Looking up the internal process details of any arbitrary process does require root access, whereas looking up details of a process under your ownership (including the caller process itself) does not. So, as a simple example, we will look up the calling process's VAS by using the self keyword in place of the PID. The following screenshot shows this (on an x86_64 Ubuntu 18.04 LTS guest):
Figure 7.6 – Output of the cat /proc/self/maps command
In the preceding screenshot, you can actually see the user VAS of the cat process – a veritable memory map of the user VAS of that process! Also, notice that the preceding procfs output is sorted in ascending order by (user) virtual address (UVA).
Familiarity with using the powerful mmap(2) system call will help greatly in understanding further discussions. Do (at least) browse through its man page.