First post, by jez
- Rank
- Member
I've been trying to reverse engineer a protected mode game that uses DOS/4GW and it seems to me: it's nigh-on impossible.
IDA 5 can give you a decent call graph of a real mode DOS program, and you can do analysis of later Windows stuff. But am I right in thinking that extended mode DOS programs are virtually impossible?
They start off with a real mode stub, load DOS4GW.EXE and run it in memory, and that calls into code in the original executable when running in protected mode, such that the original executable has a combination of 16 bit and 32 bit instructions. I'm not aware of anything that can adequately perform static analysis on that and show a call graph for the extended mode code. It's a wonder the developers managed to debug these things, honestly.
Is there any hope for me being able to analyze such a program and figure out how it wrote, say, its savegame format? The DOSBox-X debugger just seems insufficient on its own. I can view memory and step through instructions but obviously it's nothing like what IDA provides graphically, with the ability to identify subroutines and rename them.
== Jez ==