```
>>>loadBytes(0x00007ffa8e8d32ef, 10)
Traceback (most recent call last):
File "<input>", line 1, in <module>
MemoryException: Memory exception at 0x7ffa8e8d32ef target virtual address
>>>.reload
>>>loadBytes(0x00007ffa8e8d32ef, 10)
[195, 204, 204, 204, 204, 204, 204, 204, 204, 72]
>>>
```
The same result:
dbgCommand("dd 0x00007ffa8e8d32ef")
It seems like " .reload " is necessary to get memory access
Comments: ** Comment from web user: EreTIk **
Do not reproduced:
```
>>> import pykd
>>> pykd.initialize()
>>> pykd.startProcess("calc.exe")
>>> print pykd.dbgCommand("lm")
start end module name
00000000`76df0000 00000000`76f0f000 kernel32 (deferred)
00000000`76f10000 00000000`7700a000 USER32 (deferred)
00000000`77010000 00000000`771b9000 ntdll (deferred)
00000000`ff050000 00000000`ff133000 calc (deferred)
000007fe`f3460000 000007fe`f349b000 WINMM (deferred)
000007fe`fb4b0000 000007fe`fb6c6000 gdiplus (deferred)
000007fe`fb6d0000 000007fe`fb726000 UxTheme (deferred)
000007fe`fb760000 000007fe`fb954000 COMCTL32 (deferred)
000007fe`fbee0000 000007fe`fbeec000 VERSION (deferred)
000007fe`fd0d0000 000007fe`fd13c000 KERNELBASE (deferred)
000007fe`fd1f0000 000007fe`fd2c7000 OLEAUT32 (deferred)
000007fe`fd510000 000007fe`fd5af000 msvcrt (deferred)
000007fe`fd760000 000007fe`fd77f000 sechost (deferred)
000007fe`fdab0000 000007fe`fdb8b000 ADVAPI32 (deferred)
000007fe`fdb90000 000007fe`fdcbd000 RPCRT4 (deferred)
000007fe`fdcc0000 000007fe`fdcce000 LPK (deferred)
000007fe`fdee0000 000007fe`fdfa9000 USP10 (deferred)
000007fe`fe050000 000007fe`fe0b7000 GDI32 (deferred)
000007fe`fe0c0000 000007fe`fe2c3000 ole32 (deferred)
000007fe`fe2d0000 000007fe`fe341000 SHLWAPI (deferred)
000007fe`fe590000 000007fe`ff318000 SHELL32 (deferred)
>>> pykd.loadBytes(0xff050000, 10)
[77, 90, 144, 0, 3, 0, 0, 0, 4, 0]
>>> pykd.loadBytes(0xff050000+0x1000, 10)
[69, 51, 237, 72, 139, 249, 51, 201, 69, 141]
>>> pykd.loadBytes(0xff050000+0x10000, 10)
[0, 72, 139, 222, 15, 133, 26, 75, 1, 0]
>>> pykd.loadBytes(pykd.expr("ntdll"), 10)
[77, 90, 144, 0, 3, 0, 0, 0, 4, 0]
>>> pykd.loadBytes(pykd.expr("ntdll")+0x1000, 10)
[139, 179, 144, 0, 0, 0, 193, 238, 21, 247]
>>> pykd.loadBytes(pykd.expr("ntdll")+0x10000, 10)
[0, 72, 139, 92, 36, 64, 72, 131, 196, 48]
>>> pykd.loadBytes(pykd.expr("advapi32"), 10)
[77, 90, 144, 0, 3, 0, 0, 0, 4, 0]
>>> pykd.loadBytes(pykd.expr("advapi32")+0x1000, 10)
[72, 131, 61, 176, 125, 10, 0, 0, 15, 133]
>>> pykd.loadBytes(pykd.expr("advapi32")+0x10000, 10)
[72, 137, 76, 36, 8, 83, 86, 87, 65, 84]
```
Could you:
1. execute print pykd.dbgCommand("version")
2. give the script that reproduces the problem