3
"enable"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
//vng21092's aobscan lua script
{$lua}
function lua_aobscan(name,module,bytes,index)
index = index - 1
if(module == "") then
local resultSet = AOBScan(bytes)
if(resultSet == nil) then
unregisterSymbol(name)
print(name.." not found")
else
unregisterSymbol(name)
registerSymbol(name,resultSet[index])
resultSet.destroy()
end
else
if(getModuleSize(module) == nil) then
print("Module "..module.." not found")
else
local memScanner = createMemScan()
local memFoundList = createFoundList(memScanner)
memScanner.firstScan(
soExactValue,vtByteArray,rtRounded,bytes,nil,
getAddress(module),(getAddress(module)+getModuleSize(module)),"",
fsmNotAligned,"",true,false,false,false)
memScanner.waitTillDone()
memFoundList.initialize()
if(memFoundList.Count == 0) then
unregisterSymbol(name)
print(name.." in module "..module.." not found")
else
unregisterSymbol(name)
registerSymbol(name,memFoundList.Address[index])
end
memScanner.destroy()
memFoundList.destroy()
end
end
end
{$asm}
aobscanmodule(equippedWeaponAmmoReadAOB,SAOFB-Win64-Shipping.exe,8B ** ** ** 00 00 48 8B ** 89 ** ** ** 00 00 E8 ** ** ** ** 48 ** ** ** ** 00 00 89)
registersymbol(equippedWeaponAmmoReadAOB)
label(pEquippedWeapon)
registersymbol(pEquippedWeapon)
alloc(newmem,2048,equippedWeaponAmmoReadAOB) //"SAOFB-Win64-Shipping.exe"+38F788)
label(returnhere)
label(originalcode_equippedWeaponAmmoReadAOB)
registersymbol(originalcode_equippedWeaponAmmoReadAOB)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
mov rcx,pEquippedWeapon
mov [rcx],rsi
originalcode_equippedWeaponAmmoReadAOB:
readmem(equippedWeaponAmmoReadAOB,6)
//mov eax,[rsi+0000067C]
exit:
jmp returnhere
///
pEquippedWeapon:
///
equippedWeaponAmmoReadAOB: //"SAOFB-Win64-Shipping.exe"+38F788:
jmp newmem
nop
returnhere:
///*******************************************///
aobscanmodule(playerHealthRead1CallerAOB,SAOFB-Win64-Shipping.exe,EB ** 48 ** ** 41 0F ** ** E8 ** ** ** ** 84 C0 75)
registersymbol(playerHealthRead1CallerAOB)
///
aobscanmodule(partyHealthRead1CallerAOB,SAOFB-Win64-Shipping.exe,53 48 ** ** ** 48 ** ** ** 0f ** ** ** ** 0f ** ** 48 ** ** 0f 84)
registersymbol(partyHealthRead1CallerAOB)
///
label(pPlayer)
registersymbol(pPlayer)
alloc(newmem3,2048,playerHealthRead1CallerAOB+2) //"SAOFB-Win64-Shipping.exe"+278168)
label(returnhere3)
label(originalcode3_playerHealthRead1CallerAOB)
registersymbol(originalcode3_playerHealthRead1CallerAOB)
label(exit3)
newmem3: //this is allocated memory, you have read,write,execute access
//place your code here
mov rcx,[rbx]
push rcx
mov rcx,pPlayer
pop [rcx+8]
mov rcx,[rbx]
db 48 8B 49
readmem(partyHealthRead1CallerAOB+8,1)
//mov rcx,[rcx+58]
push rcx
mov rcx,pPlayer
pop [rcx]
originalcode3_playerHealthRead1CallerAOB:
readmem(playerHealthRead1CallerAOB+2,7)
//mov rcx,[rbx]
//movaps xmm1,xmm8
exit3:
jmp returnhere3
///
pPlayer:
///
playerHealthRead1CallerAOB+2: //"SAOFB-Win64-Shipping.exe"+278168:
jmp newmem3
nop
nop
returnhere3:
///*******************************************///
aobscanmodule(highlightedItemCallerAOB,SAOFB-Win64-Shipping.exe,40 53 48 ** ** ** 48 8B ** E8 ** ** ** ** 48 ** ** 32 C0 0F)
registersymbol(highlightedItemCallerAOB)
label(pHighlightedItem)
registersymbol(pHighlightedItem)
alloc(newmem4,2048,highlightedItemCallerAOB+2) //"SAOFB-Win64-Shipping.exe"+4A2AF2)
label(returnhere4)
label(originalcode4_highlightedItemCallerAOB)
registersymbol(originalcode4_highlightedItemCallerAOB)
label(exit4)
newmem4: //this is allocated memory, you have read,write,execute access
//place your code here
mov rbx,pHighlightedItem
mov [rbx],rcx
//mov ebx,[rcx+10]
originalcode4_highlightedItemCallerAOB:
readmem(highlightedItemCallerAOB+2,7)
//sub rsp,20
//mov rbx,rcx
exit4:
jmp returnhere4
///
pHighlightedItem:
///
highlightedItemCallerAOB+2: //"SAOFB-Win64-Shipping.exe"+4A2AF2:
jmp newmem4
nop
nop
returnhere4:
///*******************************************///
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
equippedWeaponAmmoReadAOB: //"SAOFB-Win64-Shipping.exe"+38F788:
readmem(originalcode_equippedWeaponAmmoReadAOB,6)
//db 8B 86 7C 06 00 00
//Alt: mov eax,[rsi+0000067C]
unregistersymbol(originalcode_equippedWeaponAmmoReadAOB)
unregistersymbol(pEquippedWeapon)
///*******************************************///
dealloc(newmem3)
playerHealthRead1CallerAOB+2: //"SAOFB-Win64-Shipping.exe"+278168:
readmem(originalcode3_playerHealthRead1CallerAOB,7)
//db 48 8B 0B 41 0F 28 C8
//Alt: mov rcx,[rbx]
//Alt: movaps xmm1,xmm8
unregistersymbol(originalcode3_playerHealthRead1CallerAOB)
unregistersymbol(pPlayer)
///*******************************************///
dealloc(newmem4)
highlightedItemCallerAOB+2: //"SAOFB-Win64-Shipping.exe"+4A2AF2:
readmem(originalcode4_highlightedItemCallerAOB,7)
//db 48 83 EC 20 48 8B D9
//Alt: sub rsp,20
//Alt: mov rbx,rcx
unregistersymbol(originalcode4_highlightedItemCallerAOB)
unregistersymbol(pHighlightedItem)
///*******************************************///
13102
"undead"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
define(minhealthdefault,(float)1)
aobscanmodule(healthCalOnHitAOB,SAOFB-Win64-Shipping.exe,E8 ** ** ** ** EB ** F3 0F ** ** ** ** ** ** F3 ** ** ** ** 44 0F ** ** ** ** ** ** ** 0F)
registersymbol(healthCalOnHitAOB)
label(bUndeadStatis)
registersymbol(bUndeadStatis)
label(dMinHealth)
registersymbol(dMinHealth)
alloc(newmem,2048,healthCalOnHitAOB+7) //"SAOFB-Win64-Shipping.exe"+2EDABA)
label(returnhere)
label(originalcode_healthCalOnHitAOB)
registersymbol(originalcode_healthCalOnHitAOB)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
readmem(healthCalOnHitAOB+7,8)
//movss xmm0,[rbx+13fc]
mov rcx,pPlayer
cmp [rcx],rbx
je @f
mov rcx,bUndeadStatis
cmp byte ptr [rcx],1
jne end
mov rcx,pPlayer
mov rcx,[rcx]
test rcx,rcx
jz end
//+1c :: 1
//+7f0 :: pointer
//+7f8 :: pointer
//+858 :: 00000000
//+f40 :: not ffffffff
//+ce0 :: 3
//+d00 :: 1
//+d04 :: 1
//+d0c :: 1
//+d50 :: 3
mov ecx,[rcx+7f0]
cmp [rbx+7f0],ecx
jne end
@@:
mov rcx,dMinHealth
subss xmm0,xmm8
comiss xmm0,[rcx]
jae @f
movss xmm0,[rcx]
addss xmm0,xmm8
readmem(healthCalOnHitAOB+7,2)
db 11
readmem(healthCalOnHitAOB+a,5)
//movss [rbx+13fc],xmm0
end:
originalcode_healthCalOnHitAOB:
readmem(healthCalOnHitAOB+7,8)
//movss xmm0,[rbx+000013FC]
exit:
jmp returnhere
///
bUndeadStatis:
dd 0
dMinHealth:
dd minhealthdefault
///
healthCalOnHitAOB+7: //"SAOFB-Win64-Shipping.exe"+2EDABA:
jmp newmem
nop
nop
nop
returnhere:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
healthCalOnHitAOB+7: //"SAOFB-Win64-Shipping.exe"+2EDABA:
readmem(originalcode_healthCalOnHitAOB,8)
//db F3 0F 10 83 FC 13 00 00
//Alt: movss xmm0,[rbx+000013FC]
unregistersymbol(originalcode_healthCalOnHitAOB)
unregistersymbol(bUndeadStatis)
unregistersymbol(dMinHealth)
13103
"status"
0:player only
1:party
008000
Byte
bUndeadStatis
13104
""
008000
Float
+4
15
"no reload"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(ammoWriteOnFireAOB,SAOFB-Win64-Shipping.exe,89 ** ** ** 00 00 48 8B ** E8 ** ** ** ** 84 C0 74 ** 80 ** ** ** 00 00 00 75)
registersymbol(ammoWriteOnFireAOB)
alloc(newmem,2048,ammoWriteOnFireAOB) //"SAOFB-Win64-Shipping.exe"+3AB9F2)
label(returnhere)
label(originalcode_ammoWriteOnFireAOB)
registersymbol(originalcode_ammoWriteOnFireAOB)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
mov rcx,pEquippedWeapon
cmp [rcx],rbx
jne @f
cmp eax,1
jge @f
mov eax,1
@@:
originalcode_ammoWriteOnFireAOB:
readmem(ammoWriteOnFireAOB,6)
//mov [rbx+0000067C],eax
exit:
jmp returnhere
///
ammoWriteOnFireAOB: //"SAOFB-Win64-Shipping.exe"+3AB9F2:
jmp newmem
nop
returnhere:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
ammoWriteOnFireAOB: //"SAOFB-Win64-Shipping.exe"+3AB9F2:
readmem(originalcode_ammoWriteOnFireAOB,6)
//db 89 83 7C 06 00 00
//Alt: mov [rbx+0000067C],eax
unregistersymbol(originalcode_ammoWriteOnFireAOB)
8
"inf. ammo pouch"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
define(minammopouch,#100)
aobscanmodule(ammoPouchReadAOB,SAOFB-Win64-Shipping.exe,48 89 ** E8 ** ** ** ** 8B 40 ** 48 ** ** ** C3 31 C0 48 ** ** ** C3)
registersymbol(ammoPouchReadAOB)
label(dMinAmmoPouch)
registersymbol(dMinAmmoPouch)
alloc(newmem,2048,ammoPouchReadAOB+8,7) //"SAOFB-Win64-Shipping.exe"+5F5A56D)
label(returnhere)
label(originalcode_ammoPouchReadAOB)
registersymbol(originalcode_ammoPouchReadAOB)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
push rbx
mov rbx,pEquippedWeapon
cmp [rbx],rsi
jne @f
mov rbx,dMinAmmoPouch
mov ebx,[rbx]
db 39 58
readmem(ammoPouchReadAOB+a,1)
//cmp [rax+10],ebx
jge @f
db 89 58
readmem(ammoPouchReadAOB+a,1)
//mov [rax+10],ebx
@@:
pop rbx
originalcode_ammoPouchReadAOB:
readmem(ammoPouchReadAOB+8,7)
//mov eax,[rax+10]
//add rsp,28
exit:
jmp returnhere
///
dMinAmmoPouch:
dd minammopouch
///
ammoPouchReadAOB+8: //"SAOFB-Win64-Shipping.exe"+5F5A56D:
jmp newmem
nop
nop
returnhere:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
ammoPouchReadAOB+8: //"SAOFB-Win64-Shipping.exe"+5F5A56D:
readmem(originalcode_ammoPouchReadAOB,7)
//db 8B 40 10 48 83 C4 28
//Alt: mov eax,[rax+10]
//Alt: add rsp,28
unregistersymbol(originalcode_ammoPouchReadAOB)
unregistersymbol(dMinAmmoPouch)
17
"ignore cooldown"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(cooldownChkOnSkillUseAOB,SAOFB-Win64-Shipping.exe,F3 0F ** ** ** 0F 2F ** ** 0F 96 D0 C3 30 C0 C3)
registersymbol(cooldownChkOnSkillUseAOB)
cooldownChkOnSkillUseAOB+9: //"SAOFB-Win64-Shipping.exe"+5DE6964:
db 90 B0 01
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
cooldownChkOnSkillUseAOB+9: //"SAOFB-Win64-Shipping.exe"+5DE6964:
db 0F 96 D0
//Alt: setbe al
21
"ignore credits .3"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(moneyChkOnBuyAOB,SAOFB-Win64-Shipping.exe,4C 8B ** ** ** 00 00 48 ** ** ** 4C 3B C1 0F 8F)
registersymbol(moneyChkOnBuyAOB)
moneyChkOnBuyAOB+b: //"SAOFB-Win64-Shipping.exe"+6B16E4:
db 4D 39 C0
///********************************///
aobscanmodule(moneyChkOnInfoShopAccessAOB,SAOFB-Win64-Shipping.exe,39 ** ** 7c 27 48 ** ** ** 48 ** ** ** ** ** ** 48 ** ** 75 ** b0 01 48 ** ** ** ** 48 ** ** ** ** 48 ** ** ** ** 48 ** ** ** 5f c3 30 c0 eb)
registersymbol(moneyChkOnInfoShopAccessAOB)
moneyChkOnInfoShopAccessAOB+2c: //"SAOFB-Win64-Shipping.exe"+6BC9F26:
db B0 01
///********************************///
aobscanmodule(moneyChkOnEnhanceWeaponsAccessAOB,SAOFB-Win64-Shipping.exe,FF ** 44 ** ** ** ** ** ** 44 ** ** 0F 9C C3 45 ** ** 44 ** ** 7C)
registersymbol(moneyChkOnEnhanceWeaponsAccessAOB)
moneyChkOnEnhanceWeaponsAccessAOB+c: //"SAOFB-Win64-Shipping.exe"+79CE90:
db 90 B3 01
///********************************///
aobscanmodule(moneyChkOnTransformWeaponsAccessAOB,SAOFB-Win64-Shipping.exe,E8 ** ** ** ** 41 ** ** 89 ** 41 ** ** ** 39 ** 7E ** 83 ** ** EB)
registersymbol(moneyChkOnTransformWeaponsAccessAOB)
moneyChkOnTransformWeaponsAccessAOB+10: //"SAOFB-Win64-Shipping.exe"+6BC9C8C:
db EB
///********************************///
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
moneyChkOnBuyAOB+b: //"SAOFB-Win64-Shipping.exe"+6B16E4:
db 4C 3B C1
//Alt: cmp r8,rcx
///********************************///
moneyChkOnInfoShopAccessAOB+2c: //"SAOFB-Win64-Shipping.exe"+6BC9F26:
db 30 C0
//Alt: xor al,al
///********************************///
moneyChkOnEnhanceWeaponsAccessAOB+c: //"SAOFB-Win64-Shipping.exe"+79CE90:
db 0F 9C C3
//Alt: setl bl
///********************************///
moneyChkOnTransformWeaponsAccessAOB+10: //"SAOFB-Win64-Shipping.exe"+6BC9C8C:
db 7E
//Alt: jle
///********************************///
13171
"ignore materials"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(materialsReqChkForEnhanceWeaponsAOB,SAOFB-Win64-Shipping.exe,E8 ** ** ** ** 3B ** 41 ** ** ** 0F 9D C0 20 ** ** ** E8)
registersymbol(materialsReqChkForEnhanceWeaponsAOB)
materialsReqChkForEnhanceWeaponsAOB+b: //"SAOFB-Win64-Shipping.exe"+7BCBC1:
db 90 B0 01
