Invisible Character ViewerInvisible Character Viewer Logo

Detect and identify invisible characters in your text

Invisible Characters Revealed:

How to Use Invisible Character Viewer

  1. Enter or paste your text into the textarea above.
  2. The app will automatically detect and highlight all invisible characters.
  3. Highlighted characters will show a special symbol or their Unicode code point.
  4. Hover over highlighted characters to see their Unicode code point and character name.
  5. Use the checkbox to toggle the visibility of space characters.

This online tool reveals and highlights non-printable characters that may be hidden in copy & pasted text, such as spaces, tabs, line breaks, zero-width, and other control codes. These hidden characters can lead to confusing bugs, formatting problems, or security issues if left undetected.

Invisible Character Viewer can also remove invisible characters from text with one click. This is useful for cleaning up text from unwanted characters.

What Are Invisible Characters?

Invisible characters are Unicode symbols that don't show up visually, but still take up space in your text. They're often used to create blank areas, send empty messages, or sneak hidden data into forms.

These aren't just regular spaces; they include a range of special characters that look like nothing, but can affect how text behaves or is processed.

Invisible Character Legend

The following invisible characters are detected by the app.

You can click on any of the characters below to see more information about it. This also let's you copy the character to your clipboard to use it in other apps.

  • - Null
  • - Tab
  • - Line Feed
  • - Carriage Return
  • - Space
  • - Non-Breaking Space
  • - Soft Hyphen
  • - En Quad
  • - Em Quad
  • - En Space
  • - Em Space
  • - Three-Per-Em Space
  • - Four-Per-Em Space
  • - Six-Per-Em Space
  • - Figure Space
  • - Punctuation Space
  • - Thin Space
  • - Hair Space
  • - Zero-Width Space
  • - Zero-Width Non-Joiner
  • - Zero-Width Joiner
  • - Left-to-Right Mark
  • - Right-to-Left Mark
  • - Line Separator
  • - Paragraph Separator
  • - Left-to-Right Embedding
  • - Right-to-Left Embedding
  • - Pop Directional Formatting
  • - Left-to-Right Override
  • - Right-to-Left Override
  • - Narrow No-Break Space
  • - Medium Mathematical Space
  • - Word Joiner
  • - Function Application
  • - Invisible Times
  • - Invisible Separator
  • - Invisible Plus
  • - Reserved
  • - Left-to-Right Isolate
  • - Right-to-Left Isolate
  • - First Strong Isolate
  • - Pop Directional Isolate
  • - Inhibit Symmetric Swapping (Deprecated)
  • - Activate Symmetric Swapping (Deprecated)
  • - Inhibit Arabic Form Shaping (Deprecated)
  • - Activate Arabic Form Shaping (Deprecated)
  • - National Digit Shapes (Deprecated)
  • - Nominal Digit Shapes (Deprecated)
  • - Ideographic Space
  • - Byte Order Mark
  • U+XXXX - Other control or invisible characters

Copy Invisible Characters

Copy an invisible character to your clipboard by clicking the button below.

Quick Copy
Click the button below to copy an invisible character (Zero-width space) directly to your clipboard.
Manual Selection
If the quick copy doesn't work, you can manually select and copy the invisible character below:

Common Uses of Invisible Characters

Invisible characters are often used intentionally for various purposes. Here are some common applications:

  • Blank usernames & profiles:Used to create empty-looking names on social, gaming, or chat platforms.(e.g. U+00A0, U+200B, U+3000)
  • Invisible messages:Send "blank" messages in apps that block normal spaces.(e.g. U+00A0)
  • Precise spacing & formatting:Fine-tune text layout in design, code, or documents with special spaces or zero-width characters.(e.g. U+2009, U+200B, U+2060, U+00AD)
  • Bypassing filters:Slip past simple text restrictions or validation by using non-standard spaces or invisible characters.

Why Detection Matters

Invisible characters can break search, copy/paste, or code. This tool helps you spot and manage them—whether they're there by accident or on purpose.

Security Implications

Be aware that invisible characters can pose security risks:

  • They can be used to obfuscate malicious content.
  • They may bypass security filters or input validation.
  • They can be used in phishing attempts to manipulate domain names or URLs.
  • In some contexts, they might be used for code injection.
  • Fingerprinting, for example a LLM like ChatGPT can use invisible characters to fingerprint content.

Always sanitize user inputs and implement thorough validation when processing text in your applications.