bytehound
Memory profiler
A memory profiling tool that gathers allocation and deallocation data along with full stack traces to analyze memory leaks and fragmentation.
A memory profiler for Linux.
5k stars
59 watching
193 forks
Language: C
last commit: over 1 year ago
Linked from 1 awesome list
memory-profilermemory-profilingprofilerprofiling
Related projects:
Repository | Description | Stars |
---|---|---|
| A tool that analyzes memory allocation patterns in applications to identify performance issues. | 3,385 |
| Automates the process of remotely dumping RAM and creating volatility profiles on Linux clients. | 161 |
| A Linux kernel module designed to help analyze volatile memory without the limitations of traditional memory dumping tools. | 115 |
| An agent-based heap profiling tool for Java Virtual Machines | 395 |
| Automated profiling tool to analyze CPU and memory usage across entire infrastructure | 4,201 |
| A Ruby middleware for profiling rack applications to measure performance metrics | 3,744 |
| A tool to profile and analyze the performance of Java applications in real-time | 7,625 |
| A Java agent that inserts memory allocation counters into class bytecode to profile memory allocation | 220 |
| A tool that monitors and manages kernel activities, providing insights into system performance and resource utilization. | 2,573 |
| Tools for analyzing memory usage of Python programs | 4,403 |
| A Linux-based profiler that uses eBPF to profile system calls and CPU cycles in real-time, providing insights into application performance without requiring instrumentation or recompilation. | 2,529 |
| A memory profiling and leak finding tool for C/C++ applications across multiple platforms | 2,646 |
| A standalone native application profiler that helps developers identify performance bottlenecks in complex applications without modifying the target process. | 4,236 |
| A framework for collecting structured diagnostic information from Rust programs | 5,569 |
| An emulator-based tool to detect kernel memory disclosure vulnerabilities by tracking uninitialized memory in guest operating systems. | 297 |