///*****************************///
aobscanmodule(materialsReqChkForTransformWeaponsAOB,SAOFB-Win64-Shipping.exe,E8 ** * ** ** 45 ** ** 8D ** ** 41 ** ** ** 3B ** 44 0F 4D C0 45)
registersymbol(materialsReqChkForTransformWeaponsAOB)
materialsReqChkForTransformWeaponsAOB+11: //"SAOFB-Win64-Shipping.exe"+798B35:
db 90 44 8B C0
///*****************************///
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
materialsReqChkForEnhanceWeaponsAOB+b: //"SAOFB-Win64-Shipping.exe"+7BCBC1:
db 0F 9D C0
//Alt: setge al
///*****************************///
materialsReqChkForTransformWeaponsAOB+11: //"SAOFB-Win64-Shipping.exe"+798B35:
db 44 0F 4D C0
//Alt: cmovge r8d,eax
///*****************************///
13173
"ignore outfit design"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(outfitDesignObtainedFlagChkOnCreateAOB,SAOFB-Win64-Shipping.exe,49 ** ** E8 ** ** ** ** 84 C0 0F 84 ** ** ** ** 48 ** ** ** ** ** ** ** 33 ** 48 ** ** ** ** 33)
registersymbol(outfitDesignObtainedFlagChkOnCreateAOB)
outfitDesignObtainedFlagChkOnCreateAOB+8: //"SAOFB-Win64-Shipping.exe"+7989FF:
db 85 DB
///*****************************///
aobscanmodule(outfitDesignObtainedFlagChkOnDisplayAOB,SAOFB-Win64-Shipping.exe,49 ** ** E8 ** ** ** ** 84 C0 74 ** 40 ** ** 48)
registersymbol(outfitDesignObtainedFlagChkOnDisplayAOB)
outfitDesignObtainedFlagChkOnDisplayAOB+8: //"SAOFB-Win64-Shipping.exe"+7BEA6E:
db 85 DB
///*****************************///
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
outfitDesignObtainedFlagChkOnCreateAOB+8: //"SAOFB-Win64-Shipping.exe"+7989FF:
db 84 C0
//Alt: test al,al
///*****************************///
outfitDesignObtainedFlagChkOnDisplayAOB+8: //"SAOFB-Win64-Shipping.exe"+7BEA6E:
db 84 C0
//Alt: test al,al
///*****************************///
13032
"ignore CP"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(sufficientCPChkOnStatsIncAOB,SAOFB-Win64-Shipping.exe,8B ** ** ** 00 00 39 ** ** ** 00 00 7C ** FF)
registersymbol(sufficientCPChkOnStatsIncAOB)
alloc(originalcode_sufficientCPChkOnStatsIncAOB,10)
registersymbol(originalcode_sufficientCPChkOnStatsIncAOB)
originalcode_sufficientCPChkOnStatsIncAOB:
readmem(sufficientCPChkOnStatsIncAOB+c,2)
///
sufficientCPChkOnStatsIncAOB+c: //"SAOFB-Win64-Shipping.exe"+7D718A:
db 90 90
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
sufficientCPChkOnStatsIncAOB+c: //"SAOFB-Win64-Shipping.exe"+7D718A:
readmem(originalcode_sufficientCPChkOnStatsIncAOB,2)
//db 7C 63
//Alt: jl SAOFB-Win64-Shipping.exe+7D71EF
dealloc(originalcode_sufficientCPChkOnStatsIncAOB)
unregistersymbol(originalcode_sufficientCPChkOnStatsIncAOB)
13024
"ignore SP / skill requirements"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(learnableFlagUnSetOnSkillMenuAccessAOB,SAOFB-Win64-Shipping.exe,7C 04 B0 01 EB 02 30 C0 48 ** ** ** ** 48)
registersymbol(learnableFlagUnSetOnSkillMenuAccessAOB)
learnableFlagUnSetOnSkillMenuAccessAOB+6: //"SAOFB-Win64-Shipping.exe"+6C4A7C5:
db B0 01
///*****************************///
aobscanmodule(equipableFlagUnSetOnSkillEquipAOB,SAOFB-Win64-Shipping.exe,7C 04 B0 01 EB 02 32 C0 48 ** ** ** ** ** ** ** 4C)
registersymbol(equipableFlagUnSetOnSkillEquipAOB)
equipableFlagUnSetOnSkillEquipAOB+6: //"SAOFB-Win64-Shipping.exe"+7CF430:
db B0 01
///*****************************///
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
learnableFlagUnSetOnSkillMenuAccessAOB+6: //"SAOFB-Win64-Shipping.exe"+6C4A7C5:
db 30 C0
//Alt: xor al,al
///*****************************///
equipableFlagUnSetOnSkillEquipAOB+6: //"SAOFB-Win64-Shipping.exe"+7CF430:
db 32 C0
//Alt: xor al,al
///*****************************///
13066
"ignore equip stats requirements"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(statsReqChkOnEquipMenuAccessAOB,SAOFB-Win64-Shipping.exe,4D ** ** 74 ** 41 ** ** ** 39 ** ** 0F 8C ** ** ** ** 41 ** ** ** 39)
registersymbol(statsReqChkOnEquipMenuAccessAOB)
statsReqChkOnEquipMenuAccessAOB+3: //"SAOFB-Win64-Shipping.exe"+70FAD4:
db EB
///**************************************///
aobscanmodule(statsChkOnEquipAccessoriesAOB,SAOFB-Win64-Shipping.exe,E8 ** ** ** ** 48 ** ** ** 48 ** ** 74 05 E8 ** ** ** ** 32 C0 EB)
registersymbol(statsChkOnEquipAccessoriesAOB)
statsChkOnEquipAccessoriesAOB+13: //"SAOFB-Win64-Shipping.exe"+6F437D:
db B0 01
///**************************************///
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
statsReqChkOnEquipMenuAccessAOB+3: //"SAOFB-Win64-Shipping.exe"+70FAD4:
db 74
//Alt: je
///**************************************///
statsChkOnEquipAccessoriesAOB+13: //"SAOFB-Win64-Shipping.exe"+6F437D:
db 32 C0
//Alt: xor al,al
///**************************************///
13178
"ignore equip gender"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(cJmpIfIncorrectEquipGenderOnEquipMenuAccessAOB,SAOFB-Win64-Shipping.exe,75 05 40 ** ** 74 ** 80 ** 00 75)
registersymbol(cJmpIfIncorrectEquipGenderOnEquipMenuAccessAOB)
alloc(originalcode_cJmpIfIncorrectEquipGenderOnEquipMenuAccessAOB,10,cJmpIfIncorrectEquipGenderOnEquipMenuAccessAOB+5)
//label(originalcode_cJmpIfIncorrectEquipGenderOnEquipMenuAccessAOB)
registersymbol(originalcode_cJmpIfIncorrectEquipGenderOnEquipMenuAccessAOB)
originalcode_cJmpIfIncorrectEquipGenderOnEquipMenuAccessAOB:
readmem(cJmpIfIncorrectEquipGenderOnEquipMenuAccessAOB+5,2)
///
cJmpIfIncorrectEquipGenderOnEquipMenuAccessAOB+5: //"SAOFB-Win64-Shipping.exe"+70FB4E:
db 90 90
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
cJmpIfIncorrectEquipGenderOnEquipMenuAccessAOB+5: //"SAOFB-Win64-Shipping.exe"+70FB4E:
readmem(originalcode_cJmpIfIncorrectEquipGenderOnEquipMenuAccessAOB,2)
//db 74 4E
//Alt: je SAOFB-Win64-Shipping.exe+70FB9E
dealloc(originalcode_cJmpIfIncorrectEquipGenderOnEquipMenuAccessAOB)
unregistersymbol(originalcode_cJmpIfIncorrectEquipGenderOnEquipMenuAccessAOB)
13111
"max affinity"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(affinityReadInFriendListMenuCallerAOB,SAOFB-Win64-Shipping.exe,E8 ** ** ** ** 48 ** ** E8 ** ** ** ** 45 ** ** 85 C0 79 ** 44)
registersymbol(affinityReadInFriendListMenuCallerAOB)
alloc(newmem,2048,affinityReadInFriendListMenuCallerAOB+d) //"SAOFB-Win64-Shipping.exe"+6A5B3D7)
label(returnhere)
label(originalcode_affinityReadInFriendListMenuCallerAOB)
registersymbol(originalcode_affinityReadInFriendListMenuCallerAOB)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
mov eax,#1000
mov [rcx+74],eax
originalcode_affinityReadInFriendListMenuCallerAOB:
readmem(affinityReadInFriendListMenuCallerAOB+d,5)
//mov r14d,r15d
//test eax,eax
exit:
jmp returnhere
///
affinityReadInFriendListMenuCallerAOB+d: //"SAOFB-Win64-Shipping.exe"+6A5B3D7:
jmp newmem
returnhere:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
affinityReadInFriendListMenuCallerAOB+d: //"SAOFB-Win64-Shipping.exe"+6A5B3D7:
readmem(originalcode_affinityReadInFriendListMenuCallerAOB,5)
//db 45 89 FE 85 C0
//Alt: mov r14d,r15d
//Alt: test eax,eax
unregistersymbol(originalcode_affinityReadInFriendListMenuCallerAOB)
13112
"view the character in the Friend List"
808080
1
39
"walk key"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
define(walkkeyiddefault,14)
aobscanmodule(yForceWrite1AOB,SAOFB-Win64-Shipping.exe,74 03 0F 57 ** F3 41 ** ** ** ** 40 ** ** ** 0F84)
registersymbol(yForceWrite1AOB)
label(bWalkKeyID)
registersymbol(bWalkKeyID)
label(bWalkKeyPressed)
registersymbol(bWalkKeyPressed)
label(dMoveSpeedMultiplier)
registersymbol(dMoveSpeedMultiplier)
alloc(newmem,2048,yForceWrite1AOB+5) //"SAOFB-Win64-Shipping.exe"+4F27D7)
label(returnhere)
label(originalcode_yForceWrite1AOB)
registersymbol(originalcode_yForceWrite1AOB)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
mov rax,bWalkKeyPressed
cmp byte ptr [rax],1
jne @f
mov rax,dMoveSpeedMultiplier
mulss xmm0,[rax]
originalcode_yForceWrite1AOB:
readmem(yForceWrite1AOB+5,6)
//movss [r11+3C],xmm0
exit:
jmp returnhere
///
bWalkKeyID:
dd walkkeyiddefault
bWalkKeyPressed:
dd 0
dMoveSpeedMultiplier:
dd (float)0.4
///
yForceWrite1AOB+5: //"SAOFB-Win64-Shipping.exe"+4F27D7:
jmp newmem
nop
returnhere:
///*****************************************///
luaCall(lua_aobscan("yForceWrite2AOB","SAOFB-Win64-Shipping.exe","75 03 0F 57 ** F3 41 ** ** ** ** 40 ** ** ** 0F84",1))
alloc(newmem2,2048,yForceWrite2AOB+5) //"SAOFB-Win64-Shipping.exe"+4F2887)
label(returnhere2)
label(originalcode2_yForceWrite2AOB)
registersymbol(originalcode2_yForceWrite2AOB)
label(exit2)
newmem2: //this is allocated memory, you have read,write,execute access
//place your code here
mov rax,bWalkKeyPressed
cmp byte ptr [rax],1
jne @f
mov rax,dMoveSpeedMultiplier
mulss xmm0,[rax]
originalcode2_yForceWrite2AOB:
readmem(yForceWrite2AOB+5,6)
//movss [r11+3C],xmm0
exit2:
jmp returnhere2
///
yForceWrite2AOB+5: //"SAOFB-Win64-Shipping.exe"+4F2887:
jmp newmem2
nop
returnhere2:
///*****************************************///
luaCall(lua_aobscan("xForceWrite1AOB","SAOFB-Win64-Shipping.exe","75 03 0F 57 ** F3 41 ** ** ** ** 40 ** ** ** 0F84",2))
alloc(newmem3,2048,xForceWrite1AOB+5) //"SAOFB-Win64-Shipping.exe"+4F2937)
label(returnhere3)
label(originalcode3_xForceWrite1AOB)
registersymbol(originalcode3_xForceWrite1AOB)
label(exit3)
newmem3: //this is allocated memory, you have read,write,execute access
//place your code here
mov rax,bWalkKeyPressed
cmp byte ptr [rax],1
jne @f
mov rax,dMoveSpeedMultiplier
mulss xmm0,[rax]
originalcode3_xForceWrite1AOB:
readmem(xForceWrite1AOB+5,6)
//movss [r11+38],xmm0
exit3:
jmp returnhere3
///
xForceWrite1AOB+5: //"SAOFB-Win64-Shipping.exe"+4F2937:
jmp newmem3
nop
returnhere3:
///*****************************************///
aobscanmodule(xForceWrite2AOB,SAOFB-Win64-Shipping.exe,74 03 0F 57 C1 F3 ** ** ** ** ** 0F ** ** ** 0F 83)
registersymbol(xForceWrite2AOB)
alloc(newmem4,2048,xForceWrite2AOB+5) //"SAOFB-Win64-Shipping.exe"+4F29E7)
label(returnhere4)
label(originalcode4_xForceWrite2AOB)
registersymbol(originalcode4_xForceWrite2AOB)
label(exit4)
newmem4: //this is allocated memory, you have read,write,execute access
//place your code here
mov rax,bWalkKeyPressed
cmp byte ptr [rax],1
jne @f
mov rax,dMoveSpeedMultiplier
mulss xmm0,[rax]
originalcode4_xForceWrite2AOB:
readmem(xForceWrite2AOB+5,6)
//movss [r11+38],xmm0
exit4:
jmp returnhere4
///
xForceWrite2AOB+5: //"SAOFB-Win64-Shipping.exe"+4F29E7:
jmp newmem4
nop
returnhere4:
///*****************************************///
//modified from TheyCallMeTim13's lua keylistener script
//http://fearlessrevolution.com/viewtopic.php?f=4&t=6041&start=60#p62657
{$lua}
local function walkkeyLuaThread(thread2)
local addr2 = getAddressSafe('bWalkKeyPressed')
while RunWalkkeyLuaThreadLoop do
sleep(100)
if addr2 then
if ( isKeyPressed( readInteger('bWalkKeyID') ) ) then
writeBytes(addr2, 1)
else
writeBytes(addr2, 0)
end
else
addr2 = getAddressSafe('bWalkKeyPressed')
end
end
thread2.terminate()
-- while RunWalkkeyLuaThreadLoop do
-- if ( isKeyPressed(VK_CAPITAL) ) then
-- writeBytes("bWalkKeyPressed" ,1)
-- else
-- writeBytes("bWalkKeyPressed" ,0)
-- end
-- end
-- thread2.terminate()
end
----------------------------------
if syntaxcheck then return end
RunWalkkeyLuaThreadLoop = true
createThread(walkkeyLuaThread)
{$asm}
///*****************************************///
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
{$lua}
if syntaxcheck then return end
RunWalkkeyLuaThreadLoop = false
{$asm}
///*****************************************///
dealloc(newmem)
yForceWrite1AOB+5: //"SAOFB-Win64-Shipping.exe"+4F27D7:
readmem(originalcode_yForceWrite1AOB,6)
//db F3 41 0F 11 43 3C
//Alt: movss [r11+3C],xmm0
unregistersymbol(originalcode_yForceWrite1AOB)
unregistersymbol(bWalkKeyID)
unregistersymbol(bWalkKeyPressed)
unregistersymbol(dMoveSpeedMultiplier)
///*****************************************///
dealloc(newmem2)
yForceWrite2AOB+5: //"SAOFB-Win64-Shipping.exe"+4F2887:
readmem(originalcode2_yForceWrite2AOB,6)
//db F3 41 0F 11 43 3C
