Last Updated: May 31, 2018
· danialgoodwin
Vest 500x500

Android: How To Decode ProGuard’s Obfuscated Stack Trace

This is for Android or Java developers who use ProGuard in their apps and need to debug encrypted stack traces. You can do this with either CLI (Command Line Interface) or GUI (Graphical User Interface).


  1. Open <android-sdk>/tools/proguard/bin/proguardgui.bat
  2. Select the “ReTrace” option on the left column.
  3. Add your mapping file and obfuscated stack trace.
  4. Click “ReTrace!”


  1. Put your obfuscated stack trace in a text file (ex: stacktrace.txt).
  2. The easiest way to do the next step is to copy your mapping.txt and stacktrace.txt into <androidsdkroot>/tools/proguard/bin.
  3. If you are on Windows, run the following command in the same directory as the files: retrace.bat -verbose mapping.txt stacktrace.txt > out.txt
  4. out.txt will have the stack trace de-obfuscated.

*For Linux/Mac users, replace "retrace.bat" with "".

Now you can debug much easier and faster than before!

More detailed and advanced notes (and pictures):

  • Danial Goodwin -

Computer Engineer | Co-Founder and Lead Developer of Simply Advanced, LLC

Say Thanks

2 Responses
Add your response


Link gives 404. And, In mac there is no proguardgui.bat file available instead is there then want to know how to get GUI using this

over 1 year ago ·

ProGuard’s mapping.txt is from the same version of your compiled version. Mapping.txt gets replaced and changes every time you export your APK from Eclipse. A good idea is to copy and store all of your mapping.txt files in a safe location that won’t get rewritten. Also, adding your app’s version number at the end will make your process a lot simpler also, i.e., “mapping_v3p0p8.txt”.

7 days ago ·