https://bugs.winehq.org/show_bug.cgi?id=37355
--- Comment #2 from Michael Müller michael@fds-team.de --- Created attachment 49677 --> https://bugs.winehq.org/attachment.cgi?id=49677 Hack to emulate mapping of process memory into ntoskrnl
Hi,
I just found my old hack to work around this problem. It uses ReadProcessMemory and WriteProcessMemory to emulate the mapping of the memory block. There was also a similar approach on the mailing list quite some time ago.
Regards, Michael