	$ cstool x32 "90,91"
	$ cstool x32 "90;91"
	$ cstool x32 "90+91"
	$ cstool x32 "90:91"

To print out instruction details, run Cstool with -d option, like below.

	$ cstool -d x32 "01 d8"
	0  01d8                              add	eax, ebx
		Prefix:0x00 0x00 0x00 0x00
		Opcode:0x01 0x00 0x00 0x00
		rex: 0x0
		addr_size: 4
		modrm: 0xd8
		disp: 0x0
		sib: 0x0
		op_count: 2
			operands[0].type: REG = eax
			operands[0].size: 4
			operands[1].type: REG = ebx
			operands[1].size: 4

To see all the supported options, run ./cstool