Instruments' Leaks: Hex addresses, decoding memory contents
Instruments' Leaks: Hex addresses, decoding memory contents
- Subject: Instruments' Leaks: Hex addresses, decoding memory contents
- From: Jerry Krinock <email@hidden>
- Date: Tue, 4 Aug 2009 12:24:13 -0700
I've been using the Leaks instrument in Instruments 1.5 to find memory
leaks and am happy to have found quite a few.
Unfortunately, for most of my leaks the Call Stack in the Extended
Detail pane descends into a block that shows hex addresses instead of
symbols. The background color of these is purple. I believe this
occurs when it enters a loadable bundle or a framework. Both the
suspect bundle and framework contain my code (in which I've found a
few leaks already), but are compiled in different, although dependent,
Xcode projects. Is there any way to make it show me the symbols, or
symbolize the addresses? I've ran the 'nm' tool on both suspects, but
the symbol addresses in that output are only 3 or 4 hex digits while
the ones shown in the Leaks call stack are 5 or 6. Maybe there's some
address offsetting going on -- but not by a "round" hex number since I
can't find them even when searching for the lower order digits.
One other issue is that the strings in the "Leaked Memory Contents"
have given me important clues -- but only after I sat there, read the
contents with my eyeballs and decoded using an ASCII table I have
stuck to my wall which a TTL I.C. salesman gave me back in year 1982.
Is there a way to get a decoded view of the data, or at least copy it
to the clipboard so I can decode it with other tools?
Sincerely,
Jerry Krinock
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Xcode-users mailing list (email@hidden)
Help/Unsubscribe/Update your Subscription:
This email sent to email@hidden