📄 wpw_tool_memleak_95.html
字号:
<HTML>
<HR><A NAME=TOOL_MEM_LEAK_BOUNCE_CHECK>
Return to <a href="win_prog_wis_tool.html#TOC">Table of Contents for this chapter</a><br>
<H4>Subject: Bounce Check</H4><PRE>
In article: <3qvi7q$nru@ulke.hiMolde.no> rogers@hiMolde.no (Roger Storvik) writes:
>
> Who makes this program, and where do I find it? (Email/SMail/FTP/FAX etc)
Bounds Checker is available from your local software dealer or:
Nu Mega Technologies
PO Box 7780
Nashua, NH 03060-7780
USA
Tel: (603) 889 2386
Fax: (603) 889 1135
BBS: (603) 595 0386
I can recommend it, it spots all sorts of things that MSVC doesn't see.
Andrew Gebbie
<HR>
In article: <3rpkt9$ifv@no-names.nerdc.ufl.edu> Bill Schwab
<bills@anest4.anest.ufl.edu> writes:
>
> Independent of something like Bounds Checker, you can (and IMHO should)
> use preprocessor directives to build debugging code into app. One of the
> purposes of the debugging code is to track dynamic allocation. You can
> do things like detect memory leaks, many block overwrites, and improper
> deallocations.
I use a product called NewTrack that replaces all calls to
new/delete/malloc/free (and maybe others) at link time.
It shows up unfreed allocations (the registered version gives a symbolic
stack trace to a log file), illegal frees, pointer over- and underruns on
allocated memory, and can show up uninitialised varibles in allocated
memory by filling the allocation with junk.
Versions are available for Borland and Microsoft compilers for Windows
3.1 and Win32.
ftp://ftp.demon.co.uk/pub/ibmpc/windows/newtrack/newtk303.zip is
the current version, I believe.
==========
David Haworth
Tiger Communications plc Cuius testiculos habes
dave@tigcomms.demon.co.uk habeas cardia et cerebellum.
</PRE>
</HTML>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -