@Secret Master @Anaraxes Continuing this side thread here to stay on topic.
The binary is stripped but it does contain symbol names in newer patches (don't know how that works exactly). It used to be even harder than it is now. But this is why I have to specify the breakpoint as an absolute address, not a line number, and I do have to reverse engineer the assembly and it's a huge effort. But once the call site is known, tracing it should be relatively easy.So Paradox left the debug info in the executable? I'd been wondering. It'd be an even more huge effort to reverse-engineer the assembly.
Last edited: