I've been using objdump
to look at assembly code in Linux ELF binaries.
Sometimes there is an indirect jump through a jump table that is stored in the rodata
(read-only data) section.
How to get objdump
or any other tool to show me the contents of this data section?
I could execute the program and examine the relevant addresses in the debugger, but I don't want to do that because it has to be done interactively.
The ideal answer will identify a tool that will not only show me the contents but will let me control the display format, much as od
does.