mumbel / ghidra

Ghidra is a software reverse engineering (SRE) framework
https://www.nsa.gov/ghidra
Apache License 2.0
9 stars 1 forks source link

mirror addresses #9

Closed esaulenka closed 5 years ago

esaulenka commented 5 years ago

Sorry for question, but i don't found, how to specify that addresses 0x80001234 and 0xA0001234 point to the same location?

mumbel commented 5 years ago

Not certain on best approach, but you can file->'add to program' and select same ROM. In that popup you'll want to click 'Options' where you can specify alternate load address, offset into file, data Len, and block name

esaulenka commented 5 years ago

Ok, thanks. IDA converts this automatically (when i name dword 0xA000abcd as pointer, it become indicate to 0x8000abcd). For me, this task looks like good start point to learn how to write plugins for Ghidra ;-)

mumbel commented 5 years ago

I asked a Dev in my pull request. Seems possible both in code and when loading from his answer

mumbel commented 5 years ago

Sorry hadn't had much time to play with this. Do not know how to automate this, but it seems really good from a quick glance with this setup: