Reversing PCode Args
Author: David Zimmer
Date: 08.19.19 - 8:30pm
Note: Vbdec now has its own product page
Here is a quick two part video on finding an unhandled opcode that requires byte stream arguments.
In the first video we: find a suitable target, discover when it is generated, recreate its use in a test project, and deduce what the bytecode args mean.
In the second video we fire up the pcode debugger and watch live data to make sure our understanding is correct.