Docs:
  README -- this file

Reader:
  dom0cut_x86_32.py -- extract dom0, domU, xen image (for x86_32, x86_32pae)
  dumpread.py -- dump read by address command line utility

Libs:
  Arch.py -- architecture information class
  CoreDump.py -- Core file base class
  ElfCore.py -- ELF Core Format Reader
  ElfPrstatus.py -- ELF prstatus structure class
  PageTable.py -- pagetable class for dump file (x86_32 non-PAE)
  Register.py -- Register class
  SymbolTable.py -- symbol table dictionary to analyse dump (parse 'nm -s' output)
  XenContext.py -- Xen Core Format CPU context class
  XenCore.py -- Xen Core Format Reader/Writer
  XenImage.py -- treat xen whole machine image
  debug_info.py -- parse 'readelf -wi' output for structure's member offset 
usage: dom0cut_x86_32.py [options]

options:
  -h, --help            show this help message and exit
  -oOUTDUMPNAME, --outdump=OUTDUMPNAME
                        output dump file for output
  -dDUMPNAME, --xendump=DUMPNAME
                        xen dump file for input
  --target=TARGET       extract target(domain id in decimal number or "x" for
                        xen)
  -xXENSYMS, --xensyms=XENSYMS
                        xen binary with symbols
  -aARCH, --arch=ARCH   architecture ('x86_32' or 'x86_32pae')
  -tFILETYPE, --type=FILETYPE
                        output file type("xen" or "elf")
  -f, --force           overwrite output file
  -l, --list-domain     print domain list
