On Wed, Feb 25, 2015 at 7:52 AM, Hick Gunter <hick at scigames.at> wrote:
> And the "explain" output will contain virtual table opcodes > I use this technique to discover which tables and virtual tables a view accesses (instead of trying to parse the query.) I execute "explain select rowid from $viewname", and look for TableLock and VOpen "opcode"s, and look at the "p4" column for table names and for virtual tables, p4 contains vtab:module-hex-address:vtable-hex-address, where module-hex-address is your sqlite3_module* in hexadecimal, and vtable-address your sqlite3_vtab*, which typically you code can translate to the vtable names. --DD

