Memory debugger

{{Short description|Software memory problem finder}}

{{more citations needed|date=December 2011}}

{{Program execution}}

A memory debugger is a debugger for finding software memory problems such as memory leaks and buffer overflows. These are due to bugs related to the allocation and deallocation of dynamic memory. Programs written in languages that have garbage collection, such as managed code, might also need memory debuggers, e.g. for memory leaks due to "living" references in collections.

Overview

Memory debuggers work by monitoring memory access, allocations, and deallocation of memory. Many memory debuggers require applications to be recompiled with special dynamic memory allocation libraries, whose APIs are mostly compatible with conventional dynamic memory allocation libraries, or else use dynamic linking. Electric Fence is such a debugger which debugs memory allocation with malloc. Some memory debuggers (e.g. Valgrind) work by running the executable in a virtual machine-like environment, monitoring memory access, allocation and deallocation so that no recompilation with special memory allocation libraries is required.

Finding memory issues such as leaks can be extremely time-consuming as they may not manifest themselves except under certain conditions. Using a tool to detect memory misuse makes the process much faster and easier.{{cite web|url=http://www.computerworld.com/article/3003957/linux/review-5-memory-debuggers-for-linux-coding.html|access-date=August 24, 2017|title=Review: 5 memory debuggers for Linux coding|date=20 November 2015}}

As abnormally high memory utilization can be a contributing factor in software aging, memory debuggers can help programmers to avoid software anomalies that would exhaust the computer system memory, thus ensuring high reliability of the software even for long runtimes.

Comparison to static analyzer

Some static analysis tools can also help find memory errors. Memory debuggers operate as part of an application while its running while static code analysis is performed by analyzing the code without executing it. These different techniques will typically find different instances of problems, and using them both together yields the best result.{{cite web|url=https://software.intel.com/en-us/inspector-user-guide-windows-dynamic-analysis-vs-static-analysis|access-date=August 24, 2017|title=Dynamic Analysis vs. Static Analysis}}

List of memory debugging tools

This is a list of tools useful for memory debugging. A profiler can be used in conjunction with a memory debugger.

class="wikitable sortable"
Name

!OS

!License

!Languages

!Technique

AddressSanitizer

| Linux, Mac OS

| Free/open source (LLVM)

| C, C++, Rust

| Compile-time instrumentation (available in Clang and GCC) and specialized library

Allinea DDT

| Linux, Blue Gene

| {{Proprietary}} commercial

| C, C++ and F90. Also for parallel programs on supercomputers

| Runtime - through dynamic linking

AQtime

| Windows (Visual Studio, Embarcadero IDEs)

| {{Proprietary}} commercial

| .NET, C++, Java, Silverlight, JScript, VBScript{{Cite web |url=http://smartbear.com/products/qa-tools/application-performance-profiling/profiling-managed-code |title=Managed Code - AQtime Pro | SmartBear |access-date=2013-01-14 |archive-url=https://web.archive.org/web/20130919153515/http://smartbear.com/products/qa-tools/application-performance-profiling/profiling-managed-code |archive-date=2013-09-19 |url-status=dead }}

| Runtime

Bcheck

| Solaris

|

|

|

BoundsChecker

| Windows (Visual Studio)

| {{Proprietary}} commercial

| C++

| Runtime intercepts or compile-time

Daikon

| Unix, Windows, Mac OS X{{Cite web|url=http://groups.csail.mit.edu/pag/daikon/download/doc/daikon.html|title=The Daikon Invariant Detector User Manual}}

| Free/open source{{Cite web|url=http://groups.csail.mit.edu/pag/daikon/download/doc/daikon.html#License|title = The Daikon Invariant Detector User Manual}}

| Java, C/C++, Perl, and Eiffel

| Runtime dynamic invariant detection

Debug_new

| (general technique)

| (general technique)

| C++

| Compile-time override

Deleaker

| Windows (standalone, and plugins for Visual Studio, RAD Studio, Qt Creator, CLion)

| {{Proprietary}} commercial

| C++, .Net, Delphi

| Runtime intercepts

dmalloc

| {{Any}}

| Free/open source (ISC License)

| C

| Compile-time override

{{section link|DynamoRIO|Dr. Memory}}

| Android, Linux, Windows

| Free/open source (LGPL and BSD)

| {{Any}}

| Runtime intercepts

Electric Fence

| Unix

| {{GPL-lic|Free/open source (GPL)}}

| C, C++

| Compile-time override

FASTMM4

| Windows

| {{GPL-lic|Free/open source (GPL)}}

| Delphi

| Compile-time override

IBM Rational Purify

| Unix, Windows

| {{Proprietary}} commercial

| C++, Java, .NET

| Runtime

Insure++

| Windows (Visual Studio plugin), Unix

| {{Proprietary}} commercial

| C, C++

| source code instrumentation

Intel Inspector

| Windows (Visual Studio), Linux

| {{Proprietary}} commercial

| C, C++, Fortran

| Runtime

libcwd

| Linux (gcc)

| Free/open source

| C, C++

| Compile-time override

libumem

| Solaris

| Bundled with Solaris

|

| Link-time override

Memwatch

| {{Any}} (programming library)

| Free/open source

| C

| Compile-time override

mtrace

| {{varies|Various}}

| {{LGPL-lic|Free/open source (LGPL)}}

| GNU C library

| Built-in, outputs accesses

MTuner

| {{varies|Various}}

| {{Free}}

| C, C++

| Runtime intercepts, Link-time override (MSVC, Clang and GCC), Leak detection

Oracle Solaris Studio (formerly Sun Studio Runtime Checking)

| Linux, Solaris

| Proprietary freeware

| C, C++, Fortran

|

OLIVER (APT international)

| MVS, MVS/EXA, DOS/VSE

| {{Proprietary}} software

| IBM Assembler

| Runtime intercepts, Hypervisor - Type 2

TotalView

| Unix, Mac OS X

| {{Proprietary}} commercial

| C, C++, Fortran

| Runtime

{{section link|Valgrind|Memcheck}}

| Linux, FreeBSD, Solaris/illumos, Mac OS, Android

| {{GPL-lic|Free/open source (GPL)}}

| {{Any}}

| Runtime intercepts

WinDbg

| Windows

| {{Proprietary}} freeware

| C, C++, .NET, Python

| Runtime

See also

References

  • Michael C. Daconta: C++ Pointers and Dynamic Memory Management, John Wiley & Sons, {{ISBN|0-471-04998-0}}
  • Andrew Koenig: C Traps and Pitfalls, Addison-Wesley, {{ISBN|0-201-17928-8}}

{{Reflist}}