Detects code differentials between executables in disk and the corresponding processes/modules in memory
Switch branches/tags
Nothing to show
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Failed to load latest commit information.
LICENSE
README.md
windows_memory_patches.py

README.md

Memory Patch Detector

Detects code differentials between executables in disk and the corresponding processes/modules in memory

Requirements

pip install -r requirements.txt

Usage

python windows_memory_patches.py

Notes

The script needs Administrator/SYSTEM privileges in order to analyze all the processes in memory.
At the moment, it doesn't check WoW64 processes at all.