When the obfuscated code outputs a stack of information, the method name is not recognized, which makes debugging difficult or even impossible.
Fortunately, when Proguard runs, it will output a <project_root>/bin/proguard/mapping.txt file that contains the original class, the method, and the name of the field being mapped to the obfuscated name.
The Retrace.bat script (Window) or retrace.sh script (Linux,mac OS X) can restore a garbled stack trace to a readable message.
It is located in the <sdk_root>/tools/proguard folder. The syntax for executing the retrace tool is as follows:
retrace.bat|retrace.sh [-verbose] mapping.txt [<stacktrace_file>]
For example:
Retrace.bat-verbose Mapping.txt Obfuscated_trace.txt
If you do not specify the <stacktrace_file>,retrace tool will be read from the standard input.
Decoding the obfuscated stack trace information