x64dbg is an open-source Windows debugger optimized for reverse engineering and malware analysis of executables without source code.
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
This tool is primarily used by malware analysts, reverse engineers, and security researchers to debug and analyze 32-bit and 64-bit Windows executables. It facilitates deep inspection of binary behavior, memory, and execution flow to understand malware or software internals. The debugger supports plugin extensions, making it adaptable for various forensic and exploitation tasks.
Users should ensure they have appropriate permissions to extract and run the debugger. The tool is community-driven and supports extensive plugin development, so users can customize it for specific reverse engineering needs. It is recommended to consult the official wiki and community channels for troubleshooting and advanced usage.
Download a snapshot from GitHub, SourceForge, or OSDN
Extract the downloaded archive to a location with user write access
Optionally run x96dbg.exe to register shell extensions and add desktop shortcuts
Run x32\x32dbg.exe to debug 32-bit executables
Run x64\x64dbg.exe to debug 64-bit executables
Alternatively, run x96dbg.exe to choose the architecture interactively
Optionally compile the project yourself following the provided compiling guidex32\x32dbg.exe
Launches the debugger for 32-bit Windows executables
x64\x64dbg.exe
Launches the debugger for 64-bit Windows executables
x96dbg.exe
Registers shell extensions and allows architecture selection for debugging