[0x7ff659d9fcc0]> =!?
Usage: =!cmd args
=!pid - show targeted pid
=!pkt s - send packet 's'
=!monitor cmd - hex-encode monitor command and pass to target interpreter
=!rd - show reverse debugging availability
=!dsb - step backwards
=!dcb - continue backwards
=!detach [pid] - detach from remote/detach specific pid
=!inv.reg - invalidate reg cache
=!pktsz - get max packet size used
=!pktsz bytes - set max. packet size as 'bytes' bytes
=!exec_file [pid] - get file which was executed for current/specified pid
如果对radare2与gdbserver之间的交互感兴趣,则可以使用=!monitor set remote-debug 1在gdbserver控制台中打开gdb远程协议数据包的日志记录功能,以及使用=!monitor set debug 1以在控制台显示常规的gdb调试信息。
radare2同样提供了一个自有的gdbserver实现:
$ r2 -
[0x00000000]> =g?
|Usage: =[g] [...] # gdb server
| gdbserver:
| =g port file [args] listen on 'port' debugging 'file' using gdbserver
| =g! port file [args] same as above, but debug protocol messages (like gdbserver --remote-debug)