Re: Mount and Blade: Warband 1.173
Posted: Sat May 11, 2019 3:34 pm
Hi, can you update for 1.174 please? Some features don't work and often results in a crash. Thanks!
Community Cheat Tables of Cheat Engine
https://fearlessrevolution.com/
Code: Select all
<?xml version="1.0" encoding="utf-8"?>
<CheatTable>
<CheatEntries>
<CheatEntry>
<ID>8460</ID>
<Description>"Only Knockout"</Description>
<LastState/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>{ Game : mb_warband.exe
Version:
Date : 2019-06-27
Author : DNSPC
This script does blah blah blah
}
define(address,"mb_warband.exe"+B7B75)
define(bytes,74 2F)
[ENABLE]
assert(address,bytes)
address:
jmp mb_warband.exe+B7BA6
[DISABLE]
address:
db bytes
// je mb_warband.exe+B7BA6
// cmp edi,ebp
// jl mb_warband.exe+B7BA6
{
// ORIGINAL CODE - INJECTION POINT: "mb_warband.exe"+B7B75
"mb_warband.exe"+B7B49: 69 C0 C8 0F 00 00 - imul eax,eax00000FC8
"mb_warband.exe"+B7B4F: 8B 8C 10 48 02 00 00 - mov ecx,[eax+edx+00000248]
"mb_warband.exe"+B7B56: 8B 84 10 4C 02 00 00 - mov eax,[eax+edx+0000024C]
"mb_warband.exe"+B7B5D: 89 44 24 1C - mov [esp+1C],eax
"mb_warband.exe"+B7B61: 8B C1 - mov eax,ecx
"mb_warband.exe"+B7B63: 25 80 00 00 00 - and eax,00000080
"mb_warband.exe"+B7B68: 33 D2 - xor edx,edx
"mb_warband.exe"+B7B6A: 0B C2 - or eax,edx
"mb_warband.exe"+B7B6C: 75 26 - jne mb_warband.exe+B7B94
"mb_warband.exe"+B7B6E: 83 BE F0 5E 00 00 02 - cmp dword ptr [esi+00005EF0],02
// ---------- INJECTING HERE ----------
"mb_warband.exe"+B7B75: 74 2F - je mb_warband.exe+B7BA6
"mb_warband.exe"+B7B77: 3B FD - cmp edi,ebp
"mb_warband.exe"+B7B79: 7C 2B - jl mb_warband.exe+B7BA6
// ---------- DONE INJECTING ----------
"mb_warband.exe"+B7B7B: 83 E1 10 - and ecx,10
"mb_warband.exe"+B7B7E: 0B C8 - or ecx,eax
"mb_warband.exe"+B7B80: 75 24 - jne mb_warband.exe+B7BA6
"mb_warband.exe"+B7B82: E8 59 C8 F4 FF - call mb_warband.exe+43E0
"mb_warband.exe"+B7B87: D9 44 24 14 - fld dword ptr [esp+14]
"mb_warband.exe"+B7B8B: DE D9 - fcompp
"mb_warband.exe"+B7B8D: DF E0 - fnstsw ax
"mb_warband.exe"+B7B8F: F6 C4 05 - test ah,05
"mb_warband.exe"+B7B92: 7A 12 - jp mb_warband.exe+B7BA6
"mb_warband.exe"+B7B94: 8B 46 08 - mov eax,[esi+08]
}
</AssemblerScript>
</CheatEntry>
</CheatEntries>
</CheatTable>
Code: Select all
<?xml version="1.0" encoding="utf-8"?>
<CheatTable>
<CheatEntries>
<CheatEntry>
<ID>8446</ID>
<Description>"Map Speed"</Description>
<Options moHideChildren="1" moDeactivateChildrenAsWell="1"/>
<LastState/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>{ Game : mb_warband.exe
Version:
Date : 2019-06-23
Author : DNSPC
This script does blah blah blah
}
[ENABLE]
aobscanmodule(INJECT,mb_warband.exe,D9 9E 58 02 00 00) // should be unique
alloc(newmem,$100)
label(code)
label(return)
label(speedmult)
newmem:
cmp [esi+8],0
jne code
fmul dword ptr [speedmult]
code:
fstp dword ptr [esi+00000258]
jmp return
speedmult:
dd (float)1.0
INJECT:
jmp newmem
nop
return:
registersymbol(INJECT)
registersymbol(speedmult)
[DISABLE]
INJECT:
db D9 9E 58 02 00 00
unregistersymbol(speedmult)
unregistersymbol(INJECT)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "mb_warband.exe"+15C8BA
"mb_warband.exe"+15C89F: CC - int 3
"mb_warband.exe"+15C8A0: 81 EC 4C 01 00 00 - sub esp,0000014C
"mb_warband.exe"+15C8A6: 53 - push ebx
"mb_warband.exe"+15C8A7: 56 - push esi
"mb_warband.exe"+15C8A8: 8B F1 - mov esi,ecx
"mb_warband.exe"+15C8AA: 33 DB - xor ebx,ebx
