At this point, only the console version is supported and installed. tweaks and ok bentley@ DESCR: dnSpy is a debugger and .NET assembly editor. You can use it to edit and debug assemblies even if you don't have any source code available. Main features: Debugger * Debug .NET Framework, .NET Core and Unity game assemblies, no source code required * Set breakpoints and step into any assembly * Locals, watch, autos windows * Variables windows support saving variables (eg. decrypted byte arrays) to disk or view them in the hex editor (memory window) * Object IDs * Multiple processes can be debugged at the same time * Break on module load * Tracepoints and conditional breakpoints * Export/import breakpoints and tracepoints * Call stack, threads, modules, processes windows * Break on thrown exceptions (1st chance) * Variables windows support evaluating C# / Visual Basic expressions * Dynamic modules can be debugged (but not dynamic methods due to CLR limitations) * Output window logs various debugging events, and it shows timestamps by default :) * Assemblies that decrypt themselves at runtime can be debugged, dnSpy will use the in-memory image. You can also force dnSpy to always use in-memory images instead of disk files. * Public API, you can write an extension or use the C# Interactive window to control the debugger Assembly Editor * All metadata can be edited * Edit methods and classes in C# or Visual Basic with IntelliSense, no source code required * Add new methods, classes or members in C# or Visual Basic * IL editor for low-level IL method body editing * Low-level metadata tables can be edited. This uses the hex editor internally. Hex Editor * Click on an address in the decompiled code to go to its IL code in the hex editor * The reverse of the above, press F12 in an IL body in the hex editor to go to the decompiled code or other high-level representation of the bits. It's great to find out which statement a patch modified. * Highlights .NET metadata structures and PE structures * Tooltips show more info about the selected .NET metadata / PE field * Go to position, file, RVA Go to .NET metadata token, method body, #Blob / #Strings / #US heap offset or #GUID heap index * Follow references (Ctrl+F12) Other * BAML decompiler * Blue, light and dark themes (and a dark high contrast theme) * Bookmarks * C# Interactive window can be used to script dnSpy * Search assemblies for classes, methods, strings, etc * Analyze class and method usage, find callers, etc * Multiple tabs and tab groups * References are highlighted, use Tab / Shift+Tab to move to the next reference * Go to the entry point and module initializer commands * Go to metadata token or metadata row commands * Code tooltips (C# and Visual Basic) * Export to project
28 lines
693 B
Makefile
28 lines
693 B
Makefile
# $OpenBSD: Makefile,v 1.1.1.1 2020/09/04 22:11:32 thfr Exp $
|
|
|
|
COMMENT = .NET debugger and assembly editor
|
|
V = 6.1.7
|
|
DISTNAME = dnSpy-net472
|
|
PKGNAME = dnspy-${V}
|
|
CATEGORIES = devel
|
|
HOMEPAGE = https://github.com/0xd4d/dnSpy
|
|
MAINTAINER = Thomas Frohwein <thfr@openbsd.org>
|
|
|
|
# GPLv3+
|
|
PERMIT_PACKAGE = Yes
|
|
|
|
MASTER_SITES = https://github.com/0xd4d/dnSpy/releases/download/v${V}/
|
|
EXTRACT_SUFX = .zip
|
|
DIST_SUBDIR = dnspy-${V}
|
|
MODULES = lang/mono
|
|
NO_BUILD = Yes
|
|
NO_TEST = Yes
|
|
WRKDIST = ${WRKDIR}
|
|
|
|
do-install:
|
|
mkdir -p ${PREFIX}/share/dnspy
|
|
cp -R ${WRKSRC}/dnSpy.Console.* ${WRKSRC}/bin ${PREFIX}/share/dnspy/
|
|
${SUBST_CMD} -c -m 755 ${FILESDIR}/dnspy.sh ${PREFIX}/bin/dnspy
|
|
|
|
.include <bsd.port.mk>
|