My use case is as follows:
1) x64 debugger
2) x64 pykd
3) Attached as a kernel debugger
4) Target being debugged is x86 platform
Using the read memory functions (ptrMWord, ptrFloat, etc), these apis incorrectly interpret 32bit addresses.
Eample:
address =0x826d8500
val = ptrMWord(address)
Causes a MemoryException to be thrown: "Memory excception at 0xFFFFFFFF826d8000 target virtual address"
This happens even if I use addr64() on the address before hand to sign extend to the above and then mask off the top bytes
1) x64 debugger
2) x64 pykd
3) Attached as a kernel debugger
4) Target being debugged is x86 platform
Using the read memory functions (ptrMWord, ptrFloat, etc), these apis incorrectly interpret 32bit addresses.
Eample:
address =0x826d8500
val = ptrMWord(address)
Causes a MemoryException to be thrown: "Memory excception at 0xFFFFFFFF826d8000 target virtual address"
This happens even if I use addr64() on the address before hand to sign extend to the above and then mask off the top bytes