//Alt: movss [r11+3C],xmm0
unregistersymbol(originalcode2_yForceWrite2AOB)
///*****************************************///
dealloc(newmem3)
xForceWrite1AOB+5: //"SAOFB-Win64-Shipping.exe"+4F2937:
readmem(originalcode3_xForceWrite1AOB,6)
//db F3 41 0F 11 43 38
//Alt: movss [r11+38],xmm0
unregistersymbol(originalcode3_xForceWrite1AOB)
///*****************************************///
dealloc(newmem4)
xForceWrite2AOB+5: //"SAOFB-Win64-Shipping.exe"+4F29E7:
readmem(originalcode4_xForceWrite2AOB,6)
//db F3 41 0F 11 43 38
//Alt: movss [r11+38],xmm0
unregistersymbol(originalcode4_xForceWrite2AOB)
///*****************************************///
13010
"key"
10:SHIFT key
11:CTRL key
12:ALT key
14:CAPS LOCK key
04:Middle Mouse Button
05:X1 Mouse Button
06:X2 Moust Button
09:TAB key
1
008000
Byte
bWalkKeyID
13011
""
008000
Byte
+4
13012
""
008000
Float
+4
13273
"highlighted item"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
{$lua}
local al=getAddressList()
local hiMR = al.getMemoryRecordByDescription('[highlighted item]')
local hitMR = al.getMemoryRecordByDescription('type')
local chipidflux = {
"1:STR",
"2:VIT",
"3:INT",
"4:AGI",
"5:DEX",
"6:LUC",
"7:Weapon Attack",
"8:Physical Attack",
"9:Optical Attack",
"10:Explosive Attack",
"11:Gadget Attack",
"12:Damage vs Humanoid",
"13:Damage vs Lifeform",
"14:Damage vs Mech",
"15:Damage when off-guard",
"16:Damage from behind",
"17:Damage at max HP",
"18:Damage when near death",
"19:Weak spot Damage",
"20:Critical Damage increase",
"21:Critical Rate",
"22:Debuff stacking",
"23:Physical Defense",
"24:Optical Defense",
"25:Explosive Defense",
"26:Melee Defense",
"27:Defense vs Humanoid",
"28:Defense vs Lifeform",
"29:Defense vs Mech",
"30:Blaze Damage",
"31:Poison Damage",
"32:Debuff Resistance",
"33:Debuff Duration",
"34:Blaze Resistance",
"35:Poison Resistance",
"36:Suppression Resistance",
"37:Electromagnetic stun Resistance",
"38:HP recovered Over time",
"39:Max HP",
"40:HP Recovery",
"41:Decrease Detectability When Crouching",
"42:Bullet circle stabilization speed",
"43:Bullet Circle accuracy",
"44:Movement Speed",
"45:Reload Speed",
"46:Auto reload rate",
"47:Avoid instant Death",
"48:Recharge time",
"49:Ammo Acquired",
"50:Ammo Capacity",
"51:Treasure Hunt",
"52:Item Drop rate",
"53:Rare item drop rate",
"54:Weight",
"55:Medal Acquired",
"56:Medal gauge increase",
"57:Trade Value",
"58:Experience point",
"59:Effective Range",
"60:Over heat buildup & duration"
}
local chipDropDownList = createStringlist()
chipDropDownList.add("0:Empty")
for i,j in ipairs(chipidflux) do
chipDropDownList.add(string.format("%s",j))
end
local function hichipupdatethread(thread4)
local hita = 0
local hitv = 0
local hinc = 0
-- print (hiMR.Address)
-- hitv = tonumber(hitMR.Value)
-- print (hitv)
while hichipupdateloop do
sleep(300)
hiAddr = getAddressSafe('pHighlightedItem')
-- print ( readBytes(readPointer(hiAddr)+0x18) )
if hiAddr then
if (hiMR.Active) then
-- print (hita)
-- print (tonumber(hitMR.Address))
if ( ( readPointer(hiAddr)+0x18 ~= hita) ) then
hita = readPointer(hiAddr)+0x18
hitv = readBytes(readPointer(hiAddr)+0x18)
-- print (hita)
if ( hitv==0 ) then
-- print( 'weapons' )
-- print ( readPointer(readPointer(hiAddr)+0x20) +0x28 )
-- print ( readBytes( readPointer(readPointer(hiAddr)+0x20) +0x28 ) )
chipspinit(0,readPointer(readPointer(hiAddr)+0x20) +0x28 )
elseif ( hitv==3 ) then
-- print( 'accessories' )
-- print ( readPointer(readPointer(hiAddr)+0x20) +0x10 )
-- print ( readBytes( readPointer(readPointer(hiAddr)+0x20) +0x10 ) )
chipspinit(1,readPointer(readPointer(hiAddr)+0x20) +0x10 )
else
-- print( 'nada' )
hicpMR = al.getMemoryRecordByDescription('[chips]')
if (hicpMR) then hicpMR.destroy() end
end
hicpMR = al.getMemoryRecordByDescription('[chips]')
if (hicpMR) then
hinc = tonumber(hicpMR[0].Value)
hicpMR.Active = true
end
else
hicpMR = al.getMemoryRecordByDescription('[chips]')
if (hicpMR) then
if ( hicpMR.Active ) then
thinc = tonumber(hicpMR[0].Value)
if ( thinc ~= hinc ) then
-- print (hicpMR[0].Value)
hinc = thinc
if ( hitv==0 ) then
-- print (hicpMR.Count)
-- print (hicpMR[0].Description..' : '..hicpMR[0].Value)
-- print (hicpMR[1].Description)
-- print (hicpMR[2].Description)
chipspcreate(0x20,readPointer(readPointer(hiAddr)+0x20) +0x28)
elseif ( hitv==3 ) then
chipspcreate(0x8,readPointer(readPointer(hiAddr)+0x20) +0x10)
end
end
end
end
end
end
end
end
thread4.terminate()
end
function chipspinit(ctype,hicna)
if (ctype == 0) then
chipsoffset=0x20
elseif (ctype == 1) then
chipsoffset=0x8
end
local hicpMR = al.getMemoryRecordByDescription('[chips]')
if (hicpMR) then
-- print ('has chips p')
while hicpMR.Count>0 do hicpMR[0].destroy() end
else
-- print ('no chips p')
-- print (hiMR.Description)
local hicpMR = al.createMemoryRecord()
hicpMR.Description = '[chips]'
hicpMR.Type = vtByteArray
hicpMR.AOBSize = 0
hicpMR.setAddress('+0x20')
hicpMR.OffsetCount = 1
hicpMR.Offset[0] = 0
hicpMR.Color = 0x000080
hicpMR.Options = 'moHideChildren,moDeactivateChildrenAsWell'
hicpMR.appendToEntry(hiMR)
-- tpMR = al.getMemoryRecordByDescription('[weapons chips]')
-- print (tpMR.Type)
-- print (tpMR.Address)
-- print (tpMR.getOffset(0))
end
-- print (chipsoffset)
hicpMR = al.getMemoryRecordByDescription('[chips]')
newMR = al.createMemoryRecord()
newMR.Description = '# of chips'
newMR.Type = vtDword
newMR.setAddress(string.format("+%X",chipsoffset+ 0x8) )
newMR.Color = 0x0000ff
newMR.appendToEntry(hicpMR)
-- hicpMR = al.getMemoryRecordByDescription('[chips]')
chipspcreate(chipsoffset,hicna)
end
function chipspcreate(co,hicna)
-- sleep(100)
local cpnum = readBytes(hicna)
-- print (readBytes(hicna))
-- print (cpnum)
-- if (cpnum>10) then
-- cpnum = 10
-- writeBytes(hicna,cpum)
-- end
hicpMR = al.getMemoryRecordByDescription('[chips]')
if (hicpMR) then
-- cpnum = tonumber(hicpMR[0].Value)
-- print (cpnum)
if (cpnum>10) then
cpnum = 10
hicpMR[0].Value = '10'
end
end
hicpMR = al.getMemoryRecordByDescription('[chips]')
while hicpMR.Count>1 do hicpMR[1].destroy() end
for i=0,cpnum -1 do
local newMR = al.createMemoryRecord()
newMR.Description = ( string.format("[%.2d]",i+1) )
-- print (string.format("[%.2d]",i+1))
newMR.Type = vtByteArray
newMR.AOBSize = 0
newMR.setAddress(string.format("+%X",co) )
newMR.OffsetCount = 1
newMR.Offset[0] = i*8
newMR.Color = 0x000080
newMR.Options = 'moHideChildren,moDeactivateChildrenAsWell'
newMR.appendToEntry(hicpMR)
local newMR2 = al.createMemoryRecord()
newMR2.Description = ('chip id')
newMR2.Type = vtByte
newMR2.setAddress('+0')
newMR2.Color = 0x0000ff
newMR2.appendToEntry(newMR)
newMR2.DropDownList.Text = chipDropDownList.Text
newMR2.DropDownReadOnly = true
newMR2.DropDownDescriptionOnly = false
newMR2.DisplayAsDropDownListItem = true
newMR2 = al.createMemoryRecord()
newMR2.Description = ('modifier')
newMR2.Type = vtSingle
newMR2.setAddress('+4')
newMR2.Color = 0x0000ff
newMR2.appendToEntry(newMR)
end
end
----------------------------------
if syntaxcheck then return end
hichipupdateloop = true
createThread(hichipupdatethread)
{$asm}
///*****************************************///
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
{$lua}
if syntaxcheck then return end
hichipupdateloop = false
{$asm}
///*****************************************///
13118
"[highlighted item]"
1
000080
Array of byte
0
pHighlightedItem
0
13117
"+0"
0000FF
4 Bytes
+0
13119
"+4"
1
0000FF
4 Bytes
+4
13120
"id?"
1
0000FF
4 Bytes
+8
13114
"quantity"
0000FF
4 Bytes
+10
13142
"+14"
0000FF
4 Bytes
+14
13143
"equipped flag"
0000FF
Binary
0
1
0
+0
13144
"obtained flag?"
0000FF
Binary
1
1
0
+0
13145
"not new flag"
0000FF
Binary
2
1
0
+0
13146
"type"
1
0000FF
Byte
+0x18
13152
"+19"
1
0000FF
Byte
+19
13147
"+1a"
1
0000FF
2 Bytes
+1a
13150
"+1c"
0000FF
4 Bytes
+1c
13034
""
1
13033
"aobt1"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(aobt1,SAOFB-Win64-Shipping.exe,75 05 40 ** ** 74 ** 80 ** 00 75)
registersymbol(aobt1)
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
unregistersymbol(aobt1)
13039
"aobt2"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
luaCall(lua_aobscan("aobt2","SAOFB-Win64-Shipping.exe","75 03 0F 57 ** F3 41 ** ** ** ** 40 ** ** ** 0F84",2))
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
unregistersymbol(aobt2)
4
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
alloc(newmem,2048,"SAOFB-Win64-Shipping.exe"+3E726F)
label(returnhere)
label(originalcode)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
mov rsi,pEquippedWeapon
cmp [rsi],rax
jne @f
cmp dword ptr [rax+67c],1
jge @f
mov dword ptr [rax+67c],1
@@:
jmp exit
originalcode:
mov eax,[rax+0000067C]
exit:
jmp returnhere
///
"SAOFB-Win64-Shipping.exe"+3E726F:
jmp newmem
nop
returnhere:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
"SAOFB-Win64-Shipping.exe"+3E726F:
db 8B 80 7C 06 00 00
//Alt: mov eax,[rax+0000067C]
9
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
alloc(newmem2,2048,"SAOFB-Win64-Shipping.exe"+3AB9E6)
label(returnhere2)
label(originalcode2)
label(exit2)
newmem2: //this is allocated memory, you have read,write,execute access
//place your code here
mov eax,[rbx+0000067C]
mov rcx,pEquippedWeapon
cmp [rcx],rbx
jne @f
test eax,eax
jg @f
setle al
@@:
jmp exit2
originalcode2:
mov eax,[rbx+0000067C]
exit2:
jmp returnhere2
///
"SAOFB-Win64-Shipping.exe"+3AB9E6:
jmp newmem2
nop
returnhere2:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem2)
"SAOFB-Win64-Shipping.exe"+3AB9E6:
db 8B 83 7C 06 00 00
//Alt: mov eax,[rbx+0000067C]
11
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
alloc(newmem4,2048,"SAOFB-Win64-Shipping.exe"+3E6E8A)
label(returnhere4)
label(originalcode4)
label(exit4)
newmem4: //this is allocated memory, you have read,write,execute access
//place your code here
mov rsi,pEquippedWeapon
cmp [rsi],rax
jne @f
or dil,1
originalcode4:
or dil,dl
or dil,r9l
exit4:
jmp returnhere4
///
"SAOFB-Win64-Shipping.exe"+3E6E8A:
jmp newmem4
nop
returnhere4:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
"SAOFB-Win64-Shipping.exe"+3E6E8A:
db 40 0A FA 41 0A F9
//Alt: or dil,dl
//Alt: or dil,r9l
10
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
alloc(newmem3,2048,"SAOFB-Win64-Shipping.exe"+3E6E78)
label(returnhere3)
label(originalcode3)
label(exit3)
newmem3: //this is allocated memory, you have read,write,execute access
//place your code here
mov rsi,pEquippedWeapon
cmp [rsi],rax
jne @f
cmp dword ptr [rax+67c],1
jge @f
mov dword ptr [rax+67c],1
originalcode3:
cmp dword ptr [rax+0000067C],00
exit3:
jmp returnhere3
///
"SAOFB-Win64-Shipping.exe"+3E6E78:
jmp newmem3
nop
nop
returnhere3:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem3)
"SAOFB-Win64-Shipping.exe"+3E6E78:
db 83 B8 7C 06 00 00 00
//Alt: cmp dword ptr [rax+0000067C],00
12
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
alloc(newmem5,2048,"SAOFB-Win64-Shipping.exe"+3AB9F2)
label(returnhere5)
label(originalcode5)
label(exit5)
newmem5: //this is allocated memory, you have read,write,execute access
//place your code here
test eax,eax
jg @f
setle al
originalcode5:
mov [rbx+0000067C],eax
exit5:
jmp returnhere5
///
"SAOFB-Win64-Shipping.exe"+3AB9F2:
jmp newmem5
nop
returnhere5:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem5)
"SAOFB-Win64-Shipping.exe"+3AB9F2:
db 89 83 7C 06 00 00
//Alt: mov [rbx+0000067C],eax
13022
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
"SAOFB-Win64-Shipping.exe"+5F5AE96:
db EB
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
"SAOFB-Win64-Shipping.exe"+5F5AE96:
db 79
//Alt: jns
13023
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
"SAOFB-Win64-Shipping.exe"+6C4A789:
db 90 90
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
"SAOFB-Win64-Shipping.exe"+6C4A789:
db 7C 3A
//Alt: jl SAOFB-Win64-Shipping.exe+6C4A7C5
13040
"walk key"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
define(walkkeyiddefault,14)
