hydrovim

Code Executor

An extension of Neovim that executes Python code within the editor and displays its output.

➡️ Run python code inside Neovim

GitHub

79 stars
4 watching
2 forks
Language: Vim Script
last commit: over 1 year ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
samharju/yeet.nvim A plugin for running shell commands in terminal buffers or tmux panes. 96
gavincyi/jupyterlab-executor An extension for JupyterLab that allows users to execute scripts from the file browser 15
emacsorphanage/quickrun An Emacs extension that enables quick execution of scripts and programs in various programming languages 479
oguimbal/hyvm Software that enables arbitrary code execution on the Ethereum Virtual Machine (EVM) 252
nethermindeth/cairo-vm-go An implementation of a virtual machine for executing Cairo bytecode written in Go. 82
risechain/pevm An EVM execution engine designed to accelerate blockchain throughput through parallel processing 230
bashup/jqmd A tool for writing and executing shell scripts with embedded jq code and data structures, designed to facilitate complex data manipulation. 42
mandyydnam/robo_app An application to manage and execute Robot Framework test cases from a file system 16
nvimtools/hydra.nvim A Neovim extension that allows users to create custom submodes and menus with a flexible keybinding system 153
gballet/windtrap A tool for executing and debugging web assembly code written in Elixir 19
mistricky/codesnap.nvim A Neovim plugin that generates code snapshots with customizable features and formatting options. 635
aymenfurter/microagents A system of self-improving agents that can dynamically generate and edit code to perform tasks. 742
ivanov/vim-ipython A plugin that integrates Python code execution and object introspection between Vim and IPython. 1,038
cshuaimin/ssr.nvim An extension plugin for Neovim that allows structural search and replace operations on code structures. 933
n00py/hwacha A tool to execute payloads on Unix-like systems by exploiting common weaknesses in password authentication mechanisms. 105