Some scripts for 1.20
SideStories Timer Moves Slowly. For side tasks with countdown timer, like serving lemonade within a time limit. Disable when not necessary.
Code: Select all
<?xml version="1.0" encoding="utf-8"?>
<CheatTable>
<CheatEntries>
<CheatEntry>
<ID>356644</ID>
<Description>"SideStories Timer Moves Slowly"</Description>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>{ Game : likeadragon8.exe
Version:
Date : 2025-04-29
Author : Administrator
This script does blah blah blah
}
[ENABLE]
aobscanmodule(INJECT55,likeadragon8.exe,2B C2 3B D1 41 0F 43 C4) // should be unique
alloc(newmem,$1000,INJECT55)
label(code)
label(return)
newmem:
mov edx,(int)1
code:
sub eax,edx
cmp edx,ecx
cmovae eax,r12d
jmp return
INJECT55:
jmp newmem
nop 3
return:
registersymbol(INJECT55)
[DISABLE]
INJECT55:
db 2B C2 3B D1 41 0F 43 C4
unregistersymbol(INJECT55)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: likeadragon8.exe+1B68C72
likeadragon8.exe+1B68C45: 48 8B 90 B0 00 00 00 - mov rdx,[rax+000000B0]
likeadragon8.exe+1B68C4C: 49 8B CF - mov rcx,r15
likeadragon8.exe+1B68C4F: 41 F6 87 D2 00 00 00 01 - test byte ptr [r15+000000D2],01
likeadragon8.exe+1B68C57: 74 2A - je likeadragon8.exe+1B68C83
likeadragon8.exe+1B68C59: FF D2 - call rdx
likeadragon8.exe+1B68C5B: 0F B6 C8 - movzx ecx,al
likeadragon8.exe+1B68C5E: 48 8D 05 7B 1D D8 02 - lea rax,[likeadragon8.exe+48EA9E0]
likeadragon8.exe+1B68C65: 8B 54 88 1C - mov edx,[rax+rcx*4+1C]
likeadragon8.exe+1B68C69: 41 8B 8F C0 00 00 00 - mov ecx,[r15+000000C0]
likeadragon8.exe+1B68C70: 8B C1 - mov eax,ecx
// ---------- INJECTING HERE ----------
likeadragon8.exe+1B68C72: 2B C2 - sub eax,edx
// ---------- DONE INJECTING ----------
likeadragon8.exe+1B68C74: 3B D1 - cmp edx,ecx
likeadragon8.exe+1B68C76: 41 0F 43 C4 - cmovae eax,r12d
likeadragon8.exe+1B68C7A: 41 89 87 C0 00 00 00 - mov [r15+000000C0],eax
likeadragon8.exe+1B68C81: EB 17 - jmp likeadragon8.exe+1B68C9A
likeadragon8.exe+1B68C83: FF D2 - call rdx
likeadragon8.exe+1B68C85: 0F B6 C8 - movzx ecx,al
likeadragon8.exe+1B68C88: 48 8D 05 51 1D D8 02 - lea rax,[likeadragon8.exe+48EA9E0]
likeadragon8.exe+1B68C8F: 8B 4C 88 1C - mov ecx,[rax+rcx*4+1C]
likeadragon8.exe+1B68C93: 41 01 8F C0 00 00 00 - add [r15+000000C0],ecx
likeadragon8.exe+1B68C9A: 48 8B CF - mov rcx,rdi
}
</AssemblerScript>
</CheatEntry>
</CheatEntries>
</CheatTable>
Dondoku Island: Popularity Multiplier (default: x2)
Code: Select all
<?xml version="1.0" encoding="utf-8"?>
<CheatTable>
<CheatEntries>
<CheatEntry>
<ID>356686</ID>
<Description>"Dondoku Island: Popularity Multiplier"</Description>
<Options moHideChildren="1" moDeactivateChildrenAsWell="1"/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>{ Game : likeadragon8.exe
Version: 1.20
Date : 2025-05-01
Author : Administrator
This script does blah blah blah
}
[ENABLE]
aobscanmodule(DondokuAddSatisfactionAOB,likeadragon8.exe,8B C6 48 8B 8D C0 12 00 00) // should be unique
alloc(newmem,$1000,DondokuAddSatisfactionAOB)
label(code)
label(return)
label(satisfactionMultiplier)
newmem:
imul esi,[satisfactionMultiplier]
code:
mov eax,esi
mov rcx,[rbp+000012C0]
jmp return
align 10 CC
satisfactionMultiplier:
dd (int)2
DondokuAddSatisfactionAOB:
jmp newmem
nop 4
return:
registersymbol(DondokuAddSatisfactionAOB satisfactionMultiplier)
[DISABLE]
DondokuAddSatisfactionAOB:
db 8B C6 48 8B 8D C0 12 00 00
unregistersymbol(*)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: likeadragon8.exe+D069D0
likeadragon8.exe+D069AB: E8 C0 2A FD FF - call likeadragon8.exe+CD9470
likeadragon8.exe+D069B0: 85 C0 - test eax,eax
likeadragon8.exe+D069B2: 74 02 - je likeadragon8.exe+D069B6
likeadragon8.exe+D069B4: 03 F0 - add esi,eax
likeadragon8.exe+D069B6: 48 83 C7 04 - add rdi,04
