Image

Image Metadata Viewer

Upload a JPEG, PNG, GIF, WebP, or SVG and see a structured JSON report: EXIF / IPTC via the exifr library (loaded on demand), PNG tEXt / tIME / pHYs / IHDR hints, GIF screen header, and decoded pixel dimensions. Same trust model as our APK Analyzer and APK String Extractor: files are not uploaded to DroidXP — parsing runs in your tab.

Ad placement — top banner

No file selected

Drop image here JPEG, PNG, GIF, WebP, SVG — processing stays on your device
Select an image to view metadata.
Ad placement — mid rectangle

What does this metadata viewer do?

Digital photos often carry camera settings, timestamps, and sometimes GPS coordinates in embedded tags. This tool reads bytes from your file locally — similar to how our APK Analyzer inspects archives without uploading them — and prints a JSON report you can copy into tickets or documentation.

What is included

  • EXIF / IPTC / ICC (when present): parsed with exifr from your file buffer.
  • PNG: IHDR dimensions, tEXt keyword/value pairs, tIME, pHYs (zTXt compressed text is not expanded here).
  • GIF: logical screen width/height from the header.
  • SVG: basic width / height / viewBox from the root element when parseable.
  • Decoded size: pixel dimensions from the browser’s image decoder (what you would see in an <img>).

Privacy and GPS

If your file contains GPS metadata, it may appear in the report. Share exports carefully — stripping EXIF before sharing publicly is a common safety practice. DroidXP does not upload your image; still, clipboard and screen capture can leak data.

Limits

Social apps often strip metadata on re-upload. HEIC/RAW support depends on the browser and library — some files may show dimensions only. This is a best-effort inspector, not a forensic lab tool.

How to use this tool

  1. Step 1: Choose a photo from disk (drag-and-drop or file picker).
  2. Step 2: Read the JSON report — expand sections as needed.
  3. Step 3: Use Copy JSON to paste into notes or bug reports.
  4. Step 4: For privacy-sensitive images, use a dedicated EXIF remover before publishing.

Frequently Asked Questions

Does DroidXP upload my image?

No. The file is read with FileReader APIs in your browser. Nothing is sent to DroidXP servers for this tool.

Is GPS / location shown?

If the file still contains GPS EXIF tags, they can appear in the merged output. Remove or strip location data before sharing externally if that matters to you.

Why is EXIF empty for my JPEG?

Many apps remove metadata on export, or the image was re-saved without EXIF. Screenshots and some messengers also strip tags.

Does this work on HEIC or RAW?

Support varies by browser. You may only see dimensions or partial tags. Use vendor software for guaranteed RAW/HEIC decoding.

Are PNG compressed text chunks decoded?

zTXt / iTXt are not fully expanded in this viewer — use a dedicated tool if you need every PNG chunk.

Is the exifr library loaded from the network?

Yes — the first analysis loads exifr as an ES module from jsDelivr. After caching, offline use may work. Self-host the module if your policy requires it.

What about very large images?

Files above about 80 MB show a warning; parsing may still be slow. Prefer smaller exports for browser inspection.

Are results legally admissible?

This is a convenience viewer, not a certified forensic chain-of-custody tool. Use proper procedures for legal evidence.

Can I use this offline?

After the page and exifr are cached, it may work without network. First load needs connectivity to fetch the library unless you vendor it.

Does this store my files?

No localStorage is used for image bytes. The report exists only in memory until you refresh or clear.