Wired stuff inside the executeable

Everything else that doesn't fall into one of the other PB categories.
Ralf
Enthusiast
Enthusiast
Posts: 203
Joined: Fri May 30, 2003 1:29 pm
Location: Germany

Wired stuff inside the executeable

Post by Ralf »

Just try following line, create an executeable and take a look into the file! You may see readable parts (asm source?) like: eax=%ld edx=%ld eax=%lu edx=%lu %l and some empty spaces $20!

Code: Select all

    OpenWindow(0,20,20,20,20,#PB_Window_WindowCentered ,"test")
Max.²
Enthusiast
Enthusiast
Posts: 175
Joined: Wed Jul 28, 2004 8:38 am

Post by Max.² »

Turn off the debugger and then have a look again.
PB
PureBasic Expert
PureBasic Expert
Posts: 7581
Joined: Fri Apr 25, 2003 5:24 pm

Post by PB »

> Turn off the debugger and then have a look again.

Makes no difference -- the debugger is automatically disabled when creating an exe.
User avatar
Rings
Moderator
Moderator
Posts: 1435
Joined: Sat Apr 26, 2003 1:11 am

Post by Rings »

lol, yes confirmed.
I bet that fred forgot to remove something......
SPAMINATOR NR.1
Max.²
Enthusiast
Enthusiast
Posts: 175
Joined: Wed Jul 28, 2004 8:38 am

Post by Max.² »

Rings wrote:lol, yes confirmed.
I bet that fred forgot to remove something......
Darn, could have sworn it wasn't in my exes. :lol:
User avatar
Rings
Moderator
Moderator
Posts: 1435
Joined: Sat Apr 26, 2003 1:11 am

Post by Rings »

Rings wrote:lol, yes confirmed.
I bet that fred forgot to remove something......
could be a PRINTF Call with these parameters/placeholders ( eax=%ld edx=%ld eax=%lu edx=%lu %l ) typically for debugging.
SPAMINATOR NR.1
Fred
Administrator
Administrator
Posts: 18350
Joined: Fri May 17, 2002 4:39 pm
Location: France
Contact:

Post by Fred »

I will have a closer look, thank you ;)
Post Reply