09-11-2020 02:13 AM - edited 09-11-2020 02:15 AM
Here's a VI download as well... LV18.
EDIT: Saved back to LV11 as well...
09-11-2020 09:40 AM
What are all the 12345678 strings supposed to represent?
09-11-2020 09:47 AM
@Eric1977 wrote:
What are all the 12345678 strings supposed to represent?
A buffer.
The dll needs a pointer to a buffer, large enough to copy the string in.
The string can't allocate the buffer, as it would be ambiguous who's responsible for releasing it.
09-15-2020 07:21 AM - edited 09-15-2020 07:22 AM
Ah. Gotcha. Thank you for the explanation on some of those Windows API functions.
I wanted to share my solution in case someone else needs it. It was far simpler than what I realized which is usually the case after taking a step back.
After getting the Process ID (PID), I did a lookup on the task manager using the System Exec.vi looking for that specific PID and it will return the image name which is the executable name the application uses. Just throw that into an array and extract the ImageName. The VI uses LV 2018.
09-15-2020 07:28 AM
Hi,
wiebe@CARYA wrote:
@Eric1977 wrote:
I can't seem to drag your image to a blank block diagram. It always comes in as a image.
That's because the forum shrinks the image to save bandwidth. In the shrinking process, it removes the embedded VI section.
- Copy the image's link:/t5/image/serverpage/image-id/272987iD312656E0CA750CC/image-size/large?v=1.0&px=999
- Remove /image-size...: /t5/image/serverpage/image-id/272987iD312656E0CA750CC
- Save this image.
Now it should have the embedded VI.
Anyway, I showed all names, so it could be replicated as well 😉.
Or: