Retro video games delivered to your door every month!
Click above to get retro games delivered to your door ever month!
X-Hacker.org- Tom Rettigs Library - call int3 (from clipper and asm) or int3() (from c) http://www.X-Hacker.org [<<Previous Entry] [^^Up^^] [Next Entry>>] [Menu] [About The Guide]
 CALL INT3 (from Clipper and ASM) or int3() (from C)
 Inserts a breakpoint into a program for machine-language debugging.

 This procedure simply issues an INT 3 instruction.

 When a program is executed under control of a debugging utility
 such as DEBUG, C-SPRITE, or SYMDEB, this instruction causes
 program execution to suspend.

 Has no effect when the program is executed normally.

 * From Clipper
 CALL INT3
 <dBASE/Clipper code to be debugged or analyzed>

 ; From assembler
 CALL INT3
 <ASM Code to be debugged or analyzed>

 /* From C */
 int3();
 <C code to be debugged or analyzed>

 Hazard
    When you reach the breakpoint, you must change the byte
    containing the instruction (CC hexadecimal in machine
    language) to 90 hexadecimal (the opcode for NOP, no operation).
    Otherwise, you will not be able to pass the breakpoint.  Once
    you have passed it, you can change the byte back to CC hex.
    See your debugging utility's documentation for instructions.


             Placed in the Public Domain by Tom Rettig Assoc.

Online resources provided by: http://www.X-Hacker.org --- NG 2 HTML conversion by Dave Pearson