TFT

Binary File Viewer & Editor

View and edit files at the binary level. This online hex editor lets you inspect and modify the raw bytes of any file. Useful for reverse engineering, data recovery, and low-level debugging.

About Binary File Viewer

This hex editor allows you to view and edit any file at the byte level. Click on any byte to edit it. Use the search function to find text patterns. Changes are made in memory - download the file to save your edits.

How It Works

This binary file viewer and hex editor displays any file's raw byte content. It shows offset addresses, hexadecimal values, and ASCII representation side by side. You can search for patterns, edit individual bytes, and save modified files.

The viewing process:

  1. Upload file: Any file type loads into memory as a byte array.
  2. Display hex dump: Bytes are shown in rows with offset addresses (0x00000000, 0x00000010, etc.).
  3. Show ASCII preview: Printable characters (32-126) display alongside hex values; non-printable show as dots.
  4. Enable editing: Click any byte to modify its value in hex, binary, decimal, or ASCII format.

Each row shows 16 bytes by default. The left column is the offset (position in file), the middle is hex values, and the right is ASCII interpretation. This triptych view is standard in hex editors because it lets you correlate raw bytes with readable text.

When You'd Actually Use This

Reverse Engineering

Inspect executable files, understand file formats, and analyze binary protocols.

File Recovery & Repair

Fix corrupted files by examining and editing raw bytes directly.

Malware Analysis

Examine suspicious files for embedded strings, signatures, and hidden data.

Save Game Editing

Modify game save files by finding and changing specific byte values.

Embedded Systems Debugging

Analyze firmware dumps, memory captures, and device communication logs.

CTF & Security Challenges

Find hidden flags, steganography, and encoded messages in binary files.

What to Know Before Using

Editing can corrupt files

Changing the wrong byte can break file structure. Always work on a copy. Understand the file format before making changes.

Hex is the standard view

Hexadecimal is used because each byte (0-255) maps to exactly 2 hex digits (00-FF). More compact than binary, more precise than decimal.

Offsets are zero-based

Offset 0x00000000 is the first byte. Offset 0x00000010 (16 in decimal) is the 17th byte. This matches programming array indexing.

ASCII view shows printable chars only

Bytes 32-126 display as characters. Others show as dots. Text files show readable content; binary files show mostly dots.

Changes are in-memory until download

Edits don't modify the original file. You must download the edited version. This protects against accidental corruption.

Common Questions

What is a hex editor used for?

Viewing and editing files at the byte level. Useful for reverse engineering, file format analysis, data recovery, malware analysis, and understanding how data is stored.

Why do some bytes show as dots?

Only bytes 32-126 are printable ASCII characters. Other values (control characters, high bytes) aren't displayable, so they show as dots for readability.

What does the offset column mean?

It's the byte position in the file. 0x00000000 = byte 0 (first byte). 0x00000010 = byte 16. Each row advances by 0x10 (16 bytes) with default settings.

Can I edit any file type?

Yes — images, executables, documents, anything. But understand the format first. Random edits to structured files (like JPEGs or PDFs) will likely corrupt them.

How do I find text in a binary file?

Use the search function. It looks for byte sequences matching your text. Works great for finding strings in executables or hidden messages in files.

What's the difference between hex and binary view?

Same data, different representation. Hex shows each byte as 2 hex digits (00-FF). Binary shows 8 bits (00000000-11111111). Hex is more compact and readable.

Why would I edit a file in hex?

Some changes can't be made with normal editors — fixing corrupted headers, removing DRM, modifying game saves, patching executables, or analyzing malware behavior.

Is this safe for analyzing malware?

Viewing is safe — the file doesn't execute. But don't download edited malware back to your system. Use a VM for analysis. This tool is for inspection, not execution.