Note: To use this technique, the debugger and the process being debugged must be in the same security context. Also, note that you cannot use this technique on Windows Vista or later or with some earlier releases of Windows.
call "CBL_DEBUGBREAK"
Note: Make sure you include the .idy files for the application in the set of files that you deploy.
For example:
Notes:
Related Topics: