For users with debugging experience, this freeware Microsoft tool dumps the memory image of a select process on your command. After a quick install, User Mode Process Dumper's interface is easily found in the Control Panel. The extent of this program's basic interface is a tab for the list of watched processes and one for the program's hot keys. There aren't any tooltips or a Help file, but experienced users won't need the missing manual.
Capturing the memory image is based on easily configured rules. An automatic image dump is triggered by any or all of a short list of exception codes, at process exit, or after a precise wait. The app uses a default set of rules, or the user can quickly choose custom rules for each process from a short dialog. The second tab makes quick work of setting hot keys to trigger image dumps for any or all processes. Setting the program to dump memory images for hung Win32 GUI apps takes just the click of a radio button.
The memory images are easily read by most debugging tools. User Mode Process Dumper is a simple and effective tool for debugging any process.
User Mode Process Dumper (userdump) dumps any running Win32 processes memory image (including system processes such as csrss.exe, winlogon.exe, services.exe, etc) on the fly, without attaching a debugger, or terminating target processes. Generated dump file can be analyzed or debugged by using the standard debugging tools.