3 Oct
2014
3 Oct
'14
4:38 p.m.
https://bugs.winehq.org/show_bug.cgi?id=37355 --- Comment #2 from Michael Müller <michael(a)fds-team.de> --- Created attachment 49677 --> https://bugs.winehq.org/attachment.cgi?id=49677 Hack to emulate mapping of process memory into ntoskrnl Hi, I just found my old hack to work around this problem. It uses ReadProcessMemory and WriteProcessMemory to emulate the mapping of the memory block. There was also a similar approach on the mailing list quite some time ago. Regards, Michael -- Do not reply to this email, post in Bugzilla using the above URL to reply. You are receiving this mail because: You are watching all bug changes.