代码搜索:dump
找到约 8,160 项符合「dump」的源代码
代码结果 8,160
www.eeworm.com/read/442570/1758571
memory_dump
64 MB:
0x00: 80 08 04 0c 09 01 40 00 01 a0 60 00 80 08 00 01
0x10: 8f 04 04 01 01 00 06 a0 60 00 00 14 10 14 2d 10
0x20: 20 10 20 10 00 00 00 00 00 00 00 00 00 00 00 00
0x30: 00 00 00 00 00 00 00 00 0
www.eeworm.com/read/440499/1795811
memory_dump
64 MB:
0x00: 80 08 04 0c 09 01 40 00 01 a0 60 00 80 08 00 01
0x10: 8f 04 04 01 01 00 06 a0 60 00 00 14 10 14 2d 10
0x20: 20 10 20 10 00 00 00 00 00 00 00 00 00 00 00 00
0x30: 00 00 00 00 00 00 00 00 0
www.eeworm.com/read/439112/1810468
inc dump.inc
#
# (C) Tenable Network Security
#
#
# An earlier iteration of this file was written by George Dagousset (2002)
#
# This include file is released under the terms of the GPLv2
#
function line2string
www.eeworm.com/read/438718/1822830
py dump.py
# Module 'dump'
#
# Print python code that reconstructs a variable.
# This only works in certain cases.
#
# It works fine for:
# - ints and floats (except NaNs and other weird things)
# - strings
# -
www.eeworm.com/read/436162/1851492
java dump.java
// ========================================================================
// Copyright 1996-2005 Mort Bay Consulting Pty. Ltd.
// --------------------------------------------------------------------
www.eeworm.com/read/436133/1853656
memory_dump
64 MB:
0x00: 80 08 04 0c 09 01 40 00 01 a0 60 00 80 08 00 01
0x10: 8f 04 04 01 01 00 06 a0 60 00 00 14 10 14 2d 10
0x20: 20 10 20 10 00 00 00 00 00 00 00 00 00 00 00 00
0x30: 00 00 00 00 00 00 00 00 0
www.eeworm.com/read/432139/1897518
pm dump.pm
#!/usr/bin/perl
###############################################################################
# Copyright 2006 -- Thomson R&D France Snc
# Technology - Corporate Research
#####
www.eeworm.com/read/428747/1956157
memory_dump
64 MB:
0x00: 80 08 04 0c 09 01 40 00 01 a0 60 00 80 08 00 01
0x10: 8f 04 04 01 01 00 06 a0 60 00 00 14 10 14 2d 10
0x20: 20 10 20 10 00 00 00 00 00 00 00 00 00 00 00 00
0x30: 00 00 00 00 00 00 00 00 0
www.eeworm.com/read/426481/1990488
memory_dump
64 MB:
0x00: 80 08 04 0c 09 01 40 00 01 a0 60 00 80 08 00 01
0x10: 8f 04 04 01 01 00 06 a0 60 00 00 14 10 14 2d 10
0x20: 20 10 20 10 00 00 00 00 00 00 00 00 00 00 00 00
0x30: 00 00 00 00 00 00 00 00 0