Last Updated: January 24, 2018
· danialgoodwin
Vest 500x500

Android: How To Decode ProGuard’s Obfuscated Stack Trace

This is for Android or Java developers who use ProGuard in their apps and need to debug encrypted stack traces. You can do this with either CLI (Command Line Interface) or GUI (Graphical User Interface).


  1. Open <android-sdk>/tools/proguard/bin/proguardgui.bat
  2. Select the “ReTrace” option on the left column.
  3. Add your mapping file and obfuscated stack trace.
  4. Click “ReTrace!”


  1. Put your obfuscated stack trace in a text file (ex: stacktrace.txt).
  2. The easiest way to do the next step is to copy your mapping.txt and stacktrace.txt into <androidsdkroot>/tools/proguard/bin.
  3. If you are on Windows, run the following command in the same directory as the files: retrace.bat -verbose mapping.txt stacktrace.txt > out.txt
  4. out.txt will have the stack trace de-obfuscated.

*For Linux/Mac users, replace "retrace.bat" with "".

Now you can debug much easier and faster than before!

More detailed and advanced notes (and pictures):

  • Danial Goodwin -

Computer Engineer | Co-Founder and Lead Developer of Simply Advanced, LLC

Say Thanks

1 Response
Add your response


Link gives 404. And, In mac there is no proguardgui.bat file available instead is there then want to know how to get GUI using this

over 1 year ago ·