# LLDB # Cheat sheet Basic commands
**Command** | **Example** | **Comment** |
re re re wr | Read the registers Write to registers | |
b | b 0x00000076cb964ed0 b libc.so`sendto breakpoint set -s libc.so -n send | setting up a breakpoint |
watchpoint | `w s e -s 1 -w read\_write -- $x0&0x0000FFFFFFFFFFFF` | hardware breakpoint, ignoring memory tags |
image lookup -r -n <symbol> | image lookup -r -n fopen image lookup -r -n send libc.so | regex lookup function name |
image lookup -a <address> | (lldb) image lookup -a `((int \*\*\*)$x0)\[0\]\[6\]` Address: libart.so\[0x00000000003900c0\] ... FindClass(\_JNIEnv\*, char const\*) (lldb) image lookup -a 0x000000787952b0c0 Address: libart.so\[0x00000000003900c0\] ... FindClass(\_JNIEnv\*, char const\*) | translate address to symbol, in example - parsing JNIEnv \* object |
memory region <ADDRESS> | (lldb) mem reg 0x0000007c23b510f8 \[0x0000007c23b47000-0x0000007c23b52000) r-- /data/app/XXX/YYY/base.apk | shows the region of the specified address |
memory read --outfile <PATH> --binary --force <START\_ADDR> <END\_ADDR> | (lldb) memory read --outfile C:\\temp\\dump.bin --binary --force 0x0000007872124000 0x000000787219a000 483328 bytes written to 'C:\\temp\\dump.bin' | dump binary memory |