0% found this document useful (0 votes)
797 views1 page

OllyDbg Shortcuts

OllyDbg is a debugger that allows users to: 1. Set, unset, and edit breakpoints to pause execution at specific points in code. 2. Analyze and disassemble executable code, scan object files, and display symbolic names. 3. Navigate code by going to addresses, expressions, procedures, references, and following jumps and calls. 4. Execute, step into or over, run, pause, and trace code to debug programs. 5. Open various windows to view breakpoints, CPU registers, modules, log, and memory.

Uploaded by

Rog Don
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
797 views1 page

OllyDbg Shortcuts

OllyDbg is a debugger that allows users to: 1. Set, unset, and edit breakpoints to pause execution at specific points in code. 2. Analyze and disassemble executable code, scan object files, and display symbolic names. 3. Navigate code by going to addresses, expressions, procedures, references, and following jumps and calls. 4. Execute, step into or over, run, pause, and trace code to debug programs. 5. Open various windows to view breakpoints, CPU registers, modules, log, and memory.

Uploaded by

Rog Don
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

OllyDbg Quick Reference

intropy@caughq.org UI
Open new program Close program Maximize/restore active windows Make OllyDbg topmost window Close OllyDbg F3 Alt+F2 F5 Alt+F5 Alt+X

Breakpoints
Set/Unset breakpoint Set/Edit conditional breakpoint Set/Edit conditional log breakpoint Temporarily disable/restore BP F2 Shift+F2 Shift+F4 Space

Data
Analyze executable code Scan object files Display symbolic names Ctrl+A Ctrl+O Ctrl+N

Windows
Open breakpoints window Open CPU window Open modules window Open log window Open memory window Alt+B Alt+C Alt+E Alt+L Alt+M

Searching
Find selected address xrefs Find jumps to line Search for sequence Search allocated memory Search binary Search for a command Repeat last search Ctrl+R Ctrl+J Ctrl+S Ctrl+L Ctrl+B Ctrl+F Ctrl+L

Editing
Add label Add comment Edit memory Assemble Undo changes : (Colon) ; (Semicolon) Ctrl+E Space Alt+BkSp

Navigation
Go to origin Go to address of expression Go to previous address Go to next address Go to previous procedure Go to next procedure Go to previous reference Go to next reference Follow expression Follow jump or call View call tree * (Asterisk) Ctrl+G - (Minus) + (Plus) Ctrl+Ctrl++ Alt+F7 Alt+F8 Ctrl+G Enter Ctrl+K

Execution
Step into Animate into Step over Animate over Run application Pass exception handler and run Execute till return Execute till user code Trace into Trace over Pause Pause trace conditional Run to selection F7 Ctrl+F7 F8 Ctrl+F8 F9 Shift+F9 Ctrl+F9 Alt+F9 Ctrl+F11 Ctrl+F12 F12 Ctrl+T F4

Misc
Context sensitive help Ctrl+F1

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy