Hi, I spent a whole day trying to understand how programs like debuggers can "simply" scan all the physical memory of the system without limitations. I could find only some api functions to specifically address a single process and deal with it, but nothing about how to address physical memory without triggering protection fault/errors ecc. ecc. Is there a way to get the content of 0x???????? or whatever without writing "kernel mode ring0 bla bla bla" code? Just a simple SwitchToUnprotectedModeAdressing() like function? Maybe a standard c library function I never heard of...?
Thank you very much.
Kingraoul
Thank you very much.
Kingraoul