Sometimes (don’t ask me why) when you are hacking some terminal server it happens that an administrator has disabled regedit.exe and reg.exe, but forgot about visual basic script (vbs). I know, I know everyone is all busy with powershell, but trust me sometimes vbs is the right script for the job. So I hacked together a quick script to view the registry which you can find on my github:
It should be pretty self-explanatory, but just in case here is some example usage:
C:\>cscript regview.vbs Microsoft (R) Windows Script Host Version 5.8 Copyright (C) Microsoft Corporation. All rights reserved.  help help - displays this help cd - change to that key back - go to parent/previous key ls - list current subkeys lsv - list current key values use - root key number to use 0 - HKEY_CLASSES_ROOT 1 - HKEY_CURRENT_USER 2 - HKEY_LOCAL_MACHINE 3 - HKEY_USERS 4 - HKEY_CURRENT_CONFIG  use key number: 1 [HKEY_CURRENT_USER\] cd software\vmware, inc. [HKEY_CURRENT_USER\software\vmware, inc.] ls VMware Tools [HKEY_CURRENT_USER\software\vmware, inc.] cd vmware tools [HKEY_CURRENT_USER\software\vmware, inc.\vmware tools] lsv [HKEY_CURRENT_USER\software\vmware, inc.\vmware tools] ls Hgfs Usability [HKEY_CURRENT_USER\software\vmware, inc.\vmware tools] cd hgfs usability [HKEY_CURRENT_USER\software\vmware, inc.\vmware tools\hgfs usability] lsv Entry Name: mappedDriveLetter Data Type: String Value: z [HKEY_CURRENT_USER\software\vmware, inc.\vmware tools\hgfs usability] back [HKEY_CURRENT_USER\software\vmware, inc.\vmware tools] back [HKEY_CURRENT_USER\software\vmware, inc.] exit
I know it lacks a search function, I’ll see if I get around to implement it any time soon. A script to change values is a whole other story though and something I don’t really need that often. If you encounter bugs, do fix them :)
One thought on “vbscript based interactive registry viewer”
MobaXterm mounts registry as a file system, you can easily navigate, grep, find, sed,awk it.