get_disassembly
Extract disassembled code for a specified address range in IDA Pro to analyze binary files for reverse engineering tasks.
Instructions
Get disassembly for an address range
Input Schema
Name | Required | Description | Default |
---|---|---|---|
count | No | Number of instructions to disassemble (optional) | |
endAddress | No | End address for disassembly (optional) | |
startAddress | Yes | Start address for disassembly |
Input Schema (JSON Schema)
You must be authenticated.
Other Tools from IDA Pro MCP Server
Related Tools
- @mrexodia/ida-pro-mcp
- @fdrechsler/mcp-server-idapro
- @mrexodia/ida-pro-mcp
- @fdrechsler/mcp-server-idapro
- @mrexodia/ida-pro-mcp
- @MxIris-Reverse-Engineering/ida-mcp-server