Share via


Check for Memory Overwrite

Overview

If you get an access violation on a call to a heap manipulation function, it is possible that your program has corrupted the heap. A common symptom of this situation would be:

Access Violation in _searchseg

The _heapchk function is available in both debug and release builds (Windows NT only) for verifying the integrity of the run-time library heap. _heapchk can be used in much the same way as the AfxCheckMemory function to isolate a heap overwrite, for example:

if(_heapchk()!=_HEAPOK)
   DebugBreak();

If this function ever fails, then it is a matter of isolating at which point the heap got corrupted.