Techniques for monitoring memory accesses for computer programs are
provided. A user can instruct a computer program to have one of more of
its processes monitor memory accesses to a memory region. As memory
accesses to the memory region occur, a log can be created that includes
information concerning the memory accesses. The log can be analyzed in
order to debug memory access bugs. Additionally, new processes can be
spawned that monitor memory accesses in a way that is similar to existing
processes.