02-04-2025, 11:09 PM
Hi Alison, Got it!. But you can generate An asm function in a completely separate program, extract the binary and chop it about as you please. The advantage of Asm is that you can create custom fully relocatable code without any telltale PB function headers/tails.
Anyway, I trust this is for an ethical purpose. There was a system policy call DEP (Data Execution Prevention) to inhibit malware, and hackers. I don't know what the current status of DEP is in Windows. To be compliant with this policy, OxygenBasic executes its JIT binaries in system allocated memory, not in data memory, or on the stack. It can't be peeked at run-time.
Anyway, I trust this is for an ethical purpose. There was a system policy call DEP (Data Execution Prevention) to inhibit malware, and hackers. I don't know what the current status of DEP is in Windows. To be compliant with this policy, OxygenBasic executes its JIT binaries in system allocated memory, not in data memory, or on the stack. It can't be peeked at run-time.
https://github.com/Charles-Pegge/OxygenBasic
https://forum.it-berater.org/index.php
https://forum.it-berater.org/index.php