⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 wpw_tool_memleak_95.html

📁 VC programing
💻 HTML
字号:
<HTML>

<HR><A NAME=TOOL_MEM_LEAK_BOUNCE_CHECK>
Return to <a href="win_prog_wis_tool.html#TOC">Table of Contents for this chapter</a><br>
<H4>Subject: Bounce Check</H4><PRE>
In article: <3qvi7q$nru@ulke.hiMolde.no>  rogers@hiMolde.no (Roger Storvik) writes:
> 
> Who makes this program, and where do I find it? (Email/SMail/FTP/FAX etc)

Bounds Checker is available from your local software dealer or:

  Nu Mega Technologies
  PO Box 7780
  Nashua, NH 03060-7780
  USA

  Tel: (603) 889 2386
  Fax: (603) 889 1135
  BBS: (603) 595 0386

I can recommend it, it spots all sorts of things that MSVC doesn't see.

Andrew Gebbie

<HR>
In article: <3rpkt9$ifv@no-names.nerdc.ufl.edu>  Bill Schwab 
<bills@anest4.anest.ufl.edu> writes:
> 
> Independent of something like Bounds Checker, you can (and IMHO should) 
> use preprocessor directives to build debugging code into app.  One of the 
> purposes of the debugging code is to track dynamic allocation.  You can 
> do things like detect memory leaks, many block overwrites, and improper 
> deallocations.

I use a product called NewTrack that replaces all calls to 
new/delete/malloc/free (and maybe others) at link time.
It shows up unfreed allocations (the registered version gives a symbolic 
stack trace to a log file), illegal frees, pointer over- and underruns on 
allocated memory, and can show up uninitialised varibles in allocated
memory by filling the allocation with junk.
Versions are available for Borland and Microsoft compilers for Windows 
3.1 and Win32.

ftp://ftp.demon.co.uk/pub/ibmpc/windows/newtrack/newtk303.zip is
the current version, I believe.

==========
David Haworth
Tiger Communications plc                Cuius testiculos habes
dave@tigcomms.demon.co.uk         habeas cardia et cerebellum.

</PRE> 

</HTML>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -