I'm using the infamous Blackbone library to map / inject another module into a different process and execute its code.
Usually to debug the injected module, i have to attach windbg's debugger to the hijacked process, scan loaded modules using .imgscan command and load symbols accordingly.
I was wondering if such thing is possible using good old visual studio. Within VS there is an option, symbols tab, to load all symbols for all loaded modules, but this doesn't achieve the same effect as .imgscan /l does. So i end up with an unresolved call stack(only memory addresses) and disassembly only.