Android-Kernel-RW is a custom Android kernel module and userland interface that enables stealthy, low-level read/write access to memory of any user-space process, operating entirely from kernel space. Designed for rooted environments, it allows memory read and write operations with minimal footprint and no interaction with userland APIs.
- Stealth Memory Access – Read and Write operations that are invisible to userland process
- Process-Specific Targeting – Target any process by Process IDentifier
- Secure IOCTL-based Interface – Kernel module communicates with userland securely
cd kernelmodule
make -C /path/to/kernel/source M=$(pwd) modulesMust be compiled using the same kernel config and toolchain as your device. The module is kernel-version specific.
insmod module.koCheck logs:
dmesgrmmod module.koTo download Android kernel sources for your device, visit the official repository:
Other sources based on device manufacturer:
- Include
driver.hppin your project:
#include "driver.hpp"- Run Example:
See
userlandmodule/main.cppfor a full demo of how to read/write memory from your userland program.
No need to implement ioctl calls – just use
Read<T>(),Write<T>().
- Kernel-Specific – Must be compiled for individual kernel seperately. Not portable.
- Root Required – Requires a rooted device to load kernel modules.
- No Auto-Start – Must load the kernel driver after reboot.
Note: This project is provided for educational and research purposes only.