aobscanmodule(yForceWrite1AOB,SAOFB-Win64-Shipping.exe,74 03 0F 57 ** F3 41 ** ** ** ** 40 ** ** ** 0F84)
registersymbol(yForceWrite1AOB)
label(bWalkKeyID)
registersymbol(bWalkKeyID)
label(bWalkKeyPressed)
registersymbol(bWalkKeyPressed)
label(dMoveSpeedMultiplier)
registersymbol(dMoveSpeedMultiplier)
alloc(newmem,2048,yForceWrite1AOB+5) //"SAOFB-Win64-Shipping.exe"+4F27D7)
label(returnhere)
label(originalcode_yForceWrite1AOB)
registersymbol(originalcode_yForceWrite1AOB)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
mov rax,bWalkKeyPressed
cmp byte ptr [rax],1
jne @f
mov rax,dMoveSpeedMultiplier
mulss xmm0,[rax]
originalcode_yForceWrite1AOB:
readmem(yForceWrite1AOB+5,6)
//movss [r11+3C],xmm0
exit:
jmp returnhere
///
bWalkKeyID:
dd walkkeyiddefault
bWalkKeyPressed:
dd 0
dMoveSpeedMultiplier:
dd (float)0.4
///
yForceWrite1AOB+5: //"SAOFB-Win64-Shipping.exe"+4F27D7:
jmp newmem
nop
returnhere:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
yForceWrite1AOB+5: //"SAOFB-Win64-Shipping.exe"+4F27D7:
readmem(originalcode_yForceWrite1AOB,6)
//db F3 41 0F 11 43 3C
//Alt: movss [r11+3C],xmm0
unregistersymbol(originalcode_yForceWrite1AOB)
unregistersymbol(bWalkKeyID)
unregistersymbol(bWalkKeyPressed)
unregistersymbol(dMoveSpeedMultiplier)
13041
""
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
luaCall(lua_aobscan("yForceWrite2AOB","SAOFB-Win64-Shipping.exe","75 03 0F 57 ** F3 41 ** ** ** ** 40 ** ** ** 0F84",1))
alloc(newmem2,2048,yForceWrite2AOB+5) //"SAOFB-Win64-Shipping.exe"+4F2887)
label(returnhere2)
label(originalcode2_yForceWrite2AOB)
registersymbol(originalcode2_yForceWrite2AOB)
label(exit2)
newmem2: //this is allocated memory, you have read,write,execute access
//place your code here
mov rax,bWalkKeyPressed
cmp byte ptr [rax],1
jne @f
mov rax,dMoveSpeedMultiplier
mulss xmm0,[rax]
originalcode2_yForceWrite2AOB:
readmem(yForceWrite2AOB+5,6)
//movss [r11+3C],xmm0
exit2:
jmp returnhere2
///
yForceWrite2AOB+5: //"SAOFB-Win64-Shipping.exe"+4F2887:
jmp newmem2
nop
returnhere2:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem2)
yForceWrite2AOB+5: //"SAOFB-Win64-Shipping.exe"+4F2887:
readmem(originalcode2_yForceWrite2AOB,6)
//db F3 41 0F 11 43 3C
//Alt: movss [r11+3C],xmm0
unregistersymbol(originalcode2_yForceWrite2AOB)
13042
""
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
luaCall(lua_aobscan("xForceWrite1AOB","SAOFB-Win64-Shipping.exe","75 03 0F 57 ** F3 41 ** ** ** ** 40 ** ** ** 0F84",2))
alloc(newmem3,2048,xForceWrite1AOB+5) //"SAOFB-Win64-Shipping.exe"+4F2937)
label(returnhere3)
label(originalcode3_xForceWrite1AOB)
registersymbol(originalcode3_xForceWrite1AOB)
label(exit3)
newmem3: //this is allocated memory, you have read,write,execute access
//place your code here
mov rax,bWalkKeyPressed
cmp byte ptr [rax],1
jne @f
mov rax,dMoveSpeedMultiplier
mulss xmm0,[rax]
originalcode3_xForceWrite1AOB:
readmem(xForceWrite1AOB+5,6)
//movss [r11+38],xmm0
exit3:
jmp returnhere3
///
xForceWrite1AOB+5: //"SAOFB-Win64-Shipping.exe"+4F2937:
jmp newmem3
nop
returnhere3:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem3)
xForceWrite1AOB+5: //"SAOFB-Win64-Shipping.exe"+4F2937:
readmem(originalcode3_xForceWrite1AOB,6)
//db F3 41 0F 11 43 38
//Alt: movss [r11+38],xmm0
unregistersymbol(originalcode3_xForceWrite1AOB)
13043
""
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(xForceWrite2AOB,SAOFB-Win64-Shipping.exe,74 03 0F 57 C1 F3 ** ** ** ** ** 0F ** ** ** 0F 83)
registersymbol(xForceWrite2AOB)
alloc(newmem4,2048,xForceWrite2AOB+5) //"SAOFB-Win64-Shipping.exe"+4F29E7)
label(returnhere4)
label(originalcode4_xForceWrite2AOB)
registersymbol(originalcode4_xForceWrite2AOB)
label(exit4)
newmem4: //this is allocated memory, you have read,write,execute access
//place your code here
mov rax,bWalkKeyPressed
cmp byte ptr [rax],1
jne @f
mov rax,dMoveSpeedMultiplier
mulss xmm0,[rax]
originalcode4_xForceWrite2AOB:
readmem(xForceWrite2AOB+5,6)
//movss [r11+38],xmm0
exit4:
jmp returnhere4
///
xForceWrite2AOB+5: //"SAOFB-Win64-Shipping.exe"+4F29E7:
jmp newmem4
nop
returnhere4:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem4)
xForceWrite2AOB+5: //"SAOFB-Win64-Shipping.exe"+4F29E7:
readmem(originalcode4_xForceWrite2AOB,6)
//db F3 41 0F 11 43 38
//Alt: movss [r11+38],xmm0
unregistersymbol(originalcode4_xForceWrite2AOB)
13044
""
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
///*****************************************///
//modified from TheyCallMeTim13's lua keylistener script
//http://fearlessrevolution.com/viewtopic.php?f=4&t=6041&start=60#p62657
{$lua}
local function walkkeyLuaThread(thread2)
local addr2 = getAddressSafe('bWalkKeyPressed')
while RunWalkkeyLuaThreadLoop do
sleep(100)
if addr2 then
if ( isKeyPressed( readInteger('bWalkKeyID') ) ) then
writeBytes(addr2, 1)
else
writeBytes(addr2, 0)
end
else
addr2 = getAddressSafe('bWalkKeyPressed')
end
end
thread2.terminate()
-- while RunWalkkeyLuaThreadLoop do
-- if ( isKeyPressed(VK_CAPITAL) ) then
-- writeBytes("bWalkKeyPressed" ,1)
-- else
-- writeBytes("bWalkKeyPressed" ,0)
-- end
-- end
-- thread2.terminate()
end
----------------------------------
if syntaxcheck then return end
RunWalkkeyLuaThreadLoop = true
createThread(walkkeyLuaThread)
{$asm}
///*****************************************///
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
{$lua}
if syntaxcheck then return end
RunWalkkeyLuaThreadLoop = false
{$asm}
///*****************************************///
13035
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
"SAOFB-Win64-Shipping.exe"+6C4A7B5:
db 90 90
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
"SAOFB-Win64-Shipping.exe"+6C4A7B5:
db 7C 0E
//Alt: jl SAOFB-Win64-Shipping.exe+6C4A7C5
13036
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
"SAOFB-Win64-Shipping.exe"+6C4A789:
db 90 90
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
"SAOFB-Win64-Shipping.exe"+6C4A789:
db 7C 3A
//Alt: jl SAOFB-Win64-Shipping.exe+6C4A7C5
13037
"4 Bytes"
4 Bytes
3555E3D8
13038
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
"SAOFB-Win64-Shipping.exe"+7CF430:
db B0 01
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
"SAOFB-Win64-Shipping.exe"+7CF430:
db 32 C0
//Alt: xor al,al
13045
"No description"
4 Bytes
27901420
13046
"No description"
4 Bytes
344EE9D0
13047
"No description"
4 Bytes
4DBBAD6C
13048
"No description"
4 Bytes
59482994
13049
"No description"
4 Bytes
59483E38
13050
"No description"
4 Bytes
59483E44
13051
"No description"
4 Bytes
597BA300
13052
"No description"
4 Bytes
59B23450
13053
"No description"
Byte
452F50E0
13054
"No description"
Byte
6B002410
13055
"No Description"
4 Bytes
25CE0EB0
13056
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
"SAOFB-Win64-Shipping.exe"+70D6B4:
db 90 48 8B C2
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
"SAOFB-Win64-Shipping.exe"+70D6B4:
db 48 0F 4E C2
//Alt: cmovle rax,rdx
13058
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
"SAOFB-Win64-Shipping.exe"+70D764:
db 90 48 8B C2
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
"SAOFB-Win64-Shipping.exe"+70D764:
db 48 0F 4E C2
//Alt: cmovle rax,rdx
13057
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
alloc(newmem,2048,"SAOFB-Win64-Shipping.exe"+70D52C)
label(returnhere)
label(originalcode)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
xor edx,edx
lea rcx,[rbp+70]
jmp exit
originalcode:
mov edx,[rsi+30]
lea rcx,[rbp+70]
exit:
jmp returnhere
///
"SAOFB-Win64-Shipping.exe"+70D52C:
jmp newmem
nop
nop
returnhere:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
"SAOFB-Win64-Shipping.exe"+70D52C:
db 8B 56 30 48 8D 4D 70
//Alt: mov edx,[rsi+30]
//Alt: lea rcx,[rbp+70]
13059
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
alloc(newmem2,2048,"SAOFB-Win64-Shipping.exe"+70D5C3)
label(returnhere2)
label(originalcode2)
label(exit2)
newmem2: //this is allocated memory, you have read,write,execute access
//place your code here
xor edx,edx
lea rcx,[rbp+58]
jmp exit2
originalcode2:
mov edx,[rsi+34]
lea rcx,[rbp+58]
exit2:
jmp returnhere2
///
"SAOFB-Win64-Shipping.exe"+70D5C3:
jmp newmem2
nop
nop
returnhere2:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem2)
"SAOFB-Win64-Shipping.exe"+70D5C3:
db 8B 56 34 48 8D 4D 58
//Alt: mov edx,[rsi+34]
//Alt: lea rcx,[rbp+58]
13060
"No Description"
4 Bytes
39F61070
13061
"No Description"
4 Bytes
+4
13062
"No Description"
4 Bytes
39F60430
13063
"No Description"
4 Bytes
39F60430
13064
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
"SAOFB-Win64-Shipping.exe"+70FADA:
db 90 39 C9
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
"SAOFB-Win64-Shipping.exe"+70FADA:
db 39 4D A0
//Alt: cmp [rbp-60],ecx
13065
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
"SAOFB-Win64-Shipping.exe"+70FAE7:
db 90 39 C0
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
"SAOFB-Win64-Shipping.exe"+70FAE7:
db 39 45 B0
//Alt: cmp [rbp-50],eax
13067
"No Description"
4 Bytes
41D01CF0
13068
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
"SAOFB-Win64-Shipping.exe"+6BC9EFA:
db 90 39 C0
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
"SAOFB-Win64-Shipping.exe"+6BC9EFA:
db 39 45 70
//Alt: cmp [rbp+70],eax
13069
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
"SAOFB-Win64-Shipping.exe"+6BC9F26:
db B0 01
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
"SAOFB-Win64-Shipping.exe"+6BC9F26:
db 30 C0
//Alt: xor al,al
13070
"No Description"
4 Bytes
39420EB0
13071
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(statsChkOnEquipAccessoriesAOB,SAOFB-Win64-Shipping.exe,E8 ** ** ** ** 48 ** ** ** 48 ** ** 74 05 E8 ** ** ** ** 32 C0 EB)
registersymbol(statsChkOnEquipAccessoriesAOB)
statsChkOnEquipAccessoriesAOB+13: //"SAOFB-Win64-Shipping.exe"+6F437D:
db B0 01
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
statsChkOnEquipAccessoriesAOB+13: //"SAOFB-Win64-Shipping.exe"+6F437D:
db 32 C0
//Alt: xor al,al
13072
"No description"
Float
54B31208
13073
"No description"
Float
54B3120C
13074
"No description"
Float
54B31210
13075
"No description"
Float
7065B148
13076
"No description"
Float
7065B14C
13077
"No description"
Float
7065B150
13078
"No Description"
Float
6F5A4688
13082
"No description"
Float
+4
13083
"No description"
Float
+4
13079
"No Description"
Float
6F5A46B0
13085
"No description"
Float
+4
13084
"No description"
Float
+4
13080
"No Description"
Float
3A17EE08
13087
"No description"
Float
+4
13086
"No description"
Float
+4
13081
"No Description"
Float
3A17EE20
13089
"No description"
Float
+4
13088
"No description"
Float
+4
13090
"No description"
Float
4658307C
13091
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(partyHealthRead1CallerAOB,SAOFB-Win64-Shipping.exe,53 48 ** ** ** 48 ** ** ** 0f ** ** ** ** 0f ** ** 48 ** ** 0f 84)
registersymbol(partyHealthRead1CallerAOB)
label(pPartyBase)
registersymbol(pPartyBase)
label(pParty)
registersymbol(pParty)
alloc(newmem2,2048,partyHealthRead1CallerAOB+5) //"SAOFB-Win64-Shipping.exe"+5BF3BA5)
label(returnhere2)
label(originalcode2_partyHealthRead1CallerAOB)
registersymbol(originalcode2_partyHealthRead1CallerAOB)
label(exit2)
newmem2: //this is allocated memory, you have read,write,execute access
//place your code here
xor rax,rax
mov al,[rcx+1c]
dec al
mov rbx,pPartyBase
mov [rbx+rax*8],rcx
readmem(partyHealthRead1CallerAOB+5,4)
//mov rbx,[rcx+58]
push rbx
mov rbx,pParty
pop [rbx+rax*8]
originalcode2_partyHealthRead1CallerAOB:
readmem(partyHealthRead1CallerAOB+5,9)
//mov rbx,[rcx+58]
//movaps [rsp+20],xmm7
exit2:
jmp returnhere2
///
pPartyBase:
dq 0
dq 0
dq 0
dq 0
pParty:
dq 0
dq 0
dq 0
dq 0
///
partyHealthRead1CallerAOB+5: //"SAOFB-Win64-Shipping.exe"+5BF3BA5:
jmp newmem2
nop
nop
nop
nop
returnhere2:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem2)
partyHealthRead1CallerAOB+5: //"SAOFB-Win64-Shipping.exe"+5BF3BA5:
readmem(originalcode2_partyHealthRead1CallerAOB,9)
//db 48 8B 59 58 0F 29 7C 24 20
//Alt: mov rbx,[rcx+58]
