ftp://colbleep.ocs.lsumc.edu/pub/utility/win95/procdump.zip contains some programs I just wrote. Here is their description: adump, edump, and odump are Windows programs that start a process and then search the address space of that process for text. adump searches every memory location. edump searches even memory locations. odump searches odd memory locations. edump and odump are useful where the text is encoded as UNICODE. These programs often demonstrate the futility of hiding enciphered text in an executable only to decipher it at runtime.
