Re: Atelier Ryza - Ever Darkness & The Secret Hideout
Posted: Sun Sep 27, 2020 12:30 am
Replaying the game to prepare for Ryza 2? also thanks for the update.
Community Cheat Tables of Cheat Engine
https://fearlessrevolution.com/
Yeah y'all are out of luck then. Don't even own the game lolHolyRabbid wrote: ↑Sun Sep 27, 2020 3:39 amThat's kind of funny, because they released another update to the game, version 1.07.
At least some of the options do not work anymore. Like Currency finder, time scans, etc. did not have time to test much.
Wait, 1.08? My Steam copy still shows as 1.07.
To verify currency finder seems broken, time scans work (no idea how it supposed), same for Alchemy XP etc.Papa Helmeritus wrote: ↑Tue Oct 13, 2020 8:09 amAt least some of the options do not work anymore. Like Currency finder, time scans, etc. did not have time to test much.
Code: Select all
<?xml version="1.0" encoding="utf-8"?>
<CheatTable CheatEngineTableVersion="31">
<CheatEntries>
<CheatEntry>
<ID>481</ID>
<Description>"Currency Finder"</Description>
<Options moHideChildren="1" moManualExpandCollapse="1" moAllowManualCollapseAndExpand="1"/>
<LastState/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>{ Game : Atelier_Ryza.exe
Version:
Date : 2020-01-22
Author : Zach
This script does blah blah blah
}
[ENABLE]
aobscanmodule(Scan_Currency,Atelier_Ryza.exe,8B 05 ?? ?? 06 01 C3 CC) // should be unique
alloc(newmem,$1000,Scan_Currency)
globalalloc(ScanCurrency,4)
label(code)
label(return)
newmem:
push rax
lea rax,[Atelier_Ryza.exe+147D108]
mov [ScanCurrency],rax
pop rax
code:
mov eax,[Atelier_Ryza.exe+147D108]
jmp return
Scan_Currency:
jmp newmem
nop
return:
registersymbol(Scan_Currency)
[DISABLE]
Scan_Currency:
db 8B 05 ?? ?? 06 01 C3 CC
unregistersymbol(Scan_Currency)
dealloc(newmem)
dealloc(ScanCurrency)
{
// ORIGINAL CODE - INJECTION POINT: "Atelier_Ryza.exe"+41B4D0
"Atelier_Ryza.exe"+41B4C6: C3 - ret
"Atelier_Ryza.exe"+41B4C7: CC - int 3
"Atelier_Ryza.exe"+41B4C8: CC - int 3
"Atelier_Ryza.exe"+41B4C9: CC - int 3
"Atelier_Ryza.exe"+41B4CA: CC - int 3
"Atelier_Ryza.exe"+41B4CB: CC - int 3
"Atelier_Ryza.exe"+41B4CC: CC - int 3
"Atelier_Ryza.exe"+41B4CD: CC - int 3
"Atelier_Ryza.exe"+41B4CE: CC - int 3
"Atelier_Ryza.exe"+41B4CF: CC - int 3
// ---------- INJECTING HERE ----------
"Atelier_Ryza.exe"+41B4D0: 8B 05 62 1B 06 01 - mov eax,[Atelier_Ryza.exe+147D038]
// ---------- DONE INJECTING ----------
"Atelier_Ryza.exe"+41B4D6: C3 - ret
"Atelier_Ryza.exe"+41B4D7: CC - int 3
"Atelier_Ryza.exe"+41B4D8: CC - int 3
"Atelier_Ryza.exe"+41B4D9: CC - int 3
"Atelier_Ryza.exe"+41B4DA: CC - int 3
"Atelier_Ryza.exe"+41B4DB: CC - int 3
"Atelier_Ryza.exe"+41B4DC: CC - int 3
"Atelier_Ryza.exe"+41B4DD: CC - int 3
"Atelier_Ryza.exe"+41B4DE: CC - int 3
"Atelier_Ryza.exe"+41B4DF: CC - int 3
}
</AssemblerScript>
<CheatEntries>
<CheatEntry>
<ID>482</ID>
<Description>"Cole"</Description>
<VariableType>4 Bytes</VariableType>
<Address>ScanCurrency</Address>
<Offsets>
<Offset>0</Offset>