//Alt: movaps [rsp+20],xmm7
unregistersymbol(originalcode2_partyHealthRead1CallerAOB)
unregistersymbol(pPartyBase)
unregistersymbol(pParty)
13092
"4 Bytes"
4 Bytes
5224E3AC
13105
"enable .0"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
//vng21092's aobscan lua script
{$lua}
function lua_aobscan(name,module,bytes,index)
index = index - 1
if(module == "") then
local resultSet = AOBScan(bytes)
if(resultSet == nil) then
unregisterSymbol(name)
print(name.." not found")
else
unregisterSymbol(name)
registerSymbol(name,resultSet[index])
resultSet.destroy()
end
else
if(getModuleSize(module) == nil) then
print("Module "..module.." not found")
else
local memScanner = createMemScan()
local memFoundList = createFoundList(memScanner)
memScanner.firstScan(
soExactValue,vtByteArray,rtRounded,bytes,nil,
getAddress(module),(getAddress(module)+getModuleSize(module)),"",
fsmNotAligned,"",true,false,false,false)
memScanner.waitTillDone()
memFoundList.initialize()
if(memFoundList.Count == 0) then
unregisterSymbol(name)
print(name.." in module "..module.." not found")
else
unregisterSymbol(name)
registerSymbol(name,memFoundList.Address[index])
end
memScanner.destroy()
memFoundList.destroy()
end
end
end
{$asm}
aobscanmodule(equippedWeaponAmmoReadAOB,SAOFB-Win64-Shipping.exe,8B ** ** ** 00 00 48 8B ** 89 ** ** ** 00 00 E8 ** ** ** ** 48 ** ** ** ** 00 00 89)
registersymbol(equippedWeaponAmmoReadAOB)
label(pEquippedWeapon)
registersymbol(pEquippedWeapon)
alloc(newmem,2048,equippedWeaponAmmoReadAOB) //"SAOFB-Win64-Shipping.exe"+38F788)
label(returnhere)
label(originalcode_equippedWeaponAmmoReadAOB)
registersymbol(originalcode_equippedWeaponAmmoReadAOB)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
mov rcx,pEquippedWeapon
mov [rcx],rsi
originalcode_equippedWeaponAmmoReadAOB:
readmem(equippedWeaponAmmoReadAOB,6)
//mov eax,[rsi+0000067C]
exit:
jmp returnhere
///
pEquippedWeapon:
///
equippedWeaponAmmoReadAOB: //"SAOFB-Win64-Shipping.exe"+38F788:
jmp newmem
nop
returnhere:
///*******************************************///
aobscanmodule(partyHealthRead1CallerAOB,SAOFB-Win64-Shipping.exe,53 48 ** ** ** 48 ** ** ** 0f ** ** ** ** 0f ** ** 48 ** ** 0f 84)
registersymbol(partyHealthRead1CallerAOB)
label(pPartyBase)
registersymbol(pPartyBase)
label(pParty)
registersymbol(pParty)
alloc(newmem2,2048,partyHealthRead1CallerAOB+5) //"SAOFB-Win64-Shipping.exe"+5BF3BA5)
label(returnhere2)
label(originalcode2_partyHealthRead1CallerAOB)
registersymbol(originalcode2_partyHealthRead1CallerAOB)
label(exit2)
newmem2: //this is allocated memory, you have read,write,execute access
//place your code here
xor rax,rax
mov al,[rcx+1c]
dec al
mov rbx,pPartyBase
mov [rbx+rax*8],rcx
readmem(partyHealthRead1CallerAOB+5,4)
//mov rbx,[rcx+58]
push rbx
mov rbx,pParty
pop [rbx+rax*8]
originalcode2_partyHealthRead1CallerAOB:
readmem(partyHealthRead1CallerAOB+5,9)
//mov rbx,[rcx+58]
//movaps [rsp+20],xmm7
exit2:
jmp returnhere2
///
pPartyBase:
dq 0
dq 0
dq 0
dq 0
dq 0
pParty:
dq 0
dq 0
dq 0
dq 0
dq 0
///
partyHealthRead1CallerAOB+5: //"SAOFB-Win64-Shipping.exe"+5BF3BA5:
jmp newmem2
nop
nop
nop
nop
returnhere2:
///*******************************************///
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
equippedWeaponAmmoReadAOB: //"SAOFB-Win64-Shipping.exe"+38F788:
readmem(originalcode_equippedWeaponAmmoReadAOB,6)
//db 8B 86 7C 06 00 00
//Alt: mov eax,[rsi+0000067C]
unregistersymbol(originalcode_equippedWeaponAmmoReadAOB)
unregistersymbol(pEquippedWeapon)
///*******************************************///
dealloc(newmem2)
partyHealthRead1CallerAOB+5: //"SAOFB-Win64-Shipping.exe"+5BF3BA5:
readmem(originalcode2_partyHealthRead1CallerAOB,9)
//db 48 8B 59 58 0F 29 7C 24 20
//Alt: mov rbx,[rcx+58]
//Alt: movaps [rsp+20],xmm7
unregistersymbol(originalcode2_partyHealthRead1CallerAOB)
unregistersymbol(pPartyBase)
unregistersymbol(pParty)
///*******************************************///
13093
"undead .0"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
define(minhealthdefault,(float)1)
aobscanmodule(healthCalOnHitAOB,SAOFB-Win64-Shipping.exe,E8 ** ** ** ** EB ** F3 0F ** ** ** ** ** ** F3 ** ** ** ** 44 0F ** ** ** ** ** ** ** 0F)
registersymbol(healthCalOnHitAOB)
label(dMinHealth)
registersymbol(dMinHealth)
alloc(newmem,2048,healthCalOnHitAOB+7) //"SAOFB-Win64-Shipping.exe"+2EDABA)
label(returnhere)
label(originalcode_healthCalOnHitAOB)
registersymbol(originalcode_healthCalOnHitAOB)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
readmem(healthCalOnHitAOB+7,8)
//movss xmm0,[rbx+13fc]
push rax
mov rcx,pParty
xor rax,rax
@@:
cmp [rcx+rax*8],rbx
je @f
inc rax
cmp dword ptr [rcx+rax*8+4],0
jne @b
cmp dword ptr [rcx+rax*8],0
jne @b
jmp end
@@:
mov rax,dMinHealth
subss xmm0,xmm8
comiss xmm0,[rax]
jae @f
movss xmm0,[rax]
addss xmm0,xmm8
readmem(healthCalOnHitAOB+7,2)
db 11
readmem(healthCalOnHitAOB+a,5)
//movss [rbx+13fc],xmm0
end:
pop rax
originalcode_healthCalOnHitAOB:
readmem(healthCalOnHitAOB+7,8)
//movss xmm0,[rbx+000013FC]
exit:
jmp returnhere
///
dMinHealth:
dd minhealthdefault
///
healthCalOnHitAOB+7: //"SAOFB-Win64-Shipping.exe"+2EDABA:
jmp newmem
nop
nop
nop
returnhere:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
healthCalOnHitAOB+7: //"SAOFB-Win64-Shipping.exe"+2EDABA:
readmem(originalcode_healthCalOnHitAOB,8)
//db F3 0F 10 83 FC 13 00 00
//Alt: movss xmm0,[rbx+000013FC]
unregistersymbol(originalcode_healthCalOnHitAOB)
unregistersymbol(dMinHealth)
13094
"No Description"
Float
630B85CC
13095
"No Description"
Float
630BA23C
13096
"No Description"
Float
68EFF78C
13097
"No Description"
Float
4E9D4CEC
13098
"No Description"
Float
4B86695C
13099
"No Description"
Float
4C7F307C
13100
"No Description"
Float
9A06DB1C
13101
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(playerHealthRead1CallerAOB,SAOFB-Win64-Shipping.exe,EB ** 48 ** ** 41 0F ** ** E8 ** ** ** ** 84 C0 75)
registersymbol(playerHealthRead1CallerAOB)
///
aobscanmodule(partyHealthRead1CallerAOB,SAOFB-Win64-Shipping.exe,53 48 ** ** ** 48 ** ** ** 0f ** ** ** ** 0f ** ** 48 ** ** 0f 84)
registersymbol(partyHealthRead1CallerAOB)
///
label(pPlayer)
registersymbol(pPlayer)
alloc(newmem3,2048,playerHealthRead1CallerAOB+2) //"SAOFB-Win64-Shipping.exe"+278168)
label(returnhere3)
label(originalcode3_playerHealthRead1CallerAOB)
registersymbol(originalcode3_playerHealthRead1CallerAOB)
label(exit3)
newmem3: //this is allocated memory, you have read,write,execute access
//place your code here
mov rcx,[rbx]
push rcx
mov rcx,pPlayer
pop [rcx+8]
mov rcx,[rbx]
db 48 8B 49
readmem(partyHealthRead1CallerAOB+8,1)
//mov rcx,[rcx+58]
push rcx
mov rcx,pPlayer
pop [rcx]
//48 8B 59 58 - mov rbx,[rcx+58]
originalcode3_playerHealthRead1CallerAOB:
readmem(playerHealthRead1CallerAOB+2,7)
//mov rcx,[rbx]
//movaps xmm1,xmm8
exit3:
jmp returnhere3
///
pPlayer:
///
playerHealthRead1CallerAOB+2: //"SAOFB-Win64-Shipping.exe"+278168:
jmp newmem3
nop
nop
returnhere3:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem3)
playerHealthRead1CallerAOB+2: //"SAOFB-Win64-Shipping.exe"+278168:
readmem(originalcode3_playerHealthRead1CallerAOB,7)
//db 48 8B 0B 41 0F 28 C8
//Alt: mov rcx,[rbx]
//Alt: movaps xmm1,xmm8
unregistersymbol(originalcode3_playerHealthRead1CallerAOB)
unregistersymbol(pPlayer)
13106
"No Description"
Float
96BFFCBC
13107
"No Description"
4 Bytes
5359A150
13108
"4 Bytes"
4 Bytes
42B01A74
13109
"No Description"
4 Bytes
5359A174
13110
"No Description"
4 Bytes
535994D0
13113
"No description"
4 Bytes
2C1243B0
13115
"No description"
1
4 Bytes
2C1243A8
13116
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(highlightedItemCallerAOB,SAOFB-Win64-Shipping.exe,40 53 48 ** ** ** 48 8B ** E8 ** ** ** ** 48 ** ** 32 C0 0F)
registersymbol(highlightedItemCallerAOB)
label(pHighlightedItem)
registersymbol(pHighlightedItem)
alloc(newmem4,2048,highlightedItemCallerAOB+2) //"SAOFB-Win64-Shipping.exe"+4A2AF2)
label(returnhere4)
label(originalcode4_highlightedItemCallerAOB)
registersymbol(originalcode4_highlightedItemCallerAOB)
label(exit4)
newmem4: //this is allocated memory, you have read,write,execute access
//place your code here
mov rbx,pHighlightedItem
mov [rbx],rcx
//mov ebx,[rcx+10]
originalcode4_highlightedItemCallerAOB:
readmem(highlightedItemCallerAOB+2,7)
//sub rsp,20
//mov rbx,rcx
exit4:
jmp returnhere4
///
pHighlightedItem:
///
highlightedItemCallerAOB+2: //"SAOFB-Win64-Shipping.exe"+4A2AF2:
jmp newmem4
nop
nop
returnhere4:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem4)
highlightedItemCallerAOB+2: //"SAOFB-Win64-Shipping.exe"+4A2AF2:
readmem(originalcode4_highlightedItemCallerAOB,7)
//db 48 83 EC 20 48 8B D9
//Alt: sub rsp,20
//Alt: mov rbx,rcx
unregistersymbol(originalcode4_highlightedItemCallerAOB)
unregistersymbol(pHighlightedItem)
13121
"No Description"
4 Bytes
2C120B40
13122
"No Description"
4 Bytes
2C124CE0
13123
"+ im ew"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(materialsReqChkForEnhanceWeaponsAOB,SAOFB-Win64-Shipping.exe,E8 ** ** ** ** 3B ** 41 ** ** ** 0F 9D C0 20 ** ** ** E8)
registersymbol(materialsReqChkForEnhanceWeaponsAOB)
materialsReqChkForEnhanceWeaponsAOB+b: //"SAOFB-Win64-Shipping.exe"+7BCBC1:
db 90 B0 01
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
materialsReqChkForEnhanceWeaponsAOB+b: //"SAOFB-Win64-Shipping.exe"+7BCBC1:
db 0F 9D C0
//Alt: setge al
13124
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
"SAOFB-Win64-Shipping.exe"+6BC8493:
db 90 90
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
"SAOFB-Win64-Shipping.exe"+6BC8493:
db 75 09
//Alt: jne SAOFB-Win64-Shipping.exe+6BC849E
13125
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
"SAOFB-Win64-Shipping.exe"+6BC8487:
db 90 90
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
"SAOFB-Win64-Shipping.exe"+6BC8487:
db 75 15
//Alt: jne SAOFB-Win64-Shipping.exe+6BC849E
13126
"no"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
"SAOFB-Win64-Shipping.exe"+7BEBE5:
db 90 90
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
"SAOFB-Win64-Shipping.exe"+7BEBE5:
db 0F 84
//Alt: je SAOFB-Win64-Shipping.exe+7BF00C
13127
"+ im co"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(materialsReqChkForTransformWeaponsAOB,SAOFB-Win64-Shipping.exe,E8 ** * ** ** 45 ** ** 8D ** ** 41 ** ** ** 3B ** 44 0F 4D C0 45)
registersymbol(materialsReqChkForTransformWeaponsAOB)
materialsReqChkForTransformWeaponsAOB+11: //"SAOFB-Win64-Shipping.exe"+798B35:
db 90 44 8B C0
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
materialsReqChkForTransformWeaponsAOB+11: //"SAOFB-Win64-Shipping.exe"+798B35:
db 44 0F 4D C0
//Alt: cmovge r8d,eax
13128
"No description"
1
4 Bytes
201C2248
13129
"No description"
1
4 Bytes
24C57768
13130
"No description"
1
4 Bytes
2959FB38
13131
"No description"
1
4 Bytes
2A8D4E48
13132
"No description"
1
4 Bytes
2B677758
13133
"No description"
1
4 Bytes
2B7C5B08
13134
"No description"
1
4 Bytes
2B7C67C8
13135
"No description"
1
4 Bytes
5CF97458
13136
"No description"
1
4 Bytes
6DE4A470
13137
"No description"
1
4 Bytes
70A2528C
13138
"No description"
1
4 Bytes
75955790
13139
"No description"
1
4 Bytes
B2C2EBB4
13140
"No description"
1
4 Bytes
B2CDB3CC
13141
"No description"
1
4 Bytes
B2D923FC
13148
"No Description"
2 Bytes
14495FD88
13153
"No Description"
4 Bytes
58862DE8
13154
"No description"
1
4 Bytes
201C2220
13155
"No description"
1
4 Bytes
2959EE88
13156
"No description"
1
4 Bytes
2A8D4E28
13157
"No description"
1
4 Bytes
2B677728
13158
"No description"
1
4 Bytes
2B7C5AE8
13159
"No description"
1
4 Bytes
2B7C67A8
13163
"No description"
1
4 Bytes
70FE930C
13164
"No description"
1
4 Bytes
B2CB1C20
13165
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
"SAOFB-Win64-Shipping.exe"+79BE3E:
db 90 90
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
"SAOFB-Win64-Shipping.exe"+79BE3E:
db 74 0F
//Alt: je SAOFB-Win64-Shipping.exe+79BE4F
13166
