Menu

X86 Disassembly | Introduction To

Suddenly, you hit a line that says CMP EAX, 20 followed by JNE 0x401050 . The machine is checking if your total is 20.

This is your first "artifact." You realize the machine is the number 5 into the EAX slot. The next line says ADD EAX, 10 . Now you know the machine is calculating 3. The Locked Door (Control Flow) Introduction to x86 disassembly

To understand how it works, you have to look at the "gears" while they move. In the world of computers, those gears are and Instructions . 1. The Workbench (The CPU & Registers) Suddenly, you hit a line that says CMP

Are you interested in or exploit development ? The next line says ADD EAX, 10

Should I explain the difference between and x64 (64-bit) ?

By the end of your "excavation," you aren't just looking at random numbers anymore. You can see the logic, the loops, and the secrets. You’ve successfully reverse-engineered the machine’s intent without ever seeing the original blueprints. If you’d like to dive deeper, let me know:

You look through a digital microscope (a like IDA Pro or Ghidra). You see a sequence of hex numbers: B8 05 00 00 00 . The disassembler translates this into: MOV EAX, 5