you could use INT3 in your assembly code to halt the current pc instruction to runs. of course, if you try to do this without a debugger, windows would pops up a error message box.
however when an application which loaded using a debugger come to INT3 instruction, the application would halted and you could check what are the registers (EAX,EBX,ECX,EDX,ESI,EDI,EBP,ESP values, and modify them if you want.
well, to reverse engineering an application, perhaps, you could just inject the INT3 instruction somewhere around the part you are interested :p :p and check on the values.
Archieves- December 2005
- January 2006
- February 2006
- March 2006
- April 2006
- May 2006