"+ id co"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(outfitDesignObtainedFlagChkOnCreateAOB,SAOFB-Win64-Shipping.exe,49 ** ** E8 ** ** ** ** 84 C0 0F 84 ** ** ** ** 48 ** ** ** ** ** ** ** 33 ** 48 ** ** ** ** 33)
registersymbol(outfitDesignObtainedFlagChkOnCreateAOB)
outfitDesignObtainedFlagChkOnCreateAOB+8: //"SAOFB-Win64-Shipping.exe"+7989FF:
db 85 DB
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
outfitDesignObtainedFlagChkOnCreateAOB+8: //"SAOFB-Win64-Shipping.exe"+7989FF:
db 84 C0
//Alt: test al,al
13167
""
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(outfitDesignObtainedFlagChkOnDisplayAOB,SAOFB-Win64-Shipping.exe,49 ** ** E8 ** ** ** ** 84 C0 74 ** 40 ** ** 48)
registersymbol(outfitDesignObtainedFlagChkOnDisplayAOB)
outfitDesignObtainedFlagChkOnDisplayAOB+8: //"SAOFB-Win64-Shipping.exe"+7BEA6E:
db 85 DB
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
outfitDesignObtainedFlagChkOnDisplayAOB+8: //"SAOFB-Win64-Shipping.exe"+7BEA6E:
db 84 C0
//Alt: test al,al
13168
"129719"
4 Bytes
39BC3870
13169
"+ i$ ew"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(moneyChkOnEnhanceWeaponsAccessAOB,SAOFB-Win64-Shipping.exe,FF ** 44 ** ** ** ** ** ** 44 ** ** 0F 9C C3 45 ** ** 44 ** ** 7C)
registersymbol(moneyChkOnEnhanceWeaponsAccessAOB)
moneyChkOnEnhanceWeaponsAccessAOB+c: //"SAOFB-Win64-Shipping.exe"+79CE90:
db 90 B3 01
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
moneyChkOnEnhanceWeaponsAccessAOB+c: //"SAOFB-Win64-Shipping.exe"+79CE90:
db 0F 9C C3
//Alt: setl bl
13170
"+ i$ tw"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(moneyChkOnTransformWeaponsAccessAOB,SAOFB-Win64-Shipping.exe,E8 ** ** ** ** 41 ** ** 89 ** 41 ** ** ** 39 ** 7E ** 83 ** ** EB)
registersymbol(moneyChkOnTransformWeaponsAccessAOB)
moneyChkOnTransformWeaponsAccessAOB+10: //"SAOFB-Win64-Shipping.exe"+6BC9C8C:
db EB
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
moneyChkOnTransformWeaponsAccessAOB+10: //"SAOFB-Win64-Shipping.exe"+6BC9C8C:
db 7E
//Alt: jle
13174
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
"SAOFB-Win64-Shipping.exe"+70FB9E:
db 90 90 90
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
"SAOFB-Win64-Shipping.exe"+70FB9E:
db C6 03 01
//Alt: mov byte ptr [rbx],01
13175
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
"SAOFB-Win64-Shipping.exe"+70FB9C:
db 90 90
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
"SAOFB-Win64-Shipping.exe"+70FB9C:
db 75 03
//Alt: jne SAOFB-Win64-Shipping.exe+70FBA1
13176
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
"SAOFB-Win64-Shipping.exe"+70FB6D:
db EB
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
"SAOFB-Win64-Shipping.exe"+70FB6D:
db 74
//Alt: je
13177
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
"SAOFB-Win64-Shipping.exe"+70FB53:
db EB
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
"SAOFB-Win64-Shipping.exe"+70FB53:
db 75
//Alt: jne
13151
"[weapons chips]"
000080
Array of byte
0
+20
0
13194
"#"
0000FF
4 Bytes
+28
13195
"+2c"
0000FF
4 Bytes
+2c
13180
"[01]"
000080
Array of byte
0
+20
0*8
13179
"id"
1:STR
2:VIT
3:INT
4:AGI
5:DEX
6:LUC
7:Weapon Attack
8:Physical Attack
9:Optical Attack
10:Explosive Attack
11:Gadget Attack
12:Damage vs Humanoid
13:Damage vs Lifeform
14:Damage vs Mech
15:Damage when off-guard
16:Damage from behind
17:Damage at max HP
18:Damage when near death
19:Weak spot Damage
20:Critical Damage increase
21:Critical Rate
22:Debuff stacking
23:Physical Defense
24:Optical Defense
25:Explosive Defense
26:Melee Defense
27:Defense vs Humanoid
28:Defense vs Lifeform
29:Defense vs Mech
30:Blaze Damage
31:Poison Damage
32:Debuff Resistance
33:Debuff Duration
34:Blaze Resistance
35:Poison Resistance
36:Suppression Resistance
37:Electromagnetic stun Resistance
38:HP recovered Over time
39:Max HP
40:HP Recovery
41:Decrease Detectability When Crouching
42:Bullet circle stabilization speed
43:Bullet Circle accuracy
44:Movement Speed
45:Reload Speed
46:Auto reload rate
47:Avoid instant Death
48:Recharge time
49:Ammo Acquired
50:Ammo Capacity
51:Treasure Hunt
52:Item Drop rate
53:Rare item drop rate
54:Weight
55:Medal Acquired
56:Medal gauge increase
57:Trade Value
58:Experience point
59:Effective Range
60:Over heat buildup & duration
0000FF
Byte
+0
13181
"mod"
0000FF
Float
+4
13182
"[02]"
000080
Array of byte
0
+20
1*8
13183
"id"
1:STR
2:VIT
3:INT
4:AGI
5:DEX
6:LUC
7:Weapon Attack
8:Physical Attack
9:Optical Attack
10:Explosive Attack
11:Gadget Attack
12:Damage vs Humanoid
13:Damage vs Lifeform
14:Damage vs Mech
15:Damage when off-guard
16:Damage from behind
17:Damage at max HP
18:Damage when near death
19:Weak spot Damage
20:Critical Damage increase
21:Critical Rate
22:Debuff stacking
23:Physical Defense
24:Optical Defense
25:Explosive Defense
26:Melee Defense
27:Defense vs Humanoid
28:Defense vs Lifeform
29:Defense vs Mech
30:Blaze Damage
31:Poison Damage
32:Debuff Resistance
33:Debuff Duration
34:Blaze Resistance
35:Poison Resistance
36:Suppression Resistance
37:Electromagnetic stun Resistance
38:HP recovered Over time
39:Max HP
40:HP Recovery
41:Decrease Detectability When Crouching
42:Bullet circle stabilization speed
43:Bullet Circle accuracy
44:Movement Speed
45:Reload Speed
46:Auto reload rate
47:Avoid instant Death
48:Recharge time
49:Ammo Acquired
50:Ammo Capacity
51:Treasure Hunt
52:Item Drop rate
53:Rare item drop rate
54:Weight
55:Medal Acquired
56:Medal gauge increase
57:Trade Value
58:Experience point
59:Effective Range
60:Over heat buildup & duration
0000FF
Byte
+0
13184
"mod"
0000FF
Float
+4
13185
"[03]"
000080
Array of byte
0
+20
2*8
13186
"id"
1:STR
2:VIT
3:INT
4:AGI
5:DEX
6:LUC
7:Weapon Attack
8:Physical Attack
9:Optical Attack
10:Explosive Attack
11:Gadget Attack
12:Damage vs Humanoid
13:Damage vs Lifeform
14:Damage vs Mech
15:Damage when off-guard
16:Damage from behind
17:Damage at max HP
18:Damage when near death
19:Weak spot Damage
20:Critical Damage increase
21:Critical Rate
22:Debuff stacking
23:Physical Defense
24:Optical Defense
25:Explosive Defense
26:Melee Defense
27:Defense vs Humanoid
28:Defense vs Lifeform
29:Defense vs Mech
30:Blaze Damage
31:Poison Damage
32:Debuff Resistance
33:Debuff Duration
34:Blaze Resistance
35:Poison Resistance
36:Suppression Resistance
37:Electromagnetic stun Resistance
38:HP recovered Over time
39:Max HP
40:HP Recovery
41:Decrease Detectability When Crouching
42:Bullet circle stabilization speed
43:Bullet Circle accuracy
44:Movement Speed
45:Reload Speed
46:Auto reload rate
47:Avoid instant Death
48:Recharge time
49:Ammo Acquired
50:Ammo Capacity
51:Treasure Hunt
52:Item Drop rate
53:Rare item drop rate
54:Weight
55:Medal Acquired
56:Medal gauge increase
57:Trade Value
58:Experience point
59:Effective Range
60:Over heat buildup & duration
0000FF
Byte
+0
13187
"mod"
0000FF
Float
+4
13188
"[04]"
000080
Array of byte
0
+20
3*8
13189
"id"
1:STR
2:VIT
3:INT
4:AGI
5:DEX
6:LUC
7:Weapon Attack
8:Physical Attack
9:Optical Attack
10:Explosive Attack
11:Gadget Attack
12:Damage vs Humanoid
13:Damage vs Lifeform
14:Damage vs Mech
15:Damage when off-guard
16:Damage from behind
17:Damage at max HP
18:Damage when near death
19:Weak spot Damage
20:Critical Damage increase
21:Critical Rate
22:Debuff stacking
23:Physical Defense
24:Optical Defense
25:Explosive Defense
26:Melee Defense
27:Defense vs Humanoid
28:Defense vs Lifeform
29:Defense vs Mech
30:Blaze Damage
31:Poison Damage
32:Debuff Resistance
33:Debuff Duration
34:Blaze Resistance
35:Poison Resistance
36:Suppression Resistance
37:Electromagnetic stun Resistance
38:HP recovered Over time
39:Max HP
40:HP Recovery
41:Decrease Detectability When Crouching
42:Bullet circle stabilization speed
43:Bullet Circle accuracy
44:Movement Speed
45:Reload Speed
46:Auto reload rate
47:Avoid instant Death
48:Recharge time
49:Ammo Acquired
50:Ammo Capacity
51:Treasure Hunt
52:Item Drop rate
53:Rare item drop rate
54:Weight
55:Medal Acquired
56:Medal gauge increase
57:Trade Value
58:Experience point
59:Effective Range
60:Over heat buildup & duration
0000FF
Byte
+0
13190
"mod"
0000FF
Float
+4
13191
"[05]"
000080
Array of byte
0
+20
4*8
13192
"id"
1:STR
2:VIT
3:INT
4:AGI
5:DEX
6:LUC
7:Weapon Attack
8:Physical Attack
9:Optical Attack
10:Explosive Attack
11:Gadget Attack
12:Damage vs Humanoid
13:Damage vs Lifeform
14:Damage vs Mech
15:Damage when off-guard
16:Damage from behind
17:Damage at max HP
18:Damage when near death
19:Weak spot Damage
20:Critical Damage increase
21:Critical Rate
22:Debuff stacking
23:Physical Defense
24:Optical Defense
25:Explosive Defense
26:Melee Defense
27:Defense vs Humanoid
28:Defense vs Lifeform
29:Defense vs Mech
30:Blaze Damage
31:Poison Damage
32:Debuff Resistance
33:Debuff Duration
34:Blaze Resistance
35:Poison Resistance
36:Suppression Resistance
37:Electromagnetic stun Resistance
38:HP recovered Over time
39:Max HP
40:HP Recovery
41:Decrease Detectability When Crouching
42:Bullet circle stabilization speed
43:Bullet Circle accuracy
44:Movement Speed
45:Reload Speed
46:Auto reload rate
47:Avoid instant Death
48:Recharge time
49:Ammo Acquired
50:Ammo Capacity
51:Treasure Hunt
52:Item Drop rate
53:Rare item drop rate
54:Weight
55:Medal Acquired
56:Medal gauge increase
57:Trade Value
58:Experience point
59:Effective Range
60:Over heat buildup & duration
0000FF
Byte
+0
13193
"mod"
0000FF
Float
+4
13196
"[06]"
000080
Array of byte
0
+20
5*8
13197
"id"
1:STR
2:VIT
3:INT
4:AGI
5:DEX
6:LUC
7:Weapon Attack
8:Physical Attack
9:Optical Attack
10:Explosive Attack
11:Gadget Attack
12:Damage vs Humanoid
13:Damage vs Lifeform
14:Damage vs Mech
15:Damage when off-guard
16:Damage from behind
17:Damage at max HP
18:Damage when near death
19:Weak spot Damage
20:Critical Damage increase
21:Critical Rate
22:Debuff stacking
23:Physical Defense
24:Optical Defense
25:Explosive Defense
26:Melee Defense
27:Defense vs Humanoid
28:Defense vs Lifeform
29:Defense vs Mech
30:Blaze Damage
31:Poison Damage
32:Debuff Resistance
33:Debuff Duration
34:Blaze Resistance
35:Poison Resistance
36:Suppression Resistance
37:Electromagnetic stun Resistance
38:HP recovered Over time
39:Max HP
40:HP Recovery
41:Decrease Detectability When Crouching
42:Bullet circle stabilization speed
43:Bullet Circle accuracy
44:Movement Speed
45:Reload Speed
46:Auto reload rate
47:Avoid instant Death
48:Recharge time
49:Ammo Acquired
50:Ammo Capacity
51:Treasure Hunt
52:Item Drop rate
53:Rare item drop rate
54:Weight
55:Medal Acquired
56:Medal gauge increase
57:Trade Value
58:Experience point
59:Effective Range
60:Over heat buildup & duration
0000FF
Byte
+0
13198
"mod"
0000FF
Float
+4
13203
"[accessories' chips]"
000080
Array of byte
0
+20
0
13204
"#"
0000FF
4 Bytes
+10
13205
"+14"
0000FF
4 Bytes
+14
13224
"[01]"
000080
Array of byte
0
+8
0*8
13225
"id"
1:STR
2:VIT
3:INT
4:AGI
5:DEX
6:LUC
7:Weapon Attack
8:Physical Attack
9:Optical Attack
10:Explosive Attack
11:Gadget Attack
12:Damage vs Humanoid
13:Damage vs Lifeform
14:Damage vs Mech
15:Damage when off-guard
16:Damage from behind
17:Damage at max HP
18:Damage when near death
19:Weak spot Damage
20:Critical Damage increase
21:Critical Rate
22:Debuff stacking
23:Physical Defense
24:Optical Defense
25:Explosive Defense
26:Melee Defense
27:Defense vs Humanoid
28:Defense vs Lifeform
29:Defense vs Mech
30:Blaze Damage
31:Poison Damage
32:Debuff Resistance
33:Debuff Duration
34:Blaze Resistance
35:Poison Resistance
36:Suppression Resistance
37:Electromagnetic stun Resistance
38:HP recovered Over time
39:Max HP
40:HP Recovery
41:Decrease Detectability When Crouching
42:Bullet circle stabilization speed
43:Bullet Circle accuracy
44:Movement Speed
45:Reload Speed
46:Auto reload rate
47:Avoid instant Death
48:Recharge time
49:Ammo Acquired
50:Ammo Capacity
51:Treasure Hunt
52:Item Drop rate
53:Rare item drop rate
54:Weight
55:Medal Acquired
56:Medal gauge increase
57:Trade Value
58:Experience point
59:Effective Range
60:Over heat buildup & duration
