Wikimedia Commons


Debugging memory usage with kbmMW

Later versions of kbmMW contains more and more nice to have features for general logging, auditing, runtime exception handling with stack-trace and now also memory usage debugging.

These features are actually available for any application, even ones not using other parts of kbmMW.

I’ve already been writing some articles about the logging and auditing system in kbmMW which also covered exception handling with stack-trace, but latest addition is the ability to real time trace each and every memory allocation done by your application.

Why use kbmMW’s memory debugger, when for example FastMM have leak detection build in?

FastMM only tracks memory allocations done via the regular GetMem etc memory allocations. It does not track allocations made via any of the Virtual/Heap/Global/Local allocation methods available in Windows.

Further kbmMW’s debugger still works even if FastMMs leak detection is disabled, and provide features for logging memory use and allocations at any time in your application.

Starting out

You will need to add kbmMWDebugMemory to the uses clause of your application, and you will have to make sure that the following defines are set in your file:


Otherwise all memory debugging will be disabled.

If KBMMW_SUPPORT_DEBUGMEMORY is omitted, then no memory debugging functionality (including all functions/methods) are available.

If KBMMW_INSTALL_DEBUGMEMORY_HANDLERS is omitted, then the memory debugging system will not automatically install the hooks and handlers, and thus the functions may be available (see above), but no memory tracing is happening.

When both defines are set, adding kbmMWDebugMemory to your uses clause of your application or unit, will automatically install kbmMW’s memory debugging features and hooks.

To get the best out of it, you should also make sure your application is build with debug, stack-trace and an external TDS file alternatively a detailed MAP file. The produced *.tds or *.map file must be in the same directory as your executable when you run it if you want to do memory debugging outside the IDE.


kbmMW automatically hooks Borland type memory allocations, Microsoft Windows Virtualxxx, Globalxxx, Localxxx and Heapxxx allocation methods. It plays nicely with any 3rdparty memory manager including FastMM.

Each allocation and reallocation made, is assigned a unique incrementing 64 bit number by kbmMW. This number can be used for tracking all allocations made between two points in time, called checkpoints.

Basically a checkpoint is just an 64 bit number. This way you can check exactly what allocations have happened in subsets of your code, and even get a stack-trace to where the allocations took place.


kbmMW maintains statistics over allocated memory and allocation counts.

These can be obtained at any time like this:

  +' ('+inttostr(TkbmMWDebugMemory.LiveAllocationCountPerSec)+'/sec)';

  +' ('+inttostr(TkbmMWDebugMemory.LiveAllocationSizePerSec)+'/sec)';




LiveAllocationCount is the number of active, in use, memory allocations detected. It counts allocations of all types (Borland – object/string/memory, Local memory, Global memory, Virtual memory, Heap memory). Since for example FastMM will allocate large chunks of memory via typically VirtualAlloc, and hand out pieces of this memory to applications using GetMem (Borlands memory manager interface), you will see an imprecise count (and size), since the count will include both the VirtualAlloc made by FastMM, and the individual GetMem (etc) calls made by the application.

Thus the live values are comparable values, but not exact values. You can depend on them to show for example increasing use of memory (perhaps indicating a leak), but you cant depend directly on the exact absolute value, as some allocations are counted twice due to the above situation.


Detecting leaks at shutdown

What is a leak? It’s a resource that has been allocated, but which is never deallocated.

Some leaks are bad, some are not. The ones that are not bad, are leaks that are happening due to single, non repetitive allocations, typically made during startup of an application, which are never explicitly freed. In fact the RTL and VCL contains numerous such leaks.

Those leaks are not bad, because the operating system (Windows in this case) will automatically release all memory used by an application the moment the application shuts down.

The bad leaks are those that repeatedly allocates more memory, but never deallocates it again. These leaks will eventually make the application run out of memory space and/or make the system go extremely slow due to exhaust of physical RAM which results in paging. Paging is where currently less important memory segments are written to disk, to make room for currently more important memory segments, that are currently being allocated, or being read in from disk (page file).

It is normal for some paging happening on a system, but it is not normal if an application allocates as much memory as to slow all other processes significantly down, just due to paging happening.

A bad leak has occurred (repeatedly).

The only time to reasonably reliable to detect if those bad leaks has occurred, is at application shutdown time. Why? Because at that time you know that all (most) allocated memory should have been released by your applications destructors / FormClose events etc.

kbmMW makes this simple to check for. Some place, very early in your application’s startup cycle, put these lines:



Now you have defined where leak reports should be dumped, that you want an automatic leak report to be created on shutdown, and that you want leak detection to start immediately. In fact all that StartLeakChecking does, is to load any TDS/MAP debug information (for stack trace purpose) and then register a baseline checkpoint from which it will check that allocations has been freed. All allocations before this time will be ignored and thus all build in VCL/RTL leaks and all objects allocated for the TDS/MAP info.

You can actually see the baseline value by checking:


If you want the leak detection to include everything since the memory allocation hooks was installed. Set baseline to zero. Eg.


The checkpoint for last allocation made, can be obtained via:


Now when you run your application and then closes it again, kbmMW will produce a report of non freed allocations.

Default it will present an overview status on screen like this:

And output details to the designated file:

As you can see, the debugger is able to determine if its objects, strings or other types of memory that has been leaked, and gives you in the first section, statistics over how many instances of a particular class are leaked. In this case just one instance of a TkbmMWInnerThread. This one is a safe leak, that just exists because the kbmMW scheduler have a relaxed event thread running handling events. The memory debugger has registered a scheduled event for calculating allocations/sec.

The stack-trace may be more or less precise, depending on the amount of debug information compiled into your application (stack frames must be enabled), and depending on if you let Delphi generate an external TDS or MAP file which kbmMW’s stack trace functionality can use.

You can choose not to collect stack-trace for allocations. This will save some memory and CPU time, and will make your report less verbose. This can be done by adding the following line before the StartLeakChecking call:


Tracing allocations in specific situations

You may want to report all allocations made within a specific time interval, or between two locations in your code. You do this by using the checkpoint method to obtain a number at the two locations and then select what you want in your report. For example:

   FMyCP1,FMyCP2: TkbmMWDebugMemoryAllocationKey;
     <your interesting code>
     FMYCP2:= TkbmMWDebugMemory.Checkpoint;


procedure MyReport(ACP1,ACP2: TkbmMWDebugMemoryAllocationKey);

The above example will only report object instance allocations, and will report them via the kbmMW log system as debug log, without any stack-trace.



Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.