likeadragon8.exe+D069BA: 8B 4C 24 2C - mov ecx,[rsp+2C]
likeadragon8.exe+D069BE: 48 8B 44 24 20 - mov rax,[rsp+20]
likeadragon8.exe+D069C3: 48 8D 04 88 - lea rax,[rax+rcx*4]
likeadragon8.exe+D069C7: 48 3B F8 - cmp rdi,rax
likeadragon8.exe+D069CA: 0F 85 60 FF FF FF - jne likeadragon8.exe+D06930
// ---------- INJECTING HERE ----------
likeadragon8.exe+D069D0: 8B C6 - mov eax,esi
// ---------- DONE INJECTING ----------
likeadragon8.exe+D069D2: 48 8B 8D C0 12 00 00 - mov rcx,[rbp+000012C0]
likeadragon8.exe+D069D9: 48 33 CC - xor rcx,rsp
likeadragon8.exe+D069DC: E8 AF 4E 66 FF - call likeadragon8.exe+36B890
likeadragon8.exe+D069E1: 4C 8D 9C 24 D0 13 00 00 - lea r11,[rsp+000013D0]
likeadragon8.exe+D069E9: 49 8B 5B 30 - mov rbx,[r11+30]
likeadragon8.exe+D069ED: 49 8B 73 38 - mov rsi,[r11+38]
likeadragon8.exe+D069F1: 49 8B 7B 40 - mov rdi,[r11+40]
likeadragon8.exe+D069F5: 49 8B E3 - mov rsp,r11
likeadragon8.exe+D069F8: 41 5F - pop r15
likeadragon8.exe+D069FA: 41 5E - pop r14
}
</AssemblerScript>
<CheatEntries>
<CheatEntry>
<ID>356687</ID>
<Description>"Multiplier"</Description>
<ShowAsSigned>0</ShowAsSigned>
<VariableType>4 Bytes</VariableType>
<Address>satisfactionMultiplier</Address>
</CheatEntry>
</CheatEntries>
</CheatEntry>
</CheatEntries>
</CheatTable>
Updated version of
JRem's Dondoko Island Inventory changer
Simple Inventory changer, move something from your inventory to Storage(the item must be stackable).
Move ONLY 1 item to Storage, and the stack changes to 99
Code: Select all
<?xml version="1.0" encoding="utf-8"?>
<CheatTable>
<CheatEntries>
<CheatEntry>
<ID>357252</ID>
<Description>"Doko Island Inventory changer"</Description>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>{ Game : likeadragon8.exe
Version: 1.20
Date : 2025-05-01
Author : JRem
Doko Island Inventory changer
Simple Inventory changer, move something from your inventory to Storage(the item must be stackable).
Move ONLY 1 item to Storage, and the stack changes to 99
}
[ENABLE]
aobscanmodule(DeductInvAOB,likeadragon8.exe,48 8B 0C 02 8B 41 14 3B C3) // should be unique
alloc(newmem,$1000,DeductInvAOB)
label(code)
label(return)
newmem:
mov [rcx+14],(int)700
mov eax,[rcx+14]
code:
cmp eax,ebx
jmp return
DeductInvAOB+4:
jmp newmem
return:
registersymbol(DeductInvAOB)
[DISABLE]
DeductInvAOB+4:
db 8B 41 14 3B C3
unregistersymbol(DeductInvAOB)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: likeadragon8.exe+1C8C45C
likeadragon8.exe+1C8C433: 44 8B 4C 24 2C - mov r9d,[rsp+2C]
likeadragon8.exe+1C8C438: 45 8B C4 - mov r8d,r12d
likeadragon8.exe+1C8C43B: 45 85 C9 - test r9d,r9d
likeadragon8.exe+1C8C43E: 74 45 - je likeadragon8.exe+1C8C485
likeadragon8.exe+1C8C440: 49 8B D4 - mov rdx,r12
likeadragon8.exe+1C8C443: 0F 1F 40 00 - nop dword ptr [rax+00]
likeadragon8.exe+1C8C447: 66 0F 1F 84 00 00 00 00 00 - nop word ptr [rax+rax+00000000]
likeadragon8.exe+1C8C450: 48 8B 44 24 20 - mov rax,[rsp+20]
likeadragon8.exe+1C8C455: 40 B7 01 - mov dil,01
likeadragon8.exe+1C8C458: 48 8B 0C 02 - mov rcx,[rdx+rax]
// ---------- INJECTING HERE ----------
likeadragon8.exe+1C8C45C: 8B 41 14 - mov eax,[rcx+14]
// ---------- DONE INJECTING ----------
likeadragon8.exe+1C8C45F: 3B C3 - cmp eax,ebx
likeadragon8.exe+1C8C461: 77 1A - ja likeadragon8.exe+1C8C47D
likeadragon8.exe+1C8C463: 4C 89 61 0C - mov [rcx+0C],r12
likeadragon8.exe+1C8C467: 44 89 61 14 - mov [rcx+14],r12d
likeadragon8.exe+1C8C46B: 2B D8 - sub ebx,eax
likeadragon8.exe+1C8C46D: 74 16 - je likeadragon8.exe+1C8C485
likeadragon8.exe+1C8C46F: 41 FF C0 - inc r8d
likeadragon8.exe+1C8C472: 48 83 C2 08 - add rdx,08
likeadragon8.exe+1C8C476: 45 3B C1 - cmp r8d,r9d
likeadragon8.exe+1C8C479: 72 D5 - jb likeadragon8.exe+1C8C450
}
</AssemblerScript>
</CheatEntry>
</CheatEntries>
</CheatTable>