0000FF
Byte
+0
13226
"mod"
0000FF
Float
+4
13227
"[02]"
000080
Array of byte
0
+8
1*8
13228
"id"
1:STR
2:VIT
3:INT
4:AGI
5:DEX
6:LUC
7:Weapon Attack
8:Physical Attack
9:Optical Attack
10:Explosive Attack
11:Gadget Attack
12:Damage vs Humanoid
13:Damage vs Lifeform
14:Damage vs Mech
15:Damage when off-guard
16:Damage from behind
17:Damage at max HP
18:Damage when near death
19:Weak spot Damage
20:Critical Damage increase
21:Critical Rate
22:Debuff stacking
23:Physical Defense
24:Optical Defense
25:Explosive Defense
26:Melee Defense
27:Defense vs Humanoid
28:Defense vs Lifeform
29:Defense vs Mech
30:Blaze Damage
31:Poison Damage
32:Debuff Resistance
33:Debuff Duration
34:Blaze Resistance
35:Poison Resistance
36:Suppression Resistance
37:Electromagnetic stun Resistance
38:HP recovered Over time
39:Max HP
40:HP Recovery
41:Decrease Detectability When Crouching
42:Bullet circle stabilization speed
43:Bullet Circle accuracy
44:Movement Speed
45:Reload Speed
46:Auto reload rate
47:Avoid instant Death
48:Recharge time
49:Ammo Acquired
50:Ammo Capacity
51:Treasure Hunt
52:Item Drop rate
53:Rare item drop rate
54:Weight
55:Medal Acquired
56:Medal gauge increase
57:Trade Value
58:Experience point
59:Effective Range
60:Over heat buildup & duration
0000FF
Byte
+0
13229
"mod"
0000FF
Float
+4
13230
"[03]"
000080
Array of byte
0
+8
2*8
13231
"id"
1:STR
2:VIT
3:INT
4:AGI
5:DEX
6:LUC
7:Weapon Attack
8:Physical Attack
9:Optical Attack
10:Explosive Attack
11:Gadget Attack
12:Damage vs Humanoid
13:Damage vs Lifeform
14:Damage vs Mech
15:Damage when off-guard
16:Damage from behind
17:Damage at max HP
18:Damage when near death
19:Weak spot Damage
20:Critical Damage increase
21:Critical Rate
22:Debuff stacking
23:Physical Defense
24:Optical Defense
25:Explosive Defense
26:Melee Defense
27:Defense vs Humanoid
28:Defense vs Lifeform
29:Defense vs Mech
30:Blaze Damage
31:Poison Damage
32:Debuff Resistance
33:Debuff Duration
34:Blaze Resistance
35:Poison Resistance
36:Suppression Resistance
37:Electromagnetic stun Resistance
38:HP recovered Over time
39:Max HP
40:HP Recovery
41:Decrease Detectability When Crouching
42:Bullet circle stabilization speed
43:Bullet Circle accuracy
44:Movement Speed
45:Reload Speed
46:Auto reload rate
47:Avoid instant Death
48:Recharge time
49:Ammo Acquired
50:Ammo Capacity
51:Treasure Hunt
52:Item Drop rate
53:Rare item drop rate
54:Weight
55:Medal Acquired
56:Medal gauge increase
57:Trade Value
58:Experience point
59:Effective Range
60:Over heat buildup & duration
0000FF
Byte
+0
13232
"mod"
0000FF
Float
+4
13233
"[04]"
000080
Array of byte
0
+8
3*8
13234
"id"
1:STR
2:VIT
3:INT
4:AGI
5:DEX
6:LUC
7:Weapon Attack
8:Physical Attack
9:Optical Attack
10:Explosive Attack
11:Gadget Attack
12:Damage vs Humanoid
13:Damage vs Lifeform
14:Damage vs Mech
15:Damage when off-guard
16:Damage from behind
17:Damage at max HP
18:Damage when near death
19:Weak spot Damage
20:Critical Damage increase
21:Critical Rate
22:Debuff stacking
23:Physical Defense
24:Optical Defense
25:Explosive Defense
26:Melee Defense
27:Defense vs Humanoid
28:Defense vs Lifeform
29:Defense vs Mech
30:Blaze Damage
31:Poison Damage
32:Debuff Resistance
33:Debuff Duration
34:Blaze Resistance
35:Poison Resistance
36:Suppression Resistance
37:Electromagnetic stun Resistance
38:HP recovered Over time
39:Max HP
40:HP Recovery
41:Decrease Detectability When Crouching
42:Bullet circle stabilization speed
43:Bullet Circle accuracy
44:Movement Speed
45:Reload Speed
46:Auto reload rate
47:Avoid instant Death
48:Recharge time
49:Ammo Acquired
50:Ammo Capacity
51:Treasure Hunt
52:Item Drop rate
53:Rare item drop rate
54:Weight
55:Medal Acquired
56:Medal gauge increase
57:Trade Value
58:Experience point
59:Effective Range
60:Over heat buildup & duration
0000FF
Byte
+0
13235
"mod"
0000FF
Float
+4
13236
"[05]"
000080
Array of byte
0
+8
4*8
13237
"id"
1:STR
2:VIT
3:INT
4:AGI
5:DEX
6:LUC
7:Weapon Attack
8:Physical Attack
9:Optical Attack
10:Explosive Attack
11:Gadget Attack
12:Damage vs Humanoid
13:Damage vs Lifeform
14:Damage vs Mech
15:Damage when off-guard
16:Damage from behind
17:Damage at max HP
18:Damage when near death
19:Weak spot Damage
20:Critical Damage increase
21:Critical Rate
22:Debuff stacking
23:Physical Defense
24:Optical Defense
25:Explosive Defense
26:Melee Defense
27:Defense vs Humanoid
28:Defense vs Lifeform
29:Defense vs Mech
30:Blaze Damage
31:Poison Damage
32:Debuff Resistance
33:Debuff Duration
34:Blaze Resistance
35:Poison Resistance
36:Suppression Resistance
37:Electromagnetic stun Resistance
38:HP recovered Over time
39:Max HP
40:HP Recovery
41:Decrease Detectability When Crouching
42:Bullet circle stabilization speed
43:Bullet Circle accuracy
44:Movement Speed
45:Reload Speed
46:Auto reload rate
47:Avoid instant Death
48:Recharge time
49:Ammo Acquired
50:Ammo Capacity
51:Treasure Hunt
52:Item Drop rate
53:Rare item drop rate
54:Weight
55:Medal Acquired
56:Medal gauge increase
57:Trade Value
58:Experience point
59:Effective Range
60:Over heat buildup & duration
0000FF
Byte
+0
13238
"mod"
0000FF
Float
+4
13239
"[06]"
000080
Array of byte
0
+8
5*8
13240
"id"
1:STR
2:VIT
3:INT
4:AGI
5:DEX
6:LUC
7:Weapon Attack
8:Physical Attack
9:Optical Attack
10:Explosive Attack
11:Gadget Attack
12:Damage vs Humanoid
13:Damage vs Lifeform
14:Damage vs Mech
15:Damage when off-guard
16:Damage from behind
17:Damage at max HP
18:Damage when near death
19:Weak spot Damage
20:Critical Damage increase
21:Critical Rate
22:Debuff stacking
23:Physical Defense
24:Optical Defense
25:Explosive Defense
26:Melee Defense
27:Defense vs Humanoid
28:Defense vs Lifeform
29:Defense vs Mech
30:Blaze Damage
31:Poison Damage
32:Debuff Resistance
33:Debuff Duration
34:Blaze Resistance
35:Poison Resistance
36:Suppression Resistance
37:Electromagnetic stun Resistance
38:HP recovered Over time
39:Max HP
40:HP Recovery
41:Decrease Detectability When Crouching
42:Bullet circle stabilization speed
43:Bullet Circle accuracy
44:Movement Speed
45:Reload Speed
46:Auto reload rate
47:Avoid instant Death
48:Recharge time
49:Ammo Acquired
50:Ammo Capacity
51:Treasure Hunt
52:Item Drop rate
53:Rare item drop rate
54:Weight
55:Medal Acquired
56:Medal gauge increase
57:Trade Value
58:Experience point
59:Effective Range
60:Over heat buildup & duration
0000FF
Byte
+0
13241
"mod"
0000FF
Float
+4
13242
"hi .3"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
{$lua}
local al=getAddressList()
local hiMR = al.getMemoryRecordByDescription('[highlighted item]')
local hitMR = al.getMemoryRecordByDescription('type')
local chipidflux = {
"1:STR",
"2:VIT",
"3:INT",
"4:AGI",
"5:DEX",
"6:LUC",
"7:Weapon Attack",
"8:Physical Attack",
"9:Optical Attack",
"10:Explosive Attack",
"11:Gadget Attack",
"12:Damage vs Humanoid",
"13:Damage vs Lifeform",
"14:Damage vs Mech",
"15:Damage when off-guard",
"16:Damage from behind",
"17:Damage at max HP",
"18:Damage when near death",
"19:Weak spot Damage",
"20:Critical Damage increase",
"21:Critical Rate",
"22:Debuff stacking",
"23:Physical Defense",
"24:Optical Defense",
"25:Explosive Defense",
"26:Melee Defense",
"27:Defense vs Humanoid",
"28:Defense vs Lifeform",
"29:Defense vs Mech",
"30:Blaze Damage",
"31:Poison Damage",
"32:Debuff Resistance",
"33:Debuff Duration",
"34:Blaze Resistance",
"35:Poison Resistance",
"36:Suppression Resistance",
"37:Electromagnetic stun Resistance",
"38:HP recovered Over time",
"39:Max HP",
"40:HP Recovery",
"41:Decrease Detectability When Crouching",
"42:Bullet circle stabilization speed",
"43:Bullet Circle accuracy",
"44:Movement Speed",
"45:Reload Speed",
"46:Auto reload rate",
"47:Avoid instant Death",
"48:Recharge time",
"49:Ammo Acquired",
"50:Ammo Capacity",
"51:Treasure Hunt",
"52:Item Drop rate",
"53:Rare item drop rate",
"54:Weight",
"55:Medal Acquired",
"56:Medal gauge increase",
"57:Trade Value",
"58:Experience point",
"59:Effective Range",
"60:Over heat buildup & duration"
}
local chipDropDownList = createStringlist()
chipDropDownList.add("0:Empty")
for i,j in ipairs(chipidflux) do
chipDropDownList.add(string.format("%s",j))
end
local function hichipupdatethread(thread4)
local hita = 0
local hitv = 0
local hinc = 0
-- print (hiMR.Address)
-- hitv = tonumber(hitMR.Value)
-- print (hitv)
while hichipupdateloop do
sleep(500)
hiAddr = getAddressSafe('pHighlightedItem')
-- print ( readBytes(readPointer(hiAddr)+0x18) )
if hiAddr then
if (hiMR.Active) then
-- print (hita)
-- print (tonumber(hitMR.Address))
if ( ( readPointer(hiAddr)+0x18 ~= hita) ) then
hita = readPointer(hiAddr)+0x18
hitv = readBytes(readPointer(hiAddr)+0x18)
-- print (hita)
if ( hitv==0 ) then
-- print( 'weapons' )
chipspinit(0)
elseif ( hitv==3 ) then
-- print( 'accessories' )
chipspinit(1)
else
-- print( 'nada' )
chipspinit(3)
end
hicpMR = al.getMemoryRecordByDescription('[chips]')
if (hicpMR) then
hinc = tonumber(hicpMR[0].Value)
hicpMR.Active = true
end
else
hicpMR = al.getMemoryRecordByDescription('[chips]')
if (hicpMR) then
if ( hicpMR.Active ) then
thinc = tonumber(hicpMR[0].Value)
if ( thinc ~= hinc ) then
-- print (hicpMR[0].Value)
hinc = thinc
if ( hitv==0 ) then
-- print (hicpMR.Count)
-- print (hicpMR[0].Description..' : '..hicpMR[0].Value)
-- print (hicpMR[1].Description)
-- print (hicpMR[2].Description)
chipspcreate(0x20,hinc)
elseif ( hitv==3 ) then
chipspcreate(0x8,hinc)
end
end
end
end
end
end
end
end
thread4.terminate()
end
function chipspinit(ctype)
if (ctype == 0) then
chipsoffset=0x20
elseif (ctype == 1) then
chipsoffset=0x8
elseif (ctype == 3) then
local hicpMR = al.getMemoryRecordByDescription('[chips]')
if (hicpMR) then hicpMR.destroy() end
return
end
local hicpMR = al.getMemoryRecordByDescription('[chips]')
if (hicpMR) then
-- print ('has chips p')
while hicpMR.Count>0 do hicpMR[0].destroy() end
else
-- print ('no chips p')
-- print (hiMR.Description)
local hicpMR = al.createMemoryRecord()
hicpMR.Description = '[chips]'
hicpMR.Type = vtByteArray
hicpMR.AOBSize = 0
hicpMR.setAddress('+0x20')
hicpMR.OffsetCount = 1
hicpMR.Offset[0] = 0
hicpMR.Color = 0x000080
hicpMR.Options = 'moHideChildren,moDeactivateChildrenAsWell'
hicpMR.appendToEntry(hiMR)
-- tpMR = al.getMemoryRecordByDescription('[weapons chips]')
-- print (tpMR.Type)
-- print (tpMR.Address)
-- print (tpMR.getOffset(0))
end
-- print (chipsoffset)
hicpMR = al.getMemoryRecordByDescription('[chips]')
newMR = al.createMemoryRecord()
newMR.Description = '# of chips'
newMR.Type = vtDword
newMR.setAddress(string.format("+%X",chipsoffset+ 0x8) )
newMR.Color = 0x0000ff
newMR.appendToEntry(hicpMR)
chipspcreate(chipsoffset,tonumber(newMR.Value))
end
function chipspcreate(co,cpnum)
sleep(100)
-- local cpnum = tonumber(al.getMemoryRecordByDescription('# of chips').Value)
-- print (cpnum)
hicpMR = al.getMemoryRecordByDescription('[chips]')
while hicpMR.Count>1 do hicpMR[1].destroy() end
for i=0,cpnum -1 do
local newMR = al.createMemoryRecord()
newMR.Description = ( string.format("[%.2d]",i+1) )
-- print (string.format("[%.2d]",i+1))
newMR.Type = vtByteArray
newMR.AOBSize = 0
newMR.setAddress(string.format("+%X",co) )
newMR.OffsetCount = 1
newMR.Offset[0] = 0*i
newMR.Color = 0x000080
newMR.Options = 'moHideChildren,moDeactivateChildrenAsWell'
newMR.appendToEntry(hicpMR)
local newMR2 = al.createMemoryRecord()
newMR2.Description = ('chip id')
newMR2.Type = vtByte
newMR2.setAddress('+0')
newMR2.Color = 0x0000ff
newMR2.appendToEntry(newMR)
newMR2.DropDownList.Text = chipDropDownList.Text
newMR2.DropDownReadOnly = true
newMR2.DropDownDescriptionOnly = false
newMR2.DisplayAsDropDownListItem = true
newMR2 = al.createMemoryRecord()
newMR2.Description = ('modifier')
newMR2.Type = vtSingle
newMR2.setAddress('+4')
newMR2.Color = 0x0000ff
newMR2.appendToEntry(newMR)
end
end
----------------------------------
if syntaxcheck then return end
hichipupdateloop = true
createThread(hichipupdatethread)
{$asm}
