ftp://colbleep.ocs.lsumc.edu/pub/utility/win95/procdump.zip
contains some programs I just wrote.  Here is their description:

adump, edump, and odump are Windows programs that start a process and then
search the address space of that process for text.  adump searches every
memory
location.  edump searches even memory locations.  odump searches odd memory
locations.  edump and odump are useful where the text is encoded as UNICODE.
These programs often demonstrate the futility of hiding enciphered text in
an
executable only to decipher it at runtime.

Reply via email to