"mb_warband.exe"+15C8AC: 38 9E 60 02 00 00 - cmp [esi+00000260],bl
"mb_warband.exe"+15C8B2: 74 50 - je mb_warband.exe+15C904
"mb_warband.exe"+15C8B4: 56 - push esi
"mb_warband.exe"+15C8B5: E8 B6 DE FF FF - call mb_warband.exe+15A770
// ---------- INJECTING HERE ----------
"mb_warband.exe"+15C8BA: D9 9E 58 02 00 00 - fstp dword ptr [esi+00000258]
// ---------- DONE INJECTING ----------
"mb_warband.exe"+15C8C0: 8B 0D 00 A3 8E 00 - mov ecx,[mb_warband.exe+4EA300]
"mb_warband.exe"+15C8C6: 83 C4 04 - add esp,04
"mb_warband.exe"+15C8C9: C7 05 28 31 E0 00 64 00 00 00 - mov [mb_warband.exe+A03128],00000064
"mb_warband.exe"+15C8D3: 89 1D 2C 31 E0 00 - mov [mb_warband.exe+A0312C],ebx
"mb_warband.exe"+15C8D9: 8B 46 08 - mov eax,[esi+08]
"mb_warband.exe"+15C8DC: 53 - push ebx
"mb_warband.exe"+15C8DD: 50 - push eax
"mb_warband.exe"+15C8DE: 6A 1E - push 1E
"mb_warband.exe"+15C8E0: E8 BB A2 F2 FF - call mb_warband.exe+86BA0
"mb_warband.exe"+15C8E5: DF 2D 28 31 E0 00 - fild qword ptr [mb_warband.exe+A03128]
}
</AssemblerScript>
<CheatEntries>
<CheatEntry>
<ID>8443</ID>
<Description>"Speed Multiplier"</Description>
<VariableType>Float</VariableType>
<Address>speedmult</Address>
</CheatEntry>
</CheatEntries>
</CheatEntry>
</CheatEntries>
</CheatTable>
Code: Select all
<?xml version="1.0" encoding="utf-8"?>
<CheatTable>
<CheatEntries>
<CheatEntry>
<ID>8459</ID>
<Description>"Health Cheat alt"</Description>
<LastState/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>{ Game : mb_warband.exe
Version:
Date : 2019-06-23
Author : DNSPC
This script does blah blah blah
}
[ENABLE]
aobscanmodule(infhealth,mb_warband.exe,D8 64 24 20 52) // should be unique
alloc(newmem,$100)
label(code)
label(return)
newmem:
cmp [edi+7ac],0
je code
fsub dword ptr [esp+20]
code:
push edx
jmp return
infhealth:
jmp newmem
return:
registersymbol(infhealth)
[DISABLE]
infhealth:
db D8 64 24 20 52
unregistersymbol(infhealth)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "mb_warband.exe"+BC154
"mb_warband.exe"+BC12E: E8 AD EB 16 00 - call mb_warband.exe+22ACE0
"mb_warband.exe"+BC133: D9 05 B0 7A 7C 00 - fld dword ptr [mb_warband.exe+3C7AB0]
"mb_warband.exe"+BC139: 51 - push ecx
"mb_warband.exe"+BC13A: 8B 0D 54 51 91 00 - mov ecx,[mb_warband.exe+515154]
"mb_warband.exe"+BC140: D9 1C 24 - fstp dword ptr [esp]
"mb_warband.exe"+BC143: 50 - push eax
"mb_warband.exe"+BC144: 50 - push eax
"mb_warband.exe"+BC145: E8 66 2F F5 FF - call mb_warband.exe+F0B0
"mb_warband.exe"+BC14A: D9 87 00 60 00 00 - fld dword ptr [edi+00006000]
"mb_warband.exe"+BC150: 8D 54 24 14 - lea edx,[esp+14]
// ---------- INJECTING HERE ----------
"mb_warband.exe"+BC154: D8 64 24 20 - fsub dword ptr [esp+20]
"mb_warband.exe"+BC158: 52 - push edx
// ---------- DONE INJECTING ----------
"mb_warband.exe"+BC159: 8B CF - mov ecx,edi
"mb_warband.exe"+BC15B: D9 5C 24 18 - fstp dword ptr [esp+18]
"mb_warband.exe"+BC15F: E8 6C DF FD FF - call mb_warband.exe+9A0D0
"mb_warband.exe"+BC164: 80 BF 00 5F 00 00 00 - cmp byte ptr [edi+00005F00],00
"mb_warband.exe"+BC16B: 0F 84 A4 00 00 00 - je mb_warband.exe+BC215
"mb_warband.exe"+BC171: 8D 44 24 20 - lea eax,[esp+20]
"mb_warband.exe"+BC175: 50 - push eax
"mb_warband.exe"+BC176: E8 15 38 F9 FF - call mb_warband.exe+4F990
"mb_warband.exe"+BC17B: 83 C4 04 - add esp,04
"mb_warband.exe"+BC17E: 85 C0 - test eax,eax
}
</AssemblerScript>
</CheatEntry>
</CheatEntries>
</CheatTable>