Browse files

readme fixed

  • Loading branch information...
1 parent 6237382 commit a493a45c6caf8cb7bb9921b812f7f65af97be891 maaaaz committed Aug 6, 2012
Showing with 2 additions and 1 deletion.
  1. +2 −1
@@ -6,6 +6,7 @@ Description
A simple tool to help finding JNI calls in a x86/ARM disassembly listing.
Originally presented here, this script has been modified in order to support both x86 syntaxes and ARM.
Thus, it can be used for debugging/reverse engineering android native libraries.
@@ -19,7 +20,7 @@ Pass the ARM and x86 (AT&T or Intel syntax) disassembly listing via stdin.
This was particulary designed for the objdump output.
The processed text can be collected at stdout.
-* x86 AT&T syntax
+x86 AT&T syntax
$ objdump -d | python -a x86

0 comments on commit a493a45

Please sign in to comment.