Lightweight IDA plugin for dumping in-memory decrypted binaries (PE, ELF) or arbitrary raw data to disk.
Save the plugin file (e.g. MemDumpX.py) into your IDA plugins directory:
-
Windows example:
C:\Program Files\IDA\plugins\ -
Linux/macOS example:
/opt/ida/plugins/
The plugin registers as MemDumpX with the default hotkey Ctrl-Alt-D.
- Open a database and navigate to the start address (or copy the VA where the file image begins).
- Press the hotkey (Ctrl-Alt-D) or run the plugin from the Plugins menu.
- Enter the start address (hex) when prompted (e.g. 0x10000000).
- Choose dump mode(PE, ELF, RAW).
- Save the file to disk.