</Offsets>
</CheatEntry>
<CheatEntry>
<ID>483</ID>
<Description>"Gold Coins"</Description>
<VariableType>4 Bytes</VariableType>
<Address>ScanCurrency</Address>
<Offsets>
<Offset>8</Offset>
</Offsets>
</CheatEntry>
<CheatEntry>
<ID>484</ID>
<Description>"Gems"</Description>
<VariableType>8 Bytes</VariableType>
<Address>ScanCurrency</Address>
<Offsets>
<Offset>-59810</Offset>
</Offsets>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>466</ID>
<Description>"Alchemy Finder"</Description>
<Options moHideChildren="1" moManualExpandCollapse="1" moAllowManualCollapseAndExpand="1"/>
<LastState/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>{ Game : Atelier_Ryza.exe
Version:
Date : 2020-09-26
Author : Zach
This script does blah blah blah
}
[ENABLE]
aobscanmodule(Alc_EXP,Atelier_Ryza.exe,8B 8C 3B 0C FC 40 01) // should be unique
alloc(newmem,$1000,Alc_EXP)
globalalloc(AlcEXP,4)
label(code)
label(return)
newmem:
push rax
lea rax,[rbx+rdi+0140FC0C]
mov [AlcEXP],rax
pop rax
code:
mov ecx,[rbx+rdi+0140FC0C]
jmp return
Alc_EXP:
jmp newmem
nop 2
return:
registersymbol(Alc_EXP)
[DISABLE]
Alc_EXP:
db 8B 8C 3B 0C FC 40 01
unregistersymbol(Alc_EXP)
dealloc(newmem)
dealloc(AlcEXP)
{
// ORIGINAL CODE - INJECTION POINT: "Atelier_Ryza.exe"+4101CC
"Atelier_Ryza.exe"+4101A0: E8 4B 3B F1 FF - call Atelier_Ryza.exe+323CF0
"Atelier_Ryza.exe"+4101A5: 89 05 F1 F9 FF 00 - mov [Atelier_Ryza.exe+140FB9C],eax
"Atelier_Ryza.exe"+4101AB: 48 83 C4 28 - add rsp,28
"Atelier_Ryza.exe"+4101AF: C3 - ret
"Atelier_Ryza.exe"+4101B0: 48 89 5C 24 08 - mov [rsp+08],rbx
"Atelier_Ryza.exe"+4101B5: 57 - push rdi
"Atelier_Ryza.exe"+4101B6: 48 83 EC 20 - sub rsp,20
"Atelier_Ryza.exe"+4101BA: 48 63 C1 - movsxd rax,ecx
"Atelier_Ryza.exe"+4101BD: 48 8D 3D 3C FE BE FF - lea rdi,[Atelier_Ryza.exe]
"Atelier_Ryza.exe"+4101C4: 48 8D 1C 85 00 00 00 00 - lea rbx,[rax*4+00000000]
// ---------- INJECTING HERE ----------
"Atelier_Ryza.exe"+4101CC: 8B 8C 3B 9C FB 40 01 - mov ecx,[rbx+rdi+0140FB9C]
// ---------- DONE INJECTING ----------
"Atelier_Ryza.exe"+4101D3: E8 28 3C F1 FF - call Atelier_Ryza.exe+323E00
"Atelier_Ryza.exe"+4101D8: 3B 84 3B 98 FB 40 01 - cmp eax,[rbx+rdi+0140FB98]
"Atelier_Ryza.exe"+4101DF: 7E 14 - jle Atelier_Ryza.exe+4101F5
"Atelier_Ryza.exe"+4101E1: 89 84 3B 98 FB 40 01 - mov [rbx+rdi+0140FB98],eax
"Atelier_Ryza.exe"+4101E8: B0 01 - mov al,01
"Atelier_Ryza.exe"+4101EA: 48 8B 5C 24 30 - mov rbx,[rsp+30]
"Atelier_Ryza.exe"+4101EF: 48 83 C4 20 - add rsp,20
"Atelier_Ryza.exe"+4101F3: 5F - pop rdi
"Atelier_Ryza.exe"+4101F4: C3 - ret
"Atelier_Ryza.exe"+4101F5: 32 C0 - xor al,al
}
</AssemblerScript>
<CheatEntries>
<CheatEntry>
<ID>463</ID>
<Description>"Current Level"</Description>
<VariableType>4 Bytes</VariableType>
<Address>AlcEXP</Address>
<Offsets>
<Offset>-4</Offset>
</Offsets>
</CheatEntry>
<CheatEntry>
<ID>486</ID>
<Description>"Current EXP"</Description>
<VariableType>4 Bytes</VariableType>
<Address>AlcEXP</Address>
<Offsets>
<Offset>0</Offset>
</Offsets>
