一个免费的,强大的,多用途的工具,帮助您监控系统资源,调试软件和检测恶意软件。有点像XueTr和ProcessExplore的合体,功能挺多,能够帮助调试bug,跟踪资源。进程管理工具。
A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware.
Project Website - Project Downloads
Windows 7 or higher, 32-bit or 64-bit.
- A detailed overview of system activity with highlighting.
- Graphs and statistics allow you quickly to track down resource hogs and runaway processes.
- Can't edit or delete a file? Discover which processes are using that file.
- See what programs have active network connections, and close them if necessary.
- Get real-time information on disk access.
- View detailed stack traces with kernel-mode, WOW64 and .NET support.
- Go beyond services.msc: create, edit and control services.
- Small, portable and no installation required.
- 100% Free Software (GPL v3)
- 突出显示系统活动的详细概述。
- 图表和统计数据允许您快速跟踪资源占用者和失控进程。
- 不能编辑或删除文件?发现哪些进程正在使用该文件。
- 查看哪些程序有活跃的网络连接,必要时关闭它们。
- 获取磁盘访问的实时信息。
- 查看内核模式,WOW64和。net支持的详细堆栈跟踪。
- 超越服务。创建、编辑和控制服务。
- 小巧,轻便,无需安装。
Requires Visual Studio (2019 or later).
Execute build_release.cmd
located in the build
directory to compile the project or load the ProcessHacker.sln
and Plugins.sln
solutions if you prefer building the project using Visual Studio.
You can download the free Visual Studio Community Edition to build the Process Hacker source code.
Please use the GitHub issue tracker for reporting problems or suggesting new features.
If you are running Process Hacker from a USB drive, you may want to save Process Hacker's settings there as well. To do this, create a blank file named "ProcessHacker.exe.settings.xml" in the same directory as ProcessHacker.exe. You can do this using Windows Explorer:
- Make sure "Hide extensions for known file types" is unticked in Tools > Folder options > View.
- Right-click in the folder and choose New > Text Document.
- Rename the file to ProcessHacker.exe.settings.xml (delete the ".txt" extension).
Plugins can be configured from Hacker > Plugins.
If you experience any crashes involving plugins, make sure they are up to date.
Disk and Network information provided by the ExtendedTools plugin is only available when running Process Hacker with administrative rights.
Process Hacker uses a kernel-mode driver, KProcessHacker, to assist with certain functionality. This includes:
- Capturing kernel-mode stack traces
- More efficiently enumerating process handles
- Retrieving names for file handles
- Retrieving names for EtwRegistration objects
- Setting handle attributes
Note that by default, KProcessHacker only allows connections from processes with administrative privileges (SeDebugPrivilege). To allow Process Hacker to show details for all processes when it is not running as administrator:
- In Registry Editor, navigate to: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\KProcessHacker3
- Under this key, create a key named Parameters if it does not exist.
- Create a DWORD value named SecurityLevel and set it to 2. If you are not using an official build, you may need to set it to 0 instead.
- Restart the KProcessHacker3 service (sc stop KProcessHacker3, sc start KProcessHacker3).