Clone this repo:
  1. 2b95a42 i#2039: Opts out of auto-predication (#2042) by Toshi Piazza · 3 weeks ago master
  2. f513943 i#1741 wrap_wincrt: mark test as flaky (#2037) by Derek Bruening · 3 weeks ago
  3. a83d8f3 i#111 x64: enable 64-bit uninit read checking as default for Linux (#2036) by Derek Bruening · 3 weeks ago release_2.0.0_rc1
  4. eb6f080 i#111 x64: update DR to fix immed encoding bug by Derek Bruening · 3 weeks ago
  5. c16b7cc i#111 x64: fixes for tests/registers and tests/varstack (#2035) by Derek Bruening · 3 weeks ago

Dr. Memory: the memory debugger

About Dr. Memory

Dr. Memory is a memory monitoring tool capable of identifying memory-related programming errors such as accesses of uninitialized memory, accesses to unaddressable memory (including outside of allocated heap units and heap underflow and overflow), accesses to freed memory, double frees, memory leaks, and (on Windows) handle leaks, GDI API usage errors, and accesses to un-reserved thread local storage slots.

Dr. Memory operates on unmodified application binaries running on Windows, Linux, Mac, or Android on commodity IA-32, AMD64, and ARM hardware.

Dr. Memory is released under an LGPL license and binary packages are available for download.

Dr. Memory is built on the DynamoRIO dynamic instrumentation tool plaform.

DynamoRIO logo

Dr. Memory Performance

Dr. Memory is faster than comparable tools, including Valgrind, as shown in our CGO 2011 paper Practical Memory Checking with Dr. Memory, where we compare the two tools on Linux on the SPECCPU 2006 benchmark suite:

Performance chart

(Valgrind is unable to run 434.zeusmp and 447.dealII).


Documentation is included in the release package. We also maintain a copy for online browsing.

System call tracer for Windows

The Dr. Memory package includes an “strace for Windows” tool called drstrace.

Obtaining help

Dr. Memory has its own discussion list.

To report a bug, use the issue tracker.

See also the Dr. Memory home page: