this command is a foundation block to find which PCs are on in my network (I am looking for a command line IP scanner to built the IP table to xml payload, or a way to read the routing table from my linksys router) ...
I think you can do a lot using the command line
arp -a
which should basically give you a list of all IPs that have been seen recently. You will still need to follow up with a ping command to verify that they are actually still around because arp just gives you a look at the cache.
You can clear the arp cache now and then using
netsh interface ip delete arpcache
but it might not be a good idea to do this and anyway you'll still need to wait for the cache to be repopulated which can take a while and you won't know when it's ready.
So I would first use arp to get the full list, and then use regex to find all matches I am interested in such as IP addresses 192.168.0.1**
(192\.168\.0\.1\d\d)
and then ping them all.
I don't know if it is possible that a device which is present on the network does not show up in the arp table at all though. You'll have to try it and see.
This approach will take some time so it might be best to do it in python in its own thread, which could for example, update a map table, then in VC you could check the map table whenever you want. Or something along those lines.