What are all the 12345678 strings supposed to represent?
The dll needs a pointer to a buffer, large enough to copy the string in.
The string can't allocate the buffer, as it would be ambiguous who's responsible for releasing it.
Ah. Gotcha. Thank you for the explanation on some of those Windows API functions.
I wanted to share my solution in case someone else needs it. It was far simpler than what I realized which is usually the case after taking a step back.
After getting the Process ID (PID), I did a lookup on the task manager using the System Exec.vi looking for that specific PID and it will return the image name which is the executable name the application uses. Just throw that into an array and extract the ImageName. The VI uses LV 2018.
I can't seem to drag your image to a blank block diagram. It always comes in as a image.
That's because the forum shrinks the image to save bandwidth. In the shrinking process, it removes the embedded VI section.
- Copy the image's link:/t5/image/serverpage/image-id/272987iD312656E0CA750CC/image-size/large?v=1.0&px=999
- Remove /image-size...: /t5/image/serverpage/image-id/272987iD312656E0CA750CC
- Save this image.
Now it should have the embedded VI.
Anyway, I showed all names, so it could be replicated as well 😉.