![A day with Ghidra. Reverse engineering, M9 in the list of… | by Siddharth Shivkumar | WriteaByte | Medium A day with Ghidra. Reverse engineering, M9 in the list of… | by Siddharth Shivkumar | WriteaByte | Medium](https://miro.medium.com/v2/resize:fit:1400/1*JGgaWnCUv_VSo1FB_ca4sw.png)
A day with Ghidra. Reverse engineering, M9 in the list of… | by Siddharth Shivkumar | WriteaByte | Medium
![Is there any way to make the decompiler show the string pointer instead of the memory address as a number? The disassembly shows the string just fine, so why can't the decompiler? : Is there any way to make the decompiler show the string pointer instead of the memory address as a number? The disassembly shows the string just fine, so why can't the decompiler? :](https://preview.redd.it/is-there-any-way-to-make-the-decompiler-show-the-string-v0-wup2lcgj8l9a1.png?width=640&crop=smart&auto=webp&s=654167babcc97987164a0f43fe18be4dbfe6666c)
Is there any way to make the decompiler show the string pointer instead of the memory address as a number? The disassembly shows the string just fine, so why can't the decompiler? :
![Differences between hex-editor and Ghidra and how to find strings - Reverse Engineering Stack Exchange Differences between hex-editor and Ghidra and how to find strings - Reverse Engineering Stack Exchange](https://i.stack.imgur.com/LQE4w.png)
Differences between hex-editor and Ghidra and how to find strings - Reverse Engineering Stack Exchange
![Differences between hex-editor and Ghidra and how to find strings - Reverse Engineering Stack Exchange Differences between hex-editor and Ghidra and how to find strings - Reverse Engineering Stack Exchange](https://i.stack.imgur.com/V2B1w.png)