Hopper is a reverse engineering tool for OS X and Linux, that lets you disassemble, decompile and debug your 32/64bits Intel Mac, Linux, Windows and iOS executables!
Hopper is perfectly adapted to the environment. The OS X version makes full use of the Cocoa framework, and the Linux version makes use of Qt 5.
Hopper analyzes function's prologues to extract procedural information such as basic blocks and local variables.
Extensible (OS X)
With the Hopper SDK, you'll be able to extend Hopper's features, and even write your own file format and CPU support.
Control Flow Graph
Once a procedure has been detected, Hopper displays a graphical representation of the control flow graph. You can even export a PDF.
Most of the Hopper features can be invoked from Python scripts, giving you the ability to transform a binary in any way you want.
Hopper can use LLDB or GDB, which lets you debug and analyze the binary in a dynamic way (Mac Intel only).
Even if Hopper can disassemble any kind of Intel executable, it does not forget its main platform. Hopper is specialized in retrieving Objective-C information in the files you analyze, like selectors, strings and messages sent.
Based on an advanced understanding of the executable Hopper can present a pseudo-code representation of the procedures found in an executable.
Requires OS X 10.7 or higher.
Always check out my other posts, you find interchangable mirror if you want!
but Don't report my post, Enjoy!