hvix64.exe查看虚拟地址对于物理地址数据

文章详细展示了在AMD64架构中,使用kerneldebugging工具对虚拟地址ffffe800进行分析,包括查看PageTables(页表)和物理地址映射的过程,解释了虚拟地址如何转换为物理地址。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

1: kd> r cr3
cr3=000000010bfd4000
1: kd> r rcx
rcx=ffffe80000001000
1: kd> !vtop 000000010bfd4000 ffffe80000001000
Amd64VtoP: Virt ffffe80000001000, pagedir 000000010bfd4000
Amd64VtoP: PML4E 000000010bfd4e80
Amd64VtoP: PDPE 0000000110c15000
Amd64VtoP: PDE 00000001023cc000
Amd64VtoP: PTE 00000001023d4008
Amd64VtoP: Mapped phys 00000001023d6000
Virtual address ffffe80000001000 translates to physical address 1023d6000.
1: kd> dq ffffe80000001000
ffffe800`00001000  00000000`00000000 00000000`00000000
ffffe800`00001010  00000000`00000000 ffffe800`00001018
ffffe800`00001020  ffffe800`00001018 00000000`00000000
ffffe800`00001030  00000000`00000000 ffffe800`00001038
ffffe800`00001040  ffffe800`00001038 00000000`00000000
ffffe800`00001050  00000000`00000000 ffffe800`00001058
ffffe800`00001060  ffffe800`00001058 00000000`00000000
ffffe800`00001070  00000000`00000000 ffffe800`00001078
1: kd> dq /p 1023d6000
00000001`023d6000  00000000`00000000 00000000`00000000
00000001`023d6010  00000000`00000000 ffffe800`00001018
00000001`023d6020  ffffe800`00001018 00000000`00000000
00000001`023d6030  00000000`00000000 ffffe800`00001038
00000001`023d6040  ffffe800`00001038 00000000`00000000
00000001`023d6050  00000000`00000000 ffffe800`00001058
00000001`023d6060  ffffe800`00001058 00000000`00000000
00000001`023d6070  00000000`00000000 ffffe800`00001078
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值