There came a time that I received some stack trace exception logs which showed obfuscated classes from my Android app.
Now, the problem is how do I know which obfuscated class is linked to my original classes.
The answer lies in the mapping.txt file that is generated by ProGuard. This can be found in your project main’s build/outputs/mapping/[…flavor_if_any…]/mapping.txt folder.
There is also a tool that can give you a better visual result compared to manually looking at the mapping.txt file and your stack trace file which can be a hassle especially if you have only 1 monitor screen as it is cumbersome to keep on alt-tabbing just to pinpoint the class you are looking for.
The command is
[android-sdk]/tools/proguard/bin/retrace.bat -verbose [path_of_mapping.txt] [path_of_stack_trace_file]