


Tutorial on how to operate byte streams/binary streams using the struct module in Python
Recently, I have been learning python network programming. When writing simple socket communication code, I encountered the use of the struct module. At the time, I was not sure what it did and what it does. Later, I checked the relevant information and roughly understood it. This article The article mainly introduces the operation of byte stream/binary stream by the struct module in Python. Friends in need can refer to it.
Preface
Recently using Python to parse the MNIST data set in IDX file format, I need to read the binary file, in which I use is the struct module. I checked a lot of tutorials on the Internet and they were all very good, but not very friendly to novices, so I reorganized some notes to help you get started quickly.
Note: The following four nouns in the tutorial are synonymous: binary stream, binary array, byte stream, byte array
Get started quickly
In the struct module, convert an integer number, floating point number or character stream (character array) into a byte stream (word section array), you need to use the format string fmt to tell the struct module what type of object to be converted, for example, an integer number is 'i', a floating point number is 'f', and an ascii code character is 's'.
def demo1(): # 使用bin_buf = struct.pack(fmt, buf)将buf为二进制数组bin_buf # 使用buf = struct.unpack(fmt, bin_buf)将bin_buf二进制数组反转换回buf # 整型数 -> 二进制流 buf1 = 256 bin_buf1 = struct.pack('i', buf1) # 'i'代表'integer' ret1 = struct.unpack('i', bin_buf1) print bin_buf1, ' <====> ', ret1 # 浮点数 -> 二进制流 buf2 = 3.1415 bin_buf2 = struct.pack('d', buf2) # 'd'代表'double' ret2 = struct.unpack('d', bin_buf2) print bin_buf2, ' <====> ', ret2 # 字符串 -> 二进制流 buf3 = 'Hello World' bin_buf3 = struct.pack('11s', buf3) # '11s'代表长度为11的'string'字符数组 ret3 = struct.unpack('11s', bin_buf3) print bin_buf3, ' <====> ', ret3 # 结构体 -> 二进制流 # 假设有一个结构体 # struct header { # int buf1; # double buf2; # char buf3[11]; # } bin_buf_all = struct.pack('id11s', buf1, buf2, buf3) ret_all = struct.unpack('id11s', bin_buf_all) print bin_buf_all, ' <====> ', ret_all
The output results are as follows:
demo1 output results
Detailed explanation of struct module
Main functions
The three most important functions in the struct module arepack()
, unpack()
, calcsize()
# 按照给定的格式化字符串,把数据封装成字符串(实际上是类似于c结构体的字节流) string = struct.pack(fmt, v1, v2, ...) # 按照给定的格式(fmt)解析字节流string,返回解析出来的tuple tuple = unpack(fmt, string) # 计算给定的格式(fmt)占用多少字节的内存 offset = calcsize(fmt)
Format string in struct
The supported formats in struct are as follows:
C Type | Python | Number of bytes | |
---|---|---|---|
pad byte | no value | 1 | |
char | string of length 1 | 1 | |
signed char | integer | 1 | |
unsigned char | integer | 1 | |
_Bool | bool | 1 | |
short | integer | 2 | |
unsigned short | integer | 2 | |
int | integer | 4 | |
unsigned int | integer or lon | 4 | |
long | integer | 4 | |
unsigned long | long | 4 | |
long long | long | 8 | |
unsigned long long | long | 8 | |
float | float | 4 | |
double | float | 8 | |
char[] | string | 1 | ##p |
string | 1 | P | |
long |
Note 2: There can be a number before each format to indicate the individual Number
Note 3: The s format represents a string of a certain length, 4s represents a string of length 4, but p represents a pascal string
Note 4 :P is used to convert a pointer, its length is related to the machine word length
Note 5: The last one can be used to represent the pointer type, occupying 4 bytes
In order to exchange data with the structure in c, it is also necessary to consider that some c or c++ compilers use byte alignment, usually 32-bit systems with 4 bytes, so the struct is converted according to the local machine byte order .You can use the first character in the format to change the alignment. It is defined as follows:
Size and alignment | ||
---|---|---|
native Make up enough 4 bytes | = | |
standard according to the original number of bytes | ||
standard According to the original number of bytes | > | |
standard According to the original number of bytes Number | ##! | network (= big-endian) |
The method of use is to put it in the first position of fmt, just like '@5s6sif' |

TomergelistsinPython,youcanusethe operator,extendmethod,listcomprehension,oritertools.chain,eachwithspecificadvantages:1)The operatorissimplebutlessefficientforlargelists;2)extendismemory-efficientbutmodifiestheoriginallist;3)listcomprehensionoffersf

In Python 3, two lists can be connected through a variety of methods: 1) Use operator, which is suitable for small lists, but is inefficient for large lists; 2) Use extend method, which is suitable for large lists, with high memory efficiency, but will modify the original list; 3) Use * operator, which is suitable for merging multiple lists, without modifying the original list; 4) Use itertools.chain, which is suitable for large data sets, with high memory efficiency.

Using the join() method is the most efficient way to connect strings from lists in Python. 1) Use the join() method to be efficient and easy to read. 2) The cycle uses operators inefficiently for large lists. 3) The combination of list comprehension and join() is suitable for scenarios that require conversion. 4) The reduce() method is suitable for other types of reductions, but is inefficient for string concatenation. The complete sentence ends.

PythonexecutionistheprocessoftransformingPythoncodeintoexecutableinstructions.1)Theinterpreterreadsthecode,convertingitintobytecode,whichthePythonVirtualMachine(PVM)executes.2)TheGlobalInterpreterLock(GIL)managesthreadexecution,potentiallylimitingmul

Key features of Python include: 1. The syntax is concise and easy to understand, suitable for beginners; 2. Dynamic type system, improving development speed; 3. Rich standard library, supporting multiple tasks; 4. Strong community and ecosystem, providing extensive support; 5. Interpretation, suitable for scripting and rapid prototyping; 6. Multi-paradigm support, suitable for various programming styles.

Python is an interpreted language, but it also includes the compilation process. 1) Python code is first compiled into bytecode. 2) Bytecode is interpreted and executed by Python virtual machine. 3) This hybrid mechanism makes Python both flexible and efficient, but not as fast as a fully compiled language.

Useaforloopwheniteratingoverasequenceorforaspecificnumberoftimes;useawhileloopwhencontinuinguntilaconditionismet.Forloopsareidealforknownsequences,whilewhileloopssuitsituationswithundeterminediterations.

Pythonloopscanleadtoerrorslikeinfiniteloops,modifyinglistsduringiteration,off-by-oneerrors,zero-indexingissues,andnestedloopinefficiencies.Toavoidthese:1)Use'i


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SublimeText3 Linux new version
SublimeText3 Linux latest version

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

Notepad++7.3.1
Easy-to-use and free code editor
