We're giving away Borderlands 3 gift key. Click here!

Mount and Blade: Warband 1.173

Upload your cheat tables here (No requests)
Konstantiniyye
Noobzor
Noobzor
Posts: 7
Joined: Tue Mar 20, 2018 1:49 pm
Reputation: 0

Re: Mount and Blade: Warband 1.173

Post by Konstantiniyye » Sat May 11, 2019 3:34 pm

Hi, can you update for 1.174 please? Some features don't work and often results in a crash. Thanks!

Anno444
What is cheating?
What is cheating?
Posts: 2
Joined: Sun Sep 16, 2018 7:38 am
Reputation: 0

Re: Mount and Blade: Warband 1.173

Post by Anno444 » Sat Jun 29, 2019 2:29 pm

Knockouts Only:
Show

Code: Select all

<?xml version="1.0" encoding="utf-8"?>
<CheatTable>
  <CheatEntries>
    <CheatEntry>
      <ID>8460</ID>
      <Description>"Only Knockout"</Description>
      <LastState/>
      <VariableType>Auto Assembler Script</VariableType>
      <AssemblerScript>{ Game   : mb_warband.exe
  Version: 
  Date   : 2019-06-27
  Author : DNSPC

  This script does blah blah blah
}

define(address,"mb_warband.exe"+B7B75)
define(bytes,74 2F)

[ENABLE]

assert(address,bytes)

address:
  jmp mb_warband.exe+B7BA6

[DISABLE]

address:
  db bytes
  // je mb_warband.exe+B7BA6
  // cmp edi,ebp
  // jl mb_warband.exe+B7BA6

{
// ORIGINAL CODE - INJECTION POINT: "mb_warband.exe"+B7B75

"mb_warband.exe"+B7B49: 69 C0 C8 0F 00 00              -  imul eax,eax00000FC8
"mb_warband.exe"+B7B4F: 8B 8C 10 48 02 00 00           -  mov ecx,[eax+edx+00000248]
"mb_warband.exe"+B7B56: 8B 84 10 4C 02 00 00           -  mov eax,[eax+edx+0000024C]
"mb_warband.exe"+B7B5D: 89 44 24 1C                    -  mov [esp+1C],eax
"mb_warband.exe"+B7B61: 8B C1                          -  mov eax,ecx
"mb_warband.exe"+B7B63: 25 80 00 00 00                 -  and eax,00000080
"mb_warband.exe"+B7B68: 33 D2                          -  xor edx,edx
"mb_warband.exe"+B7B6A: 0B C2                          -  or eax,edx
"mb_warband.exe"+B7B6C: 75 26                          -  jne mb_warband.exe+B7B94
"mb_warband.exe"+B7B6E: 83 BE F0 5E 00 00 02           -  cmp dword ptr [esi+00005EF0],02
// ---------- INJECTING HERE ----------
"mb_warband.exe"+B7B75: 74 2F                          -  je mb_warband.exe+B7BA6
"mb_warband.exe"+B7B77: 3B FD                          -  cmp edi,ebp
"mb_warband.exe"+B7B79: 7C 2B                          -  jl mb_warband.exe+B7BA6
// ---------- DONE INJECTING  ----------
"mb_warband.exe"+B7B7B: 83 E1 10                       -  and ecx,10
"mb_warband.exe"+B7B7E: 0B C8                          -  or ecx,eax
"mb_warband.exe"+B7B80: 75 24                          -  jne mb_warband.exe+B7BA6
"mb_warband.exe"+B7B82: E8 59 C8 F4 FF                 -  call mb_warband.exe+43E0
"mb_warband.exe"+B7B87: D9 44 24 14                    -  fld dword ptr [esp+14]
"mb_warband.exe"+B7B8B: DE D9                          -  fcompp 
"mb_warband.exe"+B7B8D: DF E0                          -  fnstsw ax
"mb_warband.exe"+B7B8F: F6 C4 05                       -  test ah,05
"mb_warband.exe"+B7B92: 7A 12                          -  jp mb_warband.exe+B7BA6
"mb_warband.exe"+B7B94: 8B 46 08                       -  mov eax,[esi+08]
}
</AssemblerScript>
    </CheatEntry>
  </CheatEntries>
</CheatTable>
Map Speed Cheat:
Show

Code: Select all

<?xml version="1.0" encoding="utf-8"?>
<CheatTable>
  <CheatEntries>
    <CheatEntry>
      <ID>8446</ID>
      <Description>"Map Speed"</Description>
      <Options moHideChildren="1" moDeactivateChildrenAsWell="1"/>
      <LastState/>
      <VariableType>Auto Assembler Script</VariableType>