pwndbg_dd
Dump a configurable number of 4-byte dwords from a memory address to inspect memory contents during reverse engineering.
Instructions
Dump N dwords (4-byte) at address (WinDbg-style).
pwndbg command: dd Source: pwndbg/commands/windbg.py Category: WinDbg
Args: session_id: The UUID of the session. address: Address to dump. count: Number of dwords (default: 16).
See: https://pwndbg.re/2025.05.30/reference/pwndbg/commands/windbg/
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| session_id | Yes | ||
| address | Yes | ||
| count | No |
Output Schema
| Name | Required | Description | Default |
|---|---|---|---|
| result | Yes |