|
|
![]() |
|
Remotely with VirtualPC Debugging Remotely: continued There are several steps to debugging your MS Windows application on the target machine.
And using CodeWarrior to walk up the call chain on the stack, you can see that a pointer being passed to a function, gets corrupted by the time the function wants to access the data pointed to by that pointer. Finally, this is what the crash looks like in MS Windows on the target machine.
|
Copyright (c) 2003-2004 Terry Teague
abuse@mac.com
Date Last Modified: 8/17/2004
Replace "abuse" with "teague" in EMail address