Unforunately there’s no way to view the encoded contents of the VRDB – that question was raised in another thread here quite recently. Obviously the real test is if it’ll restore an infected executable properly – but if the status screen of your interface is showing the current date and (reasonably) current time for the latest VRDB, if you’ve just done one, you might just as well assume it went ok.