</CheatEntry>
</CheatEntries>
</CheatEntry>
</CheatEntries>
</CheatTable>
Okay, assume I'm a dumb, because I am. How would I use this?joneeh wrote: ↑Mon Mar 08, 2021 11:48 pmHere, i'm just trying to update some code that not working for version 1.07, still credit to zach
Currency Finder + Alchemy
Code: Select all
<?xml version="1.0" encoding="utf-8"?> <CheatTable CheatEngineTableVersion="31"> <CheatEntries> <CheatEntry> <ID>481</ID> <Description>"Currency Finder"</Description> <Options moHideChildren="1" moManualExpandCollapse="1" moAllowManualCollapseAndExpand="1"/> <LastState/> <VariableType>Auto Assembler Script</VariableType> <AssemblerScript>{ Game : Atelier_Ryza.exe Version: Date : 2020-01-22 Author : Zach This script does blah blah blah } [ENABLE] aobscanmodule(Scan_Currency,Atelier_Ryza.exe,8B 05 ?? ?? 06 01 C3 CC) // should be unique alloc(newmem,$1000,Scan_Currency) globalalloc(ScanCurrency,4) label(code) label(return) newmem: push rax lea rax,[Atelier_Ryza.exe+147D108] mov [ScanCurrency],rax pop rax code: mov eax,[Atelier_Ryza.exe+147D108] jmp return Scan_Currency: jmp newmem nop return: registersymbol(Scan_Currency) [DISABLE] Scan_Currency: db 8B 05 ?? ?? 06 01 C3 CC unregistersymbol(Scan_Currency) dealloc(newmem) dealloc(ScanCurrency) { // ORIGINAL CODE - INJECTION POINT: "Atelier_Ryza.exe"+41B4D0 "Atelier_Ryza.exe"+41B4C6: C3 - ret "Atelier_Ryza.exe"+41B4C7: CC - int 3 "Atelier_Ryza.exe"+41B4C8: CC - int 3 "Atelier_Ryza.exe"+41B4C9: CC - int 3 "Atelier_Ryza.exe"+41B4CA: CC - int 3 "Atelier_Ryza.exe"+41B4CB: CC - int 3 "Atelier_Ryza.exe"+41B4CC: CC - int 3 "Atelier_Ryza.exe"+41B4CD: CC - int 3 "Atelier_Ryza.exe"+41B4CE: CC - int 3 "Atelier_Ryza.exe"+41B4CF: CC - int 3 // ---------- INJECTING HERE ---------- "Atelier_Ryza.exe"+41B4D0: 8B 05 62 1B 06 01 - mov eax,[Atelier_Ryza.exe+147D038] // ---------- DONE INJECTING ---------- "Atelier_Ryza.exe"+41B4D6: C3 - ret "Atelier_Ryza.exe"+41B4D7: CC - int 3 "Atelier_Ryza.exe"+41B4D8: CC - int 3 "Atelier_Ryza.exe"+41B4D9: CC - int 3 "Atelier_Ryza.exe"+41B4DA: CC - int 3 "Atelier_Ryza.exe"+41B4DB: CC - int 3 "Atelier_Ryza.exe"+41B4DC: CC - int 3 "Atelier_Ryza.exe"+41B4DD: CC - int 3 "Atelier_Ryza.exe"+41B4DE: CC - int 3 "Atelier_Ryza.exe"+41B4DF: CC - int 3 } </AssemblerScript> <CheatEntries> <CheatEntry> <ID>482</ID> <Description>"Cole"</Description> <VariableType>4 Bytes</VariableType> <Address>ScanCurrency</Address> <Offsets> <Offset>0</Offset> </Offsets> </CheatEntry> <CheatEntry> <ID>483</ID> <Description>"Gold Coins"</Description> <VariableType>4 Bytes</VariableType> <Address>ScanCurrency</Address> <Offsets> <Offset>8</Offset> </Offsets> </CheatEntry> <CheatEntry> <ID>484</ID> <Description>"Gems"</Description> <VariableType>8 Bytes</VariableType> <Address>ScanCurrency</Address> <Offsets> <Offset>-59810</Offset> </Offsets> </CheatEntry> </CheatEntries> </CheatEntry> <CheatEntry> <ID>466</ID> <Description>"Alchemy Finder"</Description> <Options