# radare2 > A set of reverse engineering tools. > More information: . - Open a file in write mode without parsing the file format headers: `radare2 -nw {{path/to/binary}}` - Debug a program: `radare2 -d {{path/to/binary}}` - Run a script before entering the interactive CLI: `radare2 -i {{path/to/script.r2}} {{path/to/binary}}` - Display help text for any command in the interactive CLI: `> {{radare2_command}}?` - Run a shell command from the interactive CLI: `> !{{shell_command}}` - Dump raw bytes of current block to a file: `> pr > {{path/to/file.bin}}`