eb, ed, eq (edit virtual memory)
Description of 'eb, ed, eq' commands in HyperDbg.
Command
eb : edit memory as Byte values
ed : edit memory as Double-word values (4 bytes)
eq : edit memory as Quad-word values (8 bytes)
Syntax
eb [Address (hex)] [Contents (hex)] [pid ProcessId (hex)]
ed [Address (hex)] [Contents (hex)] [pid ProcessId (hex)]
eq [Address (hex)] [Contents (hex)] [pid ProcessId (hex)]
Description
Edits the virtual address memory contents.
Parameters
[Address (hex)]
The virtual address of where we want to edit its memory.
[Contents (hex)]
The new contents in hex format (it could be an array).
[pid ProcessId (hex)] (optional)
The process ID in the hex format that we want to see the memory from its context (cr3).
If you don't specify the pid
, then the default pid
is the current process (HyperDbg) process layout of memory.
In the Debugger Mode, the pid (parameter) is ignored. If you want to view another process memory, use the '.process' command to switch to another process memory layout.
Examples
The following command is used when we want to edit the content of memory at nt!Kd_DEFAULT_Mask
in a hex byte form and change it to 0xff 0xff 0xff 0xff
(modify four bytes).
The following command is used when we want to edit the content of memory at nt!Kd_DEFAULT_Mask+@rax+10
in a hex byte form and change it to 0xff 0xff 0xff 0xff
(modify four bytes).
The following command is used when we want to edit the content of memory at fffff800`3ad6f010
in a hex byte form and change it to 0x90 0x90 0x90
(modify three bytes).
The following example is used when we want to edit the contents of memory at fffff800`3ad6f010
in Double-word values (4 bytes), change it to 245C8948
.
The following example is used when we want to edit the contents of memory at fffff800`3ad6f010
in Quad-word values (8 bytes), change it to 88889898`85858686
and92929393`97979898
(16 bytes).
IOCTL
This function works by calling DeviceIoControl with IOCTL = IOCTL_DEBUGGER_EDIT_MEMORY
, you have to send it in the following structure.
The Result
will be filled by the kernel-mode driver when it returns from the kernel and shows whether the editing was successful or not. The following results can come from the kernel:
The Address
is where we want to modify, and it can be both a physical address or a virtual address.
ProcessId
is the process that we want to modify based on its memory layout (cr3), it can't be null
or zero.
MemoryType
shows whether the Address
is a physical address or a virtual address.
You can see its values in the following enum :
ByteSize
shows whether we want to modify the target Address in a byte, dword, or qword format.
The above structure is added on top of an array of 64-bit values, which is the new content to the memory.
For example, if you want to change the memory address of the target to 0x90 0x90
then you should provide an array of 0x0000000000000090
and 0x0000000000000090
and append it to the end of the above structure. The count of these chunks is stored at CountOf64Chunks
in the above structure and the final buffer that will be sent into the kernel has a size of FinalStructureSize
bytes.
In the debugger-mode, HyperDbg uses the exact same structure, you should send the above structure over serial to the debuggee which is paused in vmx-root mode.
You should send the above structure with DEBUGGER_REMOTE_PACKET_REQUESTED_ACTION_ON_VMX_ROOT_EDIT_MEMORY
as RequestedAction
and DEBUGGER_REMOTE_PACKET_TYPE_DEBUGGER_TO_DEBUGGEE_EXECUTE_ON_VMX_ROOT
as PacketType
.
In return, the debuggee sends the above structure with the following type.
The following function is responsible for sending editing memory in the debugger.
Remarks
You can change as many bytes as you need in byte, dword, and qword formats; just add new values to the end of the command.
If you change the memory address that you previously set a breakpoint using the 'bp' command, the previous value is replaced when you remove the breakpoint.
This command is guaranteed to keep debuggee in a halt state (in Debugger Mode); thus, nothing will change during its execution.
Requirements
None
Related
Last updated