[0x7ff659d9fcc0]> =!?
Usage: =!cmd args
=!pid - show targeted pid
=!pkt s - send packet 's'
=!monitor cmd - hex-encode monitor command and pass to target interpreter
=!rd - show reverse debugging availability
=!dsb - step backwards
=!dcb - continue backwards
=!detach [pid] - detach from remote/detach specific pid
=!inv.reg - invalidate reg cache
=!pktsz - get max packet size used
=!pktsz bytes - set max. packet size as 'bytes' bytes
=!exec_file [pid] - get file which was executed for current/specified pid
$ r2 -
[0x00000000]> =g?
|Usage: =[g] [...] # gdb server
| gdbserver:
| =g port file [args] listen on 'port' debugging 'file' using gdbserver
| =g! port file [args] same as above, but debug protocol messages (like gdbserver --remote-debug)