逆向工程 - IDA Pro - IDC - x86 - Mnemonics、Operand



參考資訊:
https://versprite.com/blog/security-research/how-to-use-idapython-to-automate-reverse-engineering/

main.idc

#include <idc.idc>

static main() {
    auto addr = 0x1012484;

    // ex: mov edi, ds:GetModuleHandleA
    Message("Mnem: %s\n", GetMnem(addr));
    Message("Opnd-0: %s\n", GetOpnd(addr, 0));
    Message("Opnd-1: %s\n", GetOpnd(addr, 1));
}