What program stores familiar class names or variables in memory? Variables are defined by an offset, and all you will see is "garbage" which may possibly be a variable, or some random memory. "FF" is 255 in base 16, which could be image data, a number, you haven't a clue. How do you know if four bytes is an integer, or it is four separate 8-bit numbers?
If a DLL or executable has constants programmed within it, it might be possible to find those, such as a string, an executable icon, or other data in known locations, but there is no difference in this case.
Just think of a DLL as program that can be loaded by an executable, the executable just has code that can allow it to load in the the operating system automatically. Imagine it as an executable without main() or winmain().
You can decompile the executable to bring out a representation in code that performs the same logic as the original code, sometimes in a clear manner, however this falls in to your reverse engineering category.