youngwolves How do I cheat?
Reputation: 0
Joined: 27 Oct 2010 Posts: 1
|
Posted: Wed Oct 27, 2010 7:54 am Post subject: Cheat engine 5.6.1 disassemble incorrectly |
|
|
Hello Dark Byte,
I have just registered this account just for reporting bug. When I was debugging a trainer for a game, I saw in the memory view window of Cheat Engine this piece of ASM code:
00010DA4 - 89 15 9f 0a 01 00 - mov [00010a9f],edx
00010DAA - 8b 95 88 01 00 00 - mov edx,[ebp+00000188]
00010DB0 - 89 15 a3 0a 01 00 - mov [00010aa3],edx
00010DB6 - 61 - popad
00010DB7 - c6 05 a8 0a 01 00 00 - mov byte ptr [00010aa8],00
00010DBE - 82 - db 82
00010DBF - 3d a7 0a 01 00 - cmp eax,00010aa7 : [00000000]
00010DC4 - 01 74 02 eb - add [edx+eax-15],esi
00010DC8 - 2d 60 8b 15 9b - sub eax,9b158b60
00010DCD - 0a 01 - or al,[ecx]
As you can see at the address 00010DBE the ASM code is db 82. It is impossible because the program would crash when it executed this code. I checked that piece of code with OllyDbg and Memory Hacking Software (similar as Cheat Engine). Here is what they showed:
00010DA4 - 8915 9F0A0100 - MOV DWORD PTR [10A9F], EDX
00010DAA - 8B95 88010000 - MOV EDX, DWORD PTR [EBP+188]
00010DB0 - 8915 A30A0100 - MOV DWORD PTR [10AA3], EDX
00010DB6 - 61 - POPAD
00010DB7 - C605 A80A0100 00 - MOV BYTE PTR [10AA8], 0
00010DBE - 823D A70A0100 01 - CMP BYTE PTR [10AA7], 1
00010DC5 - 74 02 - JE 00010DC9
00010DC7 - EB 2D - JMP 00010DF6
00010DC9 - 60 - PUSHAD
As you can see, at the address 00010DBE the correct ASM code should be CMP BYTE PTR [10AA7], 1
Sorry for my bad English, I am not a native English speaker
|
|