predprey Master Cheater Reputation: 24 Joined: 08 Oct 2015 Posts: 486
|
Posted: Wed Oct 12, 2016 1:47 pm Post subject: |
|
|
manialderson wrote: | No unfortunately i'm not able in this sector but i quickly learn..so if you are so kind to tell me what's AOB or draw up a fast guide on how can i follow exactly every step you have mention, i'll grateful to you |
aobscanmodule(AOB_SDM,issac-ng.exe, 8b * * * 6A 14 E8 * * * * 85 C0 0F 85)
the part in bold is the AOB, Array of Bytes. the stars are wildcards for any possible byte 0x0 to 0xFF. the reason the cheat cannot be activated is because CE cannot find that AOB in the game's executable, probably because the bytes were changed when the game was updated.
so to update the bytes to the new version in the updated game:
Determining which AOB is problematic:
1. Change CE scan type to "Array of Bytes".
2. Limit scan to "Executable" only, which is a solid check in the clickbox.
3. Copy and paste one of the AOBs into the value field and search.
4. If no results can be found, that AOB needs to be updated.
5. Repeat for the next other AOB.
Updating the AOB:
1. Start by shaving off one byte off the AOB and search again.
2. If a single result is found, replace the AOB in the script with the shaved AOB. Done.
3a. If multiple results are found, right click each of the result, select "Disassemble this memory region" and compare the region of code in memory view with the original code at the end of the script (the part below //ORIGINAL CODE - INJECTION POINT).
3b. Using the result with the region of code that is most similar to the original code, edit the shaved AOB to match only that result by adding a few bytes/wildcards as necessary. Replace the AOB in the script with this new AOB. Done.
4. If no results are found, go back to step 1 shaving another byte off the AOB.
Advanced:
If shaving bytes off the AOB cannot get you a positive result, you would have to search for the updated instructions using "Find assembly code" under the "Search" menu inside "Memory Viewer". You have to search for the instructions in the original code, but replacing addresses and offsets which may have been changed in the update with wildcards.
For Example:
Original Code -
call isacc-ng.exe+135740
test eax,eax
jne isaac-ng.exe+9A255
push eax
call isaac-ng.exe+97520
Search For -
call *
test eax,eax
jne *
push eax
call*
Relevant past tutorials/threads on updating AOBs:
http://forum.cheatengine.org/viewtopic.php?t=563139&sid=7db707233500b3d975267ac216501688
http://www.cheatengine.org/forum/viewtopic.php?p=1811474&sid=e2c2435c0f2433664f0a4e37ece6130f
|
|