User Rating 0.0
Total Usage 2 times
FILE Empty
SIZE -
TYPE Unknown
Offset00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0FASCII Representation
Is this tool helpful?

Your feedback helps us improve.

About

This is not just a viewer; it is a forensic instrument designed for low-level analysis, data recovery, and reverse engineering. While standard text editors fail to render binary control characters and corrupt file structures, this tool visualizes the raw byte stream. It decouples the visual representation from the underlying data, allowing for the manipulation of executable headers, correction of corrupted archive bits, and inspection of compiled code.

The architecture relies on a Virtual DOM implementation. Browsers typically crash when rendering more than a few thousand DOM elements. Our engine calculates the viewport capability and only renders the exact slice of data visible to the user, effectively allowing the inspection of files sized in Gigabytes with zero performance penalty. The integrated Type Decoder eliminates manual calculation by simultaneously interpreting the selected memory address as 8, 16, 32, and 64-bit integers (signed/unsigned) and IEEE 754 floating-point numbers in both Little-Endian and Big-Endian formats.

hex editor binary analysis forensics reverse engineering file repair magic bytes

Formulas

When analyzing binary structures, the interpreter relies on the concept of Endianness - the order of bytes within a multi-byte word. For a 32-bit integer I composed of bytes b0b1b2b3:

Big Endian: I = b0224 + b1216 + b228 + b3
Little Endian: I = b3224 + b2216 + b128 + b0

To locate a specific byte address A given a row index r and column index c in a 16-byte width grid:

A = (r × 16) + c

Reference Data

File FormatExtensionMagic Bytes (Hex Signature)OffsetDescription
JPEG Image.jpgFF D8 FF E00Joint Photographic Experts Group start marker.
PNG Image.png89 50 4E 47 0D 0A 1A 0A0Portable Network Graphics with DOS/Unix line ending checks.
GIF Image.gif47 49 46 38 39 610Graphics Interchange Format 89a.
PDF Document.pdf25 50 44 46 2D0Adobe Portable Document Format.
ZIP Archive.zip50 4B 03 040PKZip Local File Header.
RAR Archive v5.rar52 61 72 21 1A 07 01 000Roshal Archive version 5.0+.
7-Zip Archive.7z37 7A BC AF 27 1C07-Zip compressed file.
GZIP.gz1F 8B0GNU Gzip compression.
Windows PE.exe4D 5A0"MZ" Header (Mark Zbikowski), common in DOS/Windows binaries.
ELF Binary.elf7F 45 4C 460Executable and Linkable Format (Linux/Unix).
Java Class.classCA FE BA BE0Java Bytecode (Cafe Babe).
Mach-O (64-bit).machoCF FA ED FE0macOS 64-bit executable.
MP3 ID3v2.mp349 44 330ID3v2 metadata container for audio.
FLAC Audio.flac66 4C 61 430Free Lossless Audio Codec.
WAV Audio.wav52 49 46 46 ... 57 41 56 450Resource Interchange File Format (RIFF) WAVE.
MP4 Video.mp400 00 00 18 66 74 79 700ISO Base Media File Header.
Matroska Video.mkv1A 45 DF A30EBML Header for Matroska.
WebP Image.webp52 49 46 46 ... 57 45 42 500Google WebP image format.
Photoshop.psd38 42 50 530Adobe Photoshop Document (8BPS).
SQLite DB.sqlite53 51 4C 69 74 65 20 66 6F 72 6D 61 74 20 33 000SQLite Format 3.
Bitcoin Block.datF9 BE B4 D90Bitcoin Mainnet Block Magic.
LUKS Volume.bin4C 55 4B 53 BA BE0Linux Unified Key Setup (Encrypted Partition).

Frequently Asked Questions

Endianness refers to the sequential order in which bytes are arranged into larger numerical values. Big-Endian stores the "most significant byte" (the biggest power of 2) at the smallest memory address (like reading left-to-right). Little-Endian stores the "least significant byte" first. Most Intel/AMD processors use Little-Endian, while network protocols typically use Big-Endian.
Yes. If you know the correct "Magic Bytes" for the file format (see the Reference Table), you can manually overwrite the corrupt bytes at offset 0x00. Once corrected, clicking "Download" will save the repaired file.
Yes. The search engine is hybrid: it supports ANSI text strings (e.g., 'copyright') and Hexadecimal patterns (e.g., 'FF D8 FF'). It scans the entire byte array in memory, not just the visible part.
The tool is limited only by your browser's allocated memory (RAM). In modern Chrome/Firefox environments on desktop, files up to 1GB-2GB can usually be loaded safely. The Virtual Scrolling ensures the UI never freezes, regardless of size.
To aid visual scanning, the editor dims null bytes (0x00) and highlights printable ASCII characters. This creates a "visual texture" that makes text blocks and empty padding areas instantly distinguishable from code or compressed data.