Skip to content

Commit 64c7f50

Browse files
authored
Update README.md
1 parent f94ec9d commit 64c7f50

File tree

1 file changed

+10
-7
lines changed

1 file changed

+10
-7
lines changed

README.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -20,13 +20,16 @@ This tool solves that by **capturing runtime method and class execution using ET
2020

2121
## ⚙️ How It Works
2222

23-
1. On launch, the tool lists all running .NET processes.
24-
2. The user selects the target process.
25-
3. Click **Proceed** → The tool waits for the process to be restarted.
26-
4. Once restarted, the tool begins capturing runtime events.
27-
5. The user performs the activity that triggers the business transaction.
28-
6. Click **Stop** → The tool processes captured data.
29-
7. The tool displays:
23+
1. Download Dotnet POCO Detector zip file from the github.
24+
2. Then extract it to folder.
25+
3. Run Dotnet **POCO Detector.exe** as administrator.
26+
4. On launch, the tool lists all running .NET processes.
27+
5. The user selects the target process.
28+
6. Click **Proceed** → The tool waits for the process to be restarted.
29+
7. Once restarted, the tool begins capturing runtime events.
30+
8. The user performs the activity that triggers the business transaction.
31+
9. Click **Stop** → The tool processes captured data.
32+
10. The tool displays:
3033
- Classes and methods invoked
3134
- Call stacks (if available)
3235
- Rows with call stack = highlighted in green

0 commit comments

Comments
 (0)