--------------------------------------------------------------------------------
DumpXDT can dump GDT, IDT, control and debug registers of the current CPU.

NT: You must be administrator.
2K: EnforceWriteProtection can be TRUE.

Usage: DumpXDT [G]<D|R>

G  .. estimate physical address if it can't be "calculated" (usable in NT
      with 3/1GB address space split).
D  .. print GDT and IDT.
R  .. print GDT, IDT, control and debug registers (HAZARD!!!). Uses illegal
      (driverless) method of going ring-0.
--------------------------------------------------------------------------------
Legend:
0  .. DPL is 0
3  .. DPL is 3
P  .. segment is present
NP .. segment is not present
C  .. code segment is conforming
EO .. code segment is not readable
RE .. code segment is readable
RO .. data segment is not writeable
RW .. data segment is writeable
A  .. active TSS
I  .. inactive TSS
--------------------------------------------------------------------------------
Virtual -> physical NT address conversion (= MmGetPhysicalAddress) was
described by SIneVal in "Coding/ASM/System" forum.

Accessing NT physical memory partially follows Mark Russinovich's
Physmem (physmem.zip at SysInternals.com) but I'm using 1 native API
only (-> Nt/ZwOpenSection can't be replaced by OpenFileMapping).
--------------------------------------------------------------------------------