I have an executable ELF file e.g. aaa
. This executable file uses its library e.g. ../bin/libaaa.so
. When I debug r2 -d aaa
I see some call functions from the library libaaa.so
e.g. sym.imp.AAAfunc1
at 0x44651.
When I reach that call, I can only step over it. How can I deep dive into libaaa.so
file to debug that function contents?
I am new to radare2, and if some other tools can do this I can switch to that