TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Directly access your physical memory (dev/mem)

58 点作者 blueblueue超过 2 年前

9 条评论

wmwmwm超过 2 年前
Not super related but a pleasantly surprising linux /dev trick I discovered yesterday was piping “hello” to /dev/udp/<ip>/<port> in order to check connectivity between two machines (the other was listening using nc)
评论 #34373368 未加载
hecanjog超过 2 年前
This is pretty tangential but seeing this reminds me of the days when the puredyne distro used to pipe /dev/mem to /dev/dsp as a noisy startup chime.
评论 #34373188 未加载
评论 #34375613 未加载
评论 #34374290 未加载
评论 #34376230 未加载
dezgeg超过 2 年前
The 'devmem' command is pretty neat when doing embedded systems, allowing you to write entire device drivers in bash!
评论 #34374871 未加载
评论 #34375324 未加载
h2odragon超过 2 年前
Make a game of it: How many random bytes can you write (to random locations) before (your program | the entire system) goes badly awry or unresponsive?
评论 #34372453 未加载
ben0x539超过 2 年前
Take that, memory-safe programming languages!
Nihilartikel超过 2 年前
Drawing to the vga frame buffer back in dos used to be as simple as setting a pointer to 0xA0000 in your c(++) program and writing to it. Fond memories!
bbhfb超过 2 年前
This is also handy for directly accessing memory that's been mapped in from peripherals and special-purpose processors. Though it might not always work because of clock gating.
tgsovlerkhgsel超过 2 年前
I'm surprised access through /dev/mem happens below the caching layer. I wouldn't have even thought of that possibility. Any idea why that is?
评论 #34374638 未加载
评论 #34375091 未加载
评论 #34376247 未加载
mikotodomo超过 2 年前
Isn't this a security risk?
评论 #34374814 未加载