Leaky can help you track down memory leaks and some kinds of memory corruption. It also has entry pointers for logging addref / release calls. The key thing that leaky does is this: it logs all calls to malloc / free / realloc / new / delete into a log file. The logging data includes information about size and address, as well as the call stack of the operation. The leaky program then can translate the call stack data from addresses into symbols and then dump the data out.