This paper covers five major tools used for memory forensics that would be helpful to the scientific community and forensics researchers in determining which tools are best according to their requirement. From memory forensic analysis, it is very easy to judge about malware presence and behavior. This paper shows a brief survey of the tool’s attributes and their supported platforms. We have mainly focused to mention results on the basis of running process, DLL's, drivers, registry data, event logs, web activity, services, Malware IOC(Indicators of compromise) analysis, network information, size of the tool, address translation etc. Investigators may choose one of the tools according to their requirements