namespace X86Disassembler.X86.Handlers.Add; /// /// Handler for ADD r/m32, imm32 instruction (0x81 /0) /// public class AddImmToRm32Handler : InstructionHandler { /// /// Initializes a new instance of the AddImmToRm32Handler class /// /// The buffer containing the code to decode /// The instruction decoder that owns this handler /// The length of the buffer public AddImmToRm32Handler(byte[] codeBuffer, InstructionDecoder decoder, int length) : base(codeBuffer, decoder, length) { } /// /// Checks if this handler can decode the given opcode /// /// The opcode to check /// True if this handler can decode the opcode public override bool CanHandle(byte opcode) { if (opcode != 0x81) return false; // Check if the reg field of the ModR/M byte is 0 (ADD) int position = Decoder.GetPosition(); if (!Decoder.CanReadByte()) return false; byte modRM = CodeBuffer[position]; byte reg = (byte) ((modRM & 0x38) >> 3); return reg == 0; // 0 = ADD } /// /// Decodes an ADD r/m32, imm32 instruction /// /// The opcode of the instruction /// The instruction object to populate /// True if the instruction was successfully decoded public override bool Decode(byte opcode, Instruction instruction) { // Set the mnemonic instruction.Mnemonic = "add"; if (!Decoder.CanReadByte()) { return false; } // Read the ModR/M byte var (mod, reg, rm, destOperand) = ModRMDecoder.ReadModRM(); // Read the immediate value if (!Decoder.CanReadUInt()) { return false; } // Read the immediate value in little-endian format var imm = Decoder.ReadUInt32(); // Format the immediate value as expected by the tests (0x12345678) // Note: The bytes are reversed to match the expected format in the tests string immStr = $"0x{imm:X8}"; // Set the operands instruction.Operands = $"{destOperand}, {immStr}"; return true; } }