Re: Mount and Blade: Warband 1.173
Posted: Sat Mar 03, 2018 4:11 pm
Does the table work for Viking Conquest?
Community Cheat Tables of Cheat Engine
https://fearlessrevolution.com/
It is missingskywolf23 wrote: ↑Tue Aug 28, 2018 6:11 amAm i blind? i see every option but the item editor?
Just curious. Or is that table hidden because of of some squabble?
NM found it under "hero" was looking in the table options and etc.
But what is the TypP value for get ?? i assume because i am running a mod?
Code: Select all
<?xml version="1.0" encoding="utf-8"?>
<CheatTable>
<CheatEntries>
<CheatEntry>
<ID>8444</ID>
<Description>"Item Editor"</Description>
<LastState Activated="1"/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>{ Game : mb_warband.exe
Version:
Date : 2018-10-18
Author : lampuiho
This script gets the pointer to item array
}
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(ItemEdit,mb_warband.exe,83 BC C8 D0 02 00 00 00) // should be unique
alloc(newmem,$100)
label(ItemPtr)
label(code)
label(return)
registersymbol(ItemPtr)
registersymbol(ItemEdit)
newmem:
ItemPtr:
dd 0
code:
mov [ItemPtr], eax
cmp dword ptr [eax+ecx*8+000002D0],00
jmp return
ItemEdit:
jmp code
nop
nop
nop
return:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
ItemEdit:
db 83 BC C8 D0 02 00 00 00
unregistersymbol(ItemEdit)
unregistersymbol(ItemPtr)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "mb_warband.exe"+1DB9F8
"mb_warband.exe"+1DB9D1: FF D0 - call eax
"mb_warband.exe"+1DB9D3: 84 C0 - test al,al
"mb_warband.exe"+1DB9D5: 74 65 - je mb_warband.exe+1DBA3C
"mb_warband.exe"+1DB9D7: 83 BF B0 0B 00 00 00 - cmp dword ptr [edi+00000BB0],00
"mb_warband.exe"+1DB9DE: 75 5C - jne mb_warband.exe+1DBA3C
"mb_warband.exe"+1DB9E0: 8B 4C 24 1C - mov ecx,[esp+1C]
"mb_warband.exe"+1DB9E4: 8B 15 40 2F 8B 00 - mov edx,[mb_warband.exe+4B2F40]
"mb_warband.exe"+1DB9EA: 69 C9 F9 01 00 00 - imul ecx,ecx,000001F9
"mb_warband.exe"+1DB9F0: 8B 82 F0 40 01 00 - mov eax,[edx+000140F0]
"mb_warband.exe"+1DB9F6: 03 CE - add ecx,esi
// ---------- INJECTING HERE ----------
"mb_warband.exe"+1DB9F8: 83 BC C8 D0 02 00 00 00 - cmp dword ptr [eax+ecx*8+000002D0],00
// ---------- DONE INJECTING ----------
"mb_warband.exe"+1DBA00: 8D 8C C8 D0 02 00 00 - lea ecx,[eax+ecx*8+000002D0]
"mb_warband.exe"+1DBA07: 7C 33 - jl mb_warband.exe+1DBA3C
"mb_warband.exe"+1DBA09: 8B 03 - mov eax,[ebx]
"mb_warband.exe"+1DBA0B: D9 80 9C 01 00 00 - fld dword ptr [eax+0000019C]
"mb_warband.exe"+1DBA11: 05 9C 01 00 00 - add eax,0000019C
"mb_warband.exe"+1DBA16: DD 05 78 3F 81 00 - fld qword ptr [mb_warband.exe+413F78]
"mb_warband.exe"+1DBA1C: 6A 64 - push 64
"mb_warband.exe"+1DBA1E: DC C1 - fadd st(1),st(0)
"mb_warband.exe"+1DBA20: 56 - push esi
"mb_warband.exe"+1DBA21: D9 C9 - fxch st(1)
}
</AssemblerScript>
<CheatEntries>
<CheatEntry>
<ID>8443</ID>
<Description>"1st Item"</Description>
<LastState Value="159" RealAddress="12C9D2F4"/>
<VariableType>4 Bytes</VariableType>
<Address>ItemPtr</Address>
<Offsets>
<Offset>000002D0</Offset>
</Offsets>
</CheatEntry>
<CheatEntry>
<ID>8445</ID>
<Description>"1st Item"</Description>
<LastState Value="31" RealAddress="12C9D2FB"/>
<VariableType>Byte</VariableType>
<Address>ItemPtr</Address>
<Offsets>
<Offset>2D7</Offset>
</Offsets>
</CheatEntry>
</CheatEntries>
</CheatEntry>
</CheatEntries>
</CheatTable>