Skip to content
Runs local · no upload

EXIF Viewer

See what your photos actually carry — camera, lens, GPS coordinates, capture time, all as a searchable tree.

Drop a photo here

or click · JPG, PNG, WebP, HEIC, TIFF · up to 50 files

JPGJPEGPNGWEBPHEICHEIFTIFTIFF

Your file never leaves your browser. Not even for the map view — coordinates are passed locally to OpenStreetMap only when you tap "Show map".

How It Works

  1. 01

    Drop a photo

    Drag and drop or pick from the file browser. JPG, PNG, WebP, HEIC and TIFF are auto-detected. Up to 50 files per batch.

  2. 02

    Search the tree

    Camera info as a stat grid on top, GPS map on tap, everything else as a grouped field tree with live search. Sensitive fields (GPS, serial numbers) are flagged.

  3. 03

    Export

    JSON for scripts, Markdown for documentation, CSV for the bulk view — download or copy to clipboard with one click.

Privacy

No server, no upload, no telemetry. The GPS map is only loaded when you explicitly tap to show it, and only coordinates are sent to OpenStreetMap. The image file itself never leaves your browser tab.

A photo carries more information than the pixels you see. Camera make, model, lens, aperture, ISO, exposure time, and on phone shots usually GPS coordinates accurate to a few meters. This tool lays it all out: drop a file into your browser and the full hierarchy of EXIF, IPTC, XMP, GPS and color profile appears as a searchable tree. The file never leaves your browser tab.

01 — How to Use

How do you use this tool?

  1. Drag and drop a photo — JPG, PNG, WebP, HEIC or TIFF, up to 50 files at once
  2. Inspect the camera-info card on top, then search the field tree or reveal the GPS map
  3. Export to JSON, Markdown or CSV — bulk view also available as a table

What is EXIF data and why should you care?

EXIF stands for “Exchangeable Image File Format” and is a standard that has been enriching digital photos with a layer of invisible data since 1995. Every time your camera or phone fires the shutter, along with the pixels it also writes a list of technical fields: maker, model, lens, focal length, aperture, shutter speed, ISO value, exposure mode, white balance, software version, capture date down to the second, and — on devices with location enabled — the GPS position.

For photographers, this is practical: you can later reconstruct exactly what settings produced a given image. For journalism, forensics and fact-checking, it is gold: capture time, solar angle and device signature can reveal tampering or locate an image. And for the privacy-aware it is a wake-up call: a single shared selfie reveals, when location is on, the exact address it was taken from.

Which metadata blocks does this tool read?

Modern photo files are not pure pixel containers — they combine several metadata standards inside the same file. This viewer separates them cleanly:

  • EXIF: the classic camera format. Maker, model, lens, capture parameters, orientation, thumbnail.
  • GPS: a dedicated sub-IFD inside the EXIF section with latitude, longitude, altitude, heading and GPS timestamp.
  • IPTC: the older industry-standard format from photojournalism. Headline, caption, keywords, copyright, byline.
  • XMP: Adobe’s XML-based successor to IPTC. Extensible with namespaces (dc:, photoshop:, lr:, …) for image-processing workflows.
  • ICC color profile: describes the color space (sRGB, Adobe RGB, Display P3) and how pixel values translate to actual colors.
  • MakerNote: a vendor-specific container in which Canon, Nikon, Sony, Fujifilm and others stash proprietary fields — often the most interesting data of all, e.g. exact sensor temperature or shutter count.

The tree shows each group separately, with live search; sensitive fields like GPS and serial numbers are flagged as “sensitive”.

Why locally in the browser instead of an online service?

Free EXIF viewers are everywhere on the web. Almost all share a problem: you have to upload your photo first. For photos containing GPS coordinates, copyright info, or unpublished editorial content this is a paradoxical move — precisely because you want to know which sensitive data the file carries, you accidentally hand it to a third-party server.

This viewer is different: as soon as the page loads, processing runs entirely in your browser through web standards (File API, ArrayBuffer, DataView). You can open the network panel of your developer tools and watch: no file leaves your computer. Even the optional OpenStreetMap tile for GPS coordinates is loaded only after you actively request it — and then only the lat/lng pair is sent, never the image.

When do you need an EXIF viewer?

Four typical use cases:

  1. Photo forensics & fact-checking: journalists verify that a shared image really originates from the claimed time and place. Camera signature and capture time expose editing artefacts.
  2. Privacy audit before uploading: before posting photos to social networks, Reddit, or online galleries, you can see which personal data would tag along. If you want to strip it, use our Remove metadata tool.
  3. OSINT research: publicly shared images often allow recovery of capture time, device and location — invaluable for verification work against disinformation.
  4. Photo workflow debugging: Lightroom, Capture One and Photoshop users inspect which development steps were carried over as XMP into the export, and whether keywords, copyright and language-style fields propagated correctly.

What this tool honestly does NOT do

  • It does not remove metadata — that’s the explicit job of our sister tool Remove metadata. The viewer here is read-only.
  • It does not write fields back — editing EXIF requires a dedicated editor (a command-line tool like ExifTool, for example).
  • It does not analyze pixel-embedded watermarks or steganography — those are separate research fields with their own tooling.
  • It does not fully interpret vendor-specific MakerNote fields — some appear as raw hex because their meaning is proprietary and not publicly documented.

Other tools from the kittokit ecosystem that fit the same workflow:

  • Remove metadata — strips EXIF, GPS, author and XMP from JPG, PNG, WebP and PDF locally in the browser.
  • Image format converter — converts PNG/JPG to WebP or AVIF.
  • HEIC to JPG — converts iPhone photos to the broadly compatible JPG format.
  • Image resizer — scales down or resizes images before upload.

Last updated:

You might also like