///*****************************************///
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
{$lua}
if syntaxcheck then return end
hichipupdateloop = false
{$asm}
///*****************************************///
13272
"hi .2"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
{$lua}
local al=getAddressList()
local hiMR = al.getMemoryRecordByDescription('[highlighted item]')
local hitMR = al.getMemoryRecordByDescription('type')
local function hichipupdatethread(thread4)
local hita = 0
local hitv = 0
local hinc = 0
-- print (hiMR.Address)
-- hitv = tonumber(hitMR.Value)
-- print (hitv)
while hichipupdateloop do
sleep(500)
hiAddr = getAddressSafe('pHighlightedItem')
-- print ( readBytes(readPointer(hiAddr)+0x18) )
if hiAddr then
if (hiMR.Active) then
-- print (hita)
-- print (tonumber(hitMR.Address))
if ( ( readPointer(hiAddr)+0x18 ~= hita) ) then
hita = readPointer(hiAddr)+0x18
hitv = readBytes(readPointer(hiAddr)+0x18)
-- print (hita)
if ( hitv==0 ) then
-- print( 'weapons' )
chipspinit(0)
elseif ( hitv==3 ) then
-- print( 'accessories' )
chipspinit(1)
else
-- print( 'nada' )
chipspinit(3)
end
hicpMR = al.getMemoryRecordByDescription('[chips]')
if (hicpMR) then
hinc = tonumber(hicpMR[0].Value)
hicpMR.Active = true
end
else
hicpMR = al.getMemoryRecordByDescription('[chips]')
if (hicpMR) then
if ( hicpMR.Active ) then
thinc = tonumber(hicpMR[0].Value)
if ( thinc ~= hinc ) then
-- print (hicpMR[0].Value)
hinc = thinc
if ( hitv==0 ) then
-- print (hicpMR.Count)
-- print (hicpMR[0].Description..' : '..hicpMR[0].Value)
-- print (hicpMR[1].Description)
-- print (hicpMR[2].Description)
chipspcreate(0x20,hinc)
elseif ( hitv==3 ) then
chipspcreate(0x8,hinc)
end
end
end
end
end
end
end
end
thread4.terminate()
end
function chipspinit(ctype)
if (ctype == 0) then
chipsoffset=0x20
elseif (ctype == 1) then
chipsoffset=0x8
elseif (ctype == 3) then
local hicpMR = al.getMemoryRecordByDescription('[chips]')
if (hicpMR) then hicpMR.destroy() end
return
end
local hicpMR = al.getMemoryRecordByDescription('[chips]')
if (hicpMR) then
-- print ('has chips p')
while hicpMR.Count>0 do hicpMR[0].destroy() end
else
-- print ('no chips p')
-- print (hiMR.Description)
local hicpMR = al.createMemoryRecord()
hicpMR.Description = '[chips]'
hicpMR.Type = vtByteArray
hicpMR.AOBSize = 0
hicpMR.setAddress('+0x20')
hicpMR.OffsetCount = 1
hicpMR.Offset[0] = 0
hicpMR.Color = 0x000080
hicpMR.Options = 'moHideChildren,moDeactivateChildrenAsWell'
hicpMR.appendToEntry(hiMR)
-- tpMR = al.getMemoryRecordByDescription('[weapons chips]')
-- print (tpMR.Type)
-- print (tpMR.Address)
-- print (tpMR.getOffset(0))
end
-- print (chipsoffset)
hicpMR = al.getMemoryRecordByDescription('[chips]')
newMR = al.createMemoryRecord()
newMR.Description = '# of chips'
newMR.Type = vtDword
newMR.setAddress(string.format("+%X",chipsoffset+ 0x8) )
newMR.Color = 0x0000ff
newMR.appendToEntry(hicpMR)
chipspcreate(chipsoffset,tonumber(newMR.Value))
end
function chipspcreate(co,cpnum)
sleep(100)
-- local cpnum = tonumber(al.getMemoryRecordByDescription('# of chips').Value)
-- print (cpnum)
hicpMR = al.getMemoryRecordByDescription('[chips]')
while hicpMR.Count>1 do hicpMR[1].destroy() end
for i=0,cpnum -1 do
local newMR = al.createMemoryRecord()
newMR.Description = ( string.format("[%.2d]",i+1) )
-- print (string.format("[%.2d]",i+1))
newMR.Type = vtByteArray
newMR.AOBSize = 0
newMR.setAddress(string.format("+%X",co) )
newMR.OffsetCount = 1
newMR.Offset[0] = 0*i
newMR.Color = 0x000080
newMR.Options = 'moHideChildren,moDeactivateChildrenAsWell'
newMR.appendToEntry(hicpMR)
local newMR2 = al.createMemoryRecord()
newMR2.Description = ('chip id')
newMR2.Type = vtByte
newMR2.setAddress('+0')
newMR2.Color = 0x0000ff
newMR2.appendToEntry(newMR)
newMR2 = al.createMemoryRecord()
newMR2.Description = ('modifier')
newMR2.Type = vtSingle
newMR2.setAddress('+4')
newMR2.Color = 0x0000ff
newMR2.appendToEntry(newMR)
end
end
----------------------------------
if syntaxcheck then return end
hichipupdateloop = true
createThread(hichipupdatethread)
{$asm}
///*****************************************///
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
{$lua}
if syntaxcheck then return end
hichipupdateloop = false
{$asm}
///*****************************************///
13257
"hi .1"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
{$lua}
local al=getAddressList()
local hiMR = al.getMemoryRecordByDescription('[highlighted item]')
local hitMR = al.getMemoryRecordByDescription('type')
local function hichipupdatethread(thread4)
local hita = 0
local hitv = 0
-- print (hiMR.Address)
-- hitv = tonumber(hitMR.Value)
-- print (hitv)
while hichipupdateloop do
sleep(500)
hiAddr = getAddressSafe('pHighlightedItem')
-- print ( readBytes(readPointer(hiAddr)+0x18) )
if hiAddr then
if (hiMR.Active) then
-- print (hita)
-- print (tonumber(hitMR.Address))
if ( ( readPointer(hiAddr)+0x18 ~= hita) ) then
hita = readPointer(hiAddr)+0x18
hitv = readBytes(readPointer(hiAddr)+0x18)
-- print (hita)
if ( hitv==0 ) then
-- print( 'weapons' )
chipspinit(0)
elseif ( hitv==3 ) then
-- print( 'accessories' )
chipspinit(1)
else
-- print( 'nada' )
chipspinit(3)
end
end
end
end
end
thread4.terminate()
end
function chipspinit(ctype)
local chipsoffset=0
if (ctype == 0) then
chipsoffset=0x20
elseif (ctype == 1) then
chipsoffset=0x8
elseif (ctype == 2) then
chipsoffset=0x8
elseif (ctype == 3) then
local hicpMR = al.getMemoryRecordByDescription('[chips]')
if (hicpMR) then hicpMR.destroy() end
return
end
local hicpMR = al.getMemoryRecordByDescription('[chips]')
if (hicpMR) then
-- print ('has chips p')
while hicpMR.Count>0 do hicpMR[0].destroy() end
else
-- print ('no chips p')
-- print (hiMR.Description)
local hicpMR = al.createMemoryRecord()
hicpMR.Description = '[chips]'
hicpMR.Type = vtByteArray
hicpMR.AOBSize = 0
hicpMR.setAddress('+0x20')
hicpMR.OffsetCount = 1
hicpMR.Offset[0] = 0
hicpMR.Color = 0x000080
hicpMR.Options = 'moHideChildren,moDeactivateChildrenAsWell'
hicpMR.appendToEntry(hiMR)
-- tpMR = al.getMemoryRecordByDescription('[weapons chips]')
-- print (tpMR.Type)
-- print (tpMR.Address)
-- print (tpMR.getOffset(0))
end
-- print (chipsoffset)
hicpMR = al.getMemoryRecordByDescription('[chips]')
newMR = al.createMemoryRecord()
newMR.Description = '# of chips'
newMR.Type = vtDword
newMR.setAddress(string.format("+%X",chipsoffset+ 0x8) )
newMR.Color = 0x0000ff
newMR.appendToEntry(hicpMR)
chipspcreate(chipsoffset)
end
function chipspcreate(chipsoffset)
local cpnum = tonumber(al.getMemoryRecordByDescription('# of chips').Value)
-- print (cpnum)
hicpMR = al.getMemoryRecordByDescription('[chips]')
while hicpMR.Count>1 do hicpMR[0].destroy() end
for i=0,cpnum -1 do
local newMR = al.createMemoryRecord()
newMR.Description = ( string.format("[%.2d]",i+1) )
-- print (string.format("[%.2d]",i+1))
newMR.Type = vtByteArray
newMR.AOBSize = 0
newMR.setAddress(string.format("+%X",chipsoffset) )
newMR.OffsetCount = 1
newMR.Offset[0] = 0*i
newMR.Color = 0x000080
newMR.Options = 'moHideChildren,moDeactivateChildrenAsWell'
newMR.appendToEntry(hicpMR)
local newMR2 = al.createMemoryRecord()
newMR2.Description = ('chip id')
newMR2.Type = vtDword
newMR2.setAddress('+0')
newMR2.Color = 0x0000ff
newMR2.appendToEntry(newMR)
newMR2 = al.createMemoryRecord()
newMR2.Description = ('modifier')
newMR2.Type = vtSingle
newMR2.setAddress('+4')
newMR2.Color = 0x0000ff
newMR2.appendToEntry(newMR)
end
end
----------------------------------
if syntaxcheck then return end
hichipupdateloop = true
createThread(hichipupdatethread)
{$asm}
///*****************************************///
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
{$lua}
if syntaxcheck then return end
hichipupdateloop = false
{$asm}
///*****************************************///
Code :movss xmm0,[rcx+28]
SAOFB-Win64-Shipping.exe+5DE1A07
0F
2E
C8
74
0D
F3
0F
10
41
28
F3
0F
5E
C1
C3
Code :addss xmm0,dword ptr [rcx+28]
SAOFB-Win64-Shipping.exe+5E01417
49
08
0F
28
C6
F3
0F
58
41
28
0F
2F
C1
F3
0F
Code :movss [rcx+28],xmm0
SAOFB-Win64-Shipping.exe+5E0141F
41
28
0F
2F
C1
F3
0F
11
41
28
72
05
F3
0F
11
Code :movss [rcx+28],xmm1
SAOFB-Win64-Shipping.exe+5E01426
11
41
28
72
05
F3
0F
11
49
28
48
83
C7
10
48
Code :comiss xmm0,[rcx+28]
SAOFB-Win64-Shipping.exe+5DE6960
F3
0F
10
41
08
0F
2F
41
28
0F
96
D0
C3
30
Code :mov [rax+28],00000000
SAOFB-Win64-Shipping.exe+5DFD033
48
8B
44
CA
18
C7
40
28
00
00
00
00
C6
40
2C
01
48
Code :movss [r11+3C],xmm0
SAOFB-Win64-Shipping.exe+4F27D7
74
03
0F
57
C1
F3
41
0F
11
43
3C
40
F6
C7
02
0F
Code :movss [r11+3C],xmm0
SAOFB-Win64-Shipping.exe+4F2887
75
03
0F
57
C1
F3
41
0F
11
43
3C
40
F6
C7
04
0F
Code :movss [r11+38],xmm0
SAOFB-Win64-Shipping.exe+4F2937
75
03
0F
57
C1
F3
41
0F
11
43
38
40
F6
C7
08
0F
Code :movss [r11+38],xmm0
SAOFB-Win64-Shipping.exe+4F29E7
74
03
0F
57
C1
F3
41
0F
11
43
38
0F
BA
E7
08
0F
Code :cmp eax,[rdx+00000090]
SAOFB-Win64-Shipping.exe+5CD8396
00
49
63
40
08
3B
82
90
00
00
00
7F
38
48
89
C1
Code :cmp ecx,[rbx]
SAOFB-Win64-Shipping.exe+70D6A4
15
98
E6
2E
03
3B
0B
48
8D
05
C7
E6
Code :ucomiss xmm0,[rax+08]
SAOFB-Win64-Shipping.exe+B7432DB
10
F3
0F
10
03
0F
2E
40
08
4C
8B
74
24
20
Code :movups [rax+08],xmm0
SAOFB-Win64-Shipping.exe+B743315
89
C2
48
89
E9
0F
11
40
08
E8
D2
F3
9D
F6
Code :movups xmm0,[r14+08]
SAOFB-Win64-Shipping.exe+21227DE
00
41
5E
5B
C3
41
0F
10
46
08
33
D2
48
8D
4C
Code :movups [rcx+08],xmm0
SAOFB-Win64-Shipping.exe+B6FC86B
48
8B
74
24
60
0F
11
41
08
48
83
C4
40
5F
Code :movups xmm0,[rax]
SAOFB-Win64-Shipping.exe+B738E74
83
C0
08
74
AD
0F
10
00
B0
01
41
0F
11
Code :movss xmm6,[rbx+000013FC]
SAOFB-Win64-Shipping.exe+5BF3C2B
24
30
48
89
D9
F3
0F
10
B3
FC
13
00
00
E8
98
D0
6F
FA
Code :movss xmm6,[rcx+000013FC]
SAOFB-Win64-Shipping.exe+7E17E3
0F
29
74
24
60
F3
0F
10
B1
FC
13
00
00
E8
E0
F4
B0
FF
Code :ret
SAOFB-Win64-Shipping.exe+6B7B92
00
00
00
5F
5D
C3
CC
CC
CC
CC
CC
Code :mov edx,[rbx+00000BD4]
SAOFB-Win64-Shipping.exe+702BE6
E8
CA
46
FB
FF
8B
93
D4
0B
00
00
48
8B
8B
18
0B
Code :movups xmm0,[rsi+50]
SAOFB-Win64-Shipping.exe+7CF386
66
0F
7F
4D
D7
0F
10
46
50
0F
29
45
A7
F2
Code :mov eax,[rcx+74]
SAOFB-Win64-Shipping.exe+3F39A0
CC
CC
CC
CC
CC
8B
41
74
C3
CC
CC
CC
CC
Code :mov eax,[r14+50]
SAOFB-Win64-Shipping.exe+7D23E9
E8
A1
F2
F6
02
41
8B
46
50
48
8D
4C
24
20
Code :movups xmm0,[rdi+50]
SAOFB-Win64-Shipping.exe+702B7F
0F
7F
4C
24
60
0F
10
47
50
0F
29
44
24
30
Code :mov rdx,[rbx+08]
SAOFB-Win64-Shipping.exe+627C3BB
48
85
C9
74
22
48
8B
53
08
4C
8D
44
24
20
Code :cmp [rdx+08],r8
SAOFB-Win64-Shipping.exe+6BC8657
41
10
4C
8B
00
4C
39
42
08
75
09
48
8B
49
Code :mov rdx,[r13+00]
SAOFB-Win64-Shipping.exe+7BCB73
E8
8D
D5
FC
FF
49
8B
55
00
45
33
C0
49
8B
Code :mov edx,[rsp+48]
SAOFB-Win64-Shipping.exe+7BEFD9
E8
37
C3
86
00
8B
54
24
48
48
8D
4D
88
49
Code :movsxd r8,edx
SAOFB-Win64-Shipping.exe+853D5AB
05
01
7C
6B
FB
4C
63
C2
48
89
44
24
20
Code :cmp [rdx+08],r8
SAOFB-Win64-Shipping.exe+6BC8477
89
CF
4C
8B
00
4C
39
42
08
75
21
48
89
D1
Code :mov rdi,[rsp+28]
SAOFB-Win64-Shipping.exe+5F7C245
3B
5E
20
7C
AE
48
8B
7C
24
28
48
8B
6C
24
58
Code :mov eax,[rsp+000000B8]
SAOFB-Win64-Shipping.exe+78A2EE
E8
12
BB
C6
FF
8B
84
24
B8
00
00
00
48
8B
9C
24
A0
Code :mov ebx,eax
SAOFB-Win64-Shipping.exe+7BEBC3
B0
01
49
8B
CE
8B
D8
E8
56
B6
FC
FF
Code :cmp byte ptr [rcx+18],02
SAOFB-Win64-Shipping.exe+621F7A0
00
00
00
00
00
80
79
18
02
74
03
31
C0
C3
Code :mov edx,[rbx]
SAOFB-Win64-Shipping.exe+6A52142
E8
3E
0B
9A
F9
8B
13
48
89
C1
E8
04
Code :call SAOFB-Win64-Shipping.exe+455910
SAOFB-Win64-Shipping.exe+79BE37
50
18
49
8B
CD
E8
D4
9A
CB
FF
84
C0
74
0F
48
Code :test al,al
SAOFB-Win64-Shipping.exe+7BEA6E
E8
A2
6E
C9
FF
84
C0
74
5F
40
B7
01
Code :test al,al
SAOFB-Win64-Shipping.exe+7989FF
E8
11
CF
CB
FF
84
C0
0F
84
81
01
00
yForceWrite2AOB
1404F2882
xForceWrite1AOB
1404F2932
https://fearlessrevolution.com/viewtopic.php?f=4&t=9782
https://www.patreon.com/Cielos