HeapHero makes heap dump analysis simple and effective - even for advanced memory issues. Here's a step-by-step example of a typical workflow in HeapHero:
1. Upload Your Heap Dump: Start by uploading your Java or Android heap dump file directly to the HeapHero web tool. If automating, use the
REST API to submit dumps programmatically. HeapHero will parse the heap dump and display a comprehensive, interactive report.
2. Review ML-Based Problem Detection:HeapHero uses built-in machine learning to scan your heap dump for common issues like memory leaks, duplicate objects, inefficient data structures, and more. These issues are reported right at the top of your report. Just click any of them to get a closer look: you'll see which classes or objects are involved, how much memory they're using, and what keeps them alive. This will point you to the memory leak origination source.
3. Take a closer look at the Dominator Tree: Next go to the
Dominator Tree section, which is the most important section in the report. In this section you will see which objects are holding on to the most memory (retained size). Always objects which are holding most of memory are responsible for memory leak. Thus investigate the top nodes in this section. Use the
Incoming and Outgoing References to identify who is keeping these objects alive and what objects contain which is causing the memory leak.
4. Use Specialized Views:Dominator Tree should be able to resolve most of the problems. For certain rare special problems you need to use following special views like
'Class Histogram' for a sorted breakdown of object counts by class. If a particular class is creating too many instances, this section will be helpful to spot it,
'OQL' (Object Query Language) to query the objects/classes in the heap dump
5. Share and Collaborate: Once your report is ready, you can generate a secure, shareable link for your teammates. And if you're working in a security-sensitive environment, HeapHero also offers on-premise deployments, so your data never leaves your firewall.