| View previous topic :: View next topic |
| Author |
Message |
Ziladus How do I cheat?
Reputation: 0
Joined: 20 Nov 2023 Posts: 6
|
Posted: Sat Sep 13, 2025 4:42 am Post subject: Win/Emulator - How to find static pointer without ce-server? |
|
|
I'm on Windows 10, CE 7.6, Bluestacks 5.
Using ce-server I get a pointer path to find the health value in the android game across emulator restarts.
I can also find the Health by attaching CE to Bluestacks 5 directly as well, but pointer scans return nothing in this case.
How can I find static pointers or otherwise resolve any address across emulator restarts? Also nothing shows up on find out what writes to this address. I haven't found any tutorials or guides on this. I am looking for examples, or leads on what to do.
Help is much appreciated thanks, also I'm not very knowledgeable yet so please use easier terms.
|
|
| Back to top |
|
 |
Ziladus How do I cheat?
Reputation: 0
Joined: 20 Nov 2023 Posts: 6
|
Posted: Sat Sep 13, 2025 1:39 pm Post subject: |
|
|
| I tried anything I could think of and find/understand but even signature+structure fails...
|
|
| Back to top |
|
 |
Dark Byte Site Admin
Reputation: 470
Joined: 09 May 2003 Posts: 25807 Location: The netherlands
|
Posted: Sat Sep 13, 2025 3:03 pm Post subject: |
|
|
Is the target process using ARM emulation, or is it a native x86 process?
When doing the pointerscan, tick advanced options, and then "ignore upper byte of pointers"
You could try debugging on android 9 and later
_________________
Do not ask me about online cheats. I don't know any and wont help finding them.
Like my help? Join me on Patreon so i can keep helping |
|
| Back to top |
|
 |
Ziladus How do I cheat?
Reputation: 0
Joined: 20 Nov 2023 Posts: 6
|
Posted: Tue Sep 16, 2025 4:03 pm Post subject: |
|
|
| Dark Byte wrote: | Is the target process using ARM emulation, or is it a native x86 process?
When doing the pointerscan, tick advanced options, and then "ignore upper byte of pointers"
You could try debugging on android 9 and later |
I'm on BlueStacks 5. The target is an ARM app under emulation Clash of Clans. Debugger is VEH (as recommended for Android emulators).
I went with CE Server and pointerscans work well but attaching the debugger to the app leaves the "what writes to this adress" infinitly loading / lag out. Attaching to a simple title like 2024 works flawlessly.
|
|
| Back to top |
|
 |
C1aref5 Cheater
Reputation: 0
Joined: 20 Feb 2025 Posts: 32
|
Posted: Thu Oct 23, 2025 3:49 pm Post subject: |
|
|
Ignore upper byte of pointers — necessary when pointer high bytes are non-deterministic.
Max levels: 4–6 (more levels = slower but more chance to find a stable chain).
Max offset: 1024, 4096 or 0x1000 — small offsets are more likely to be stable.
Scan in mapped modules only — uncheck if you suspect heap pointers.
After the first big pointer scan, use Rescan pointerlist on the next boot (load the pointermap file from the previous scan) to quickly narrow to persistent chains.
Using these settings with CE Server almost always finds usable pointer paths for emulator-restarts.
|
|
| Back to top |
|
 |
|