AndroidMemoryTool is a memory reader and writer tool designed for android and linux os's .This Tool is written in python using ctypes not affective as c. If you find any bug or not working function you can contact me.
- date : 2022/03/23
- author : Abdul Moez
- Version : 0.3
- Study : UnderGraduate in GCU Lahore, Pakistan
- repo : https://github.com/Anonym0usWork1221/android-memorytool
GNU General Public License
Copyright (c) 2022 AbdulMoez
1. This documentation is only for 0.3 version
2. You can find old version on pypi if you want to use it
3. This version is totally different from old
1. Removed complexity to use tool
2. Implemented Oop Structures
3. Added new data types for libs direct read/write
4. Added raw dump support
5. Fixed the bugs
6. Fixed Search and Reading returnig offset issues
7. Added Refiners inorder to check the changed in old values
-
Python 3.x
-
Android Requirments -> Rooted Device Needed
Simply install it by pip and use it in your project
pip install androidMemoryTool==0.3
Or by cloning and then run command
pip install .
Project live at
https://pypi.org/project/androidMemoryTool/0.3/
Memory Tool with example which can be found in the Android-Py-Cheats-Script @ 9d2520e
sub folder.
-
Getting Process ID
from androidMemoryTool import AndroidMemoryTool tool = AndroidMemoryTool.get_pid('ac_client') # for android use package name e.g(com.app.org) print(tool)
-
Getting Module Base
from androidMemoryTool import AndroidMemoryTool pid = AndroidMemoryTool.get_pid('ac_client') base_addr = AndroidMemoryTool.get_module_base_address(pid, "client.so") print(base_addr)
-
Searching and Read process memory
from androidMemoryTool import AndroidMemoryTool # initialize tool tool = AndroidMemoryTool(PKG="ac_client", TYPE=AndroidMemoryTool.DataTypes.DWORD, SPEED_MODE=False, WORKERS=55, pMAP=AndroidMemoryTool.PMAP(ALL=True)) values = tool.read_value(100) founded_offsets = values[0] founded_values = values[1] print(founded_values) print(founded_offsets)
-
Search and Write process memory
from androidMemoryTool import AndroidMemoryTool # initialize tool tool = AndroidMemoryTool(PKG="ac_client", TYPE=AndroidMemoryTool.DataTypes.DWORD, SPEED_MODE=False, WORKERS=55, pMAP=AndroidMemoryTool.PMAP(ALL=True)) values1 = tool.read_write_value(100, 10) print(values1)
-
Read address value
from androidMemoryTool import AndroidMemoryTool pid = AndroidMemoryTool.get_pid('ac_client') base_addr = AndroidMemoryTool.get_module_base_address(pid, "client.so") tool = AndroidMemoryTool(PKG="ac_client", TYPE=AndroidMemoryTool.DataTypes.DWORD) values1 = tool.read_lib(base_addr, 0xfff150d) print(values1)
-
Write address value
from androidMemoryTool import AndroidMemoryTool pid = AndroidMemoryTool.get_pid('ac_client') base_addr = AndroidMemoryTool.get_module_base_address(pid, "client.so") tool = AndroidMemoryTool(PKG="ac_client", TYPE=AndroidMemoryTool.DataTypes.DWORD) values1 = tool.write_lib(base_addr, 0xfff150d, 58) print(values1)
-
Raw Dump Process memory
from androidMemoryTool import AndroidMemoryTool tool = AndroidMemoryTool(PKG="ac_client") dump = tool.raw_dump(lib_name='client.so', path='/home/kali/Documents/') print(dump) # True or False
-
Address Refiner
from androidMemoryTool import AndroidMemoryTool tool = AndroidMemoryTool(PKG="ac_client", TYPE=AndroidMemoryTool.DataTypes.DWORD, SPEED_MODE=False, WORKERS=55, pMAP=AndroidMemoryTool.PMAP(ALL=True)) values = tool.read_value(100) founded_offsets = values[0] refined_address = tool.refiner_address(list_address=founded_offsets, value_to_refine=50) print(refined_address)
All data types are signed.
Range | Name | Ctype |
---|---|---|
-2,147,483,648 to 2,147,483,647 | DWORD | signed int |
3.4E +/- 38 (7 digits) | FLOAT | float |
1.7E +/- 308 (15 digits) | DOUBLE | double |
-32,768 to 32,767 | WORD | signed short int |
-128 to 127 | BYTE | signed char |
-9,223,372,036,854,775,808 to 9,223,372,036,854,775,807 | QWORD | signed long long |
-2,147,483,648 to 2,147,483,647 | XOR | signed long |
Random | UTF-8 | Text |
Random | UTF-16LE | Text |
All data types are signed.
Range | Name | Ctype |
---|---|---|
-2,147,483,648 to 2,147,483,647 | DWORD | signed int |
3.4E +/- 38 (7 digits) | FLOAT | float |
1.7E +/- 308 (15 digits) | DOUBLE | double |
-32,768 to 32,767 | WORD | signed short int |
-128 to 127 | BYTE | signed char |
-9,223,372,036,854,775,808 to 9,223,372,036,854,775,807 | QWORD | signed long long |
-2,147,483,648 to 2,147,483,647 | XOR | signed long |
Script Name | Name | Description |
---|---|---|
ALL | Whole Memory | Whole Memory of current process (slow) |
C_ALLOC | C++ alloc | RAM c++ Allocated memory |
A_ANONYMOUS | Anonymous | Range with r-w access only |
CODE_APP | Code App | shared libs memory (dangerous) |
JAVA_HEAP | Java Heap | Java heap |
C_HEAP | C++ Heap | Heap memory of cpp |
C_DATA | C++ .data | .Data Memory |
C_BSS | C++ .bss | .bss section memory |
J_Java | Java | Java memory section |
STACK | Stack | Stack Memory |
ASHMEM | Ashmen | Ashmen Memory |
V_video | Video | Video memory range |
B_Bad | Bad | Bad Memory (dangerous) |
CODE_SYSTEM | Code system | Code system memory (dangerous) |
If you need assistance, you can ask for help on my mailing list:
- Email : [email protected]
I also created a Discord group:
- Server : https://discord.gg/RMNcqzmt9f
If you want to support me you can buy me coffe.
BitCoin_addr: 19vwfRXfthPY7f2aqDBpxQvZa6AJFKcdBS