moHideChildren="1" moManualExpandCollapse="1" moAllowManualCollapseAndExpand="1"/> <LastState/> <VariableType>Auto Assembler Script</VariableType> <AssemblerScript>{ Game : Atelier_Ryza.exe Version: Date : 2020-09-26 Author : Zach This script does blah blah blah } [ENABLE] aobscanmodule(Alc_EXP,Atelier_Ryza.exe,8B 8C 3B 0C FC 40 01) // should be unique alloc(newmem,$1000,Alc_EXP) globalalloc(AlcEXP,4) label(code) label(return) newmem: push rax lea rax,[rbx+rdi+0140FC0C] mov [AlcEXP],rax pop rax code: mov ecx,[rbx+rdi+0140FC0C] jmp return Alc_EXP: jmp newmem nop 2 return: registersymbol(Alc_EXP) [DISABLE] Alc_EXP: db 8B 8C 3B 0C FC 40 01 unregistersymbol(Alc_EXP) dealloc(newmem) dealloc(AlcEXP) { // ORIGINAL CODE - INJECTION POINT: "Atelier_Ryza.exe"+4101CC "Atelier_Ryza.exe"+4101A0: E8 4B 3B F1 FF - call Atelier_Ryza.exe+323CF0 "Atelier_Ryza.exe"+4101A5: 89 05 F1 F9 FF 00 - mov [Atelier_Ryza.exe+140FB9C],eax "Atelier_Ryza.exe"+4101AB: 48 83 C4 28 - add rsp,28 "Atelier_Ryza.exe"+4101AF: C3 - ret "Atelier_Ryza.exe"+4101B0: 48 89 5C 24 08 - mov [rsp+08],rbx "Atelier_Ryza.exe"+4101B5: 57 - push rdi "Atelier_Ryza.exe"+4101B6: 48 83 EC 20 - sub rsp,20 "Atelier_Ryza.exe"+4101BA: 48 63 C1 - movsxd rax,ecx "Atelier_Ryza.exe"+4101BD: 48 8D 3D 3C FE BE FF - lea rdi,[Atelier_Ryza.exe] "Atelier_Ryza.exe"+4101C4: 48 8D 1C 85 00 00 00 00 - lea rbx,[rax*4+00000000] // ---------- INJECTING HERE ---------- "Atelier_Ryza.exe"+4101CC: 8B 8C 3B 9C FB 40 01 - mov ecx,[rbx+rdi+0140FB9C] // ---------- DONE INJECTING ---------- "Atelier_Ryza.exe"+4101D3: E8 28 3C F1 FF - call Atelier_Ryza.exe+323E00 "Atelier_Ryza.exe"+4101D8: 3B 84 3B 98 FB 40 01 - cmp eax,[rbx+rdi+0140FB98] "Atelier_Ryza.exe"+4101DF: 7E 14 - jle Atelier_Ryza.exe+4101F5 "Atelier_Ryza.exe"+4101E1: 89 84 3B 98 FB 40 01 - mov [rbx+rdi+0140FB98],eax "Atelier_Ryza.exe"+4101E8: B0 01 - mov al,01 "Atelier_Ryza.exe"+4101EA: 48 8B 5C 24 30 - mov rbx,[rsp+30] "Atelier_Ryza.exe"+4101EF: 48 83 C4 20 - add rsp,20 "Atelier_Ryza.exe"+4101F3: 5F - pop rdi "Atelier_Ryza.exe"+4101F4: C3 - ret "Atelier_Ryza.exe"+4101F5: 32 C0 - xor al,al } </AssemblerScript> <CheatEntries> <CheatEntry> <ID>463</ID> <Description>"Current Level"</Description> <VariableType>4 Bytes</VariableType> <Address>AlcEXP</Address> <Offsets> <Offset>-4</Offset> </Offsets> </CheatEntry> <CheatEntry> <ID>486</ID> <Description>"Current EXP"</Description> <VariableType>4 Bytes</VariableType> <Address>AlcEXP</Address> <Offsets> <Offset>0</Offset> </Offsets> </CheatEntry> </CheatEntries> </CheatEntry> </CheatEntries> </CheatTable>
copy-paste the code into notepad and save it as .CT file and load it into cheat engine.HolyRabbid wrote: ↑Mon Mar 08, 2021 11:49 pmOkay, assume I'm a dumb, because I am. How would I use this?
Okay.zachillios wrote: ↑Tue Mar 09, 2021 12:13 amNope. I don't own the game so I have no way of updating it. Plus, my ISP has started cracking down on torrenting so I absolutely won't be doing that anymore. I'll only be supporting the games I own from hence forward.