--- /dev/null
+:mod:`backdoor` -- Python interactive interpreter within a running process
+===============================================================================
+
+The backdoor module is convenient for inspecting the state of a long-running process. It supplies the normal Python interactive interpreter in a way that does not block the normal operation of the application. This can be useful for debugging, performance tuning, or simply learning about how things behave in situ.
+
+In the application, spawn a greenthread running backdoor_server on a listening socket::
+
+ eventlet.spawn(backdoor.backdoor_server, eventlet.listen(('localhost', 3000)))
+
+When this is running, the backdoor is accessible via telnet to the specified port.
+
+.. code-block:: sh
+
+ $ telnet localhost 3000
+ Python 2.6.2 (r262:71600, Apr 16 2009, 09:17:39)
+ [GCC 4.0.1 (Apple Computer, Inc. build 5250)] on darwin
+ Type "help", "copyright", "credits" or "license" for more information.
+ >>> import myapp
+ >>> dir(myapp)
+ ['__all__', '__doc__', '__name__', 'myfunc']
+ >>>
+
+The backdoor cooperatively yields to the rest of the application between commands, so on a running server continuously serving requests, you can observe the internal state changing between interpreter commands.
+
+.. automodule:: eventlet.backdoor
+ :members:
+