Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/gdelugre/ida-arm-system-highlight
IDA script for highlighting and decoding ARM system instructions
https://github.com/gdelugre/ida-arm-system-highlight
arm ida-pro python script
Last synced: 13 days ago
JSON representation
IDA script for highlighting and decoding ARM system instructions
- Host: GitHub
- URL: https://github.com/gdelugre/ida-arm-system-highlight
- Owner: gdelugre
- License: mit
- Created: 2017-05-09T15:52:07.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2021-09-28T12:26:41.000Z (about 3 years ago)
- Last Synced: 2024-10-28T00:00:31.047Z (about 2 months ago)
- Topics: arm, ida-pro, python, script
- Language: Python
- Size: 389 KB
- Stars: 390
- Watchers: 27
- Forks: 56
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - gdelugre/ida-arm-system-highlight - IDA script for highlighting and decoding ARM system instructions (Python)
README
## Decoding ARM system instructions
This script will give you the list of ARM system instructions used in your IDA
database. This is useful for locating specific low-level pieces of code
(setting up the MMU, caches, fault handlers, etc.).One hassle of reverse engineering low-level ARM code is that IDA Pro does not
decode the internal registers accessed by co-processor instructions
(``MCR``/``MRC`` and ``MSR``/``MRS`` on AArch64).After applying the script, the system registers accessed will be automatically
commented in the database, as defined in the official ARM reference manuals.![AArch32 decoding](/img/aarch32_hl.png)
![AArch64 decoding](/img/aarch64_hl.png)The script will also try to automatically detect the accessed fields for some
registers:![Field decoding](/img/scr_decode_bits.png)
## Usage
``Alt-F7`` in IDA Pro, then run the script on your open database.
## Compatibility
Should work with ARMv7 and ARMv8 processors.