I'm trying to find the code injection points in this game called Spacebourne 2, which is in Unreal Engine 4 and uses the annoying VCRuntime140.memcpy dll for almost everything in the game, and need your help in backtracking values.
I tried following this tutorial for break and trace and backtracing, from Chris Faytes (RIP), but am stuck at the point where the RDX register which is writing to the RAX is going back to the VCRuntime dll when I do the "Find out what accesses this address", unlike in Chris's example where it goes to the game's memory region opcodes.
In my example, I'm trying to find the hostile npc ship's shield value for a one-hit-kill script once I find the injection point. I got the shield value address and tried the break and trace like in Chris's tutorial but stuck after the return call and what to do next.
VCRuntime dll

Setting up Break and Trace

Break and Trace results

Return back to the call

Adding the RDX address manually to find what opcodes are accessing it

Back to VCRuntime

