Visual DuxDebugger is a 64-bit debugger disassembler for Windows, especially useful when source code is unavailable.
The user interface is very intuitive so it makes very simple any task in reverse engineering, you can edit code, registers, and memory.
Visual DuxDebugger provides wide information about the process being debugged, showing all loaded modules with all exported functions, call stack, threads and much more.
The main difference with others debuggers is that Visual DuxDebugger can debug child-processes and multiple-processes.
Software Reverse Engineering is commonly used:
· As a learning tool to understand undocumented APIs.
· As a way to make new compatible products.
· For making software interoperate more effectively.
· To bridge different operating systems or databases.
· To analyze possible spyware / malware.
· To uncover and exploit vulnerabilities.
· To audit software.
· To fix complex bugs.
· For litigation support.
· As a learning tool to understand undocumented APIs.
· As a way to make new compatible products.
· For making software interoperate more effectively.
· To bridge different operating systems or databases.
· To analyze possible spyware / malware.
· To uncover and exploit vulnerabilities.
· To audit software.
· To fix complex bugs.
· For litigation support.
Source link and to access more info: http://duxcore.com/index.php/prod/visual-duxdebugger/overview