Hi,
We need to profile code that was obfuscated by ProGuard. It is very tedious to look up the obfuscated class and method names in the mapping file each time.
Now, we are considering writing a plugin that performs the deobfuscation directly in the Mission Control application. Are there any extension points we could leverage or will the whole project be a wild goose chase?
Thanks,
Stefan