dtrace -n 'syscall:::entry { @num pid,execname » = count(); }'
At work the functional test suite of our application used up quite a lot of RAM (over 500 megs). For a long time it was cheaper to buy the developers an extra gig of RAM than to spend time hunting down a possible memory leak, but finally curiosity overcame me and I started investigating.
a reverse engineering framework consisting of multiple extensible components