Rowhammer is a serious security problem of contemporary dynamic random-access memory (DRAM) where reads or writes of bits can flip other bits. DRAM manufacturers add mitigations, but don’t disclose details, making it difficult for customers to evaluate their efficacy. We present an automated tool, based on active learning, that automatically infers parameter of Rowhammer mitigations against synthetic models of modern DRAM.