Thank you for using VProbes! The "VProbes Programming Reference" is a bit outdated, and we are currently working on a new, updated version.
Basically, the syntax for guest probes has changed. If you replace GUEST_WRITE with GUEST:WRITE, your script should load.
Regarding your second question, the CPU provides facilities to intercept CR3 writes made by the guest, but the same is not true for general-purpose registers, making it hard to implement what you suggest.
Just out of curiosity, what are you using VProbes for?
When will the "vProbes Programming Reference" be updated?
Does vProbes works on ESXi 5.5 as well?
Our expectation is to have the new User Guide uploaded to the community forum webpage in approximately 2 months.
VProbes is not supported on ESXi.
Thanks for the reply.
Are there any plans to extend VProbes to ESXi? Or are there any alternatives to monitor the behavior of processes in VMs running in ESXi servers?
It seems like VMware only allow vshield partners to have access to APIs for vm introspection in ESXi...
Is this true?
Look forward to the new guide!
Is there a new User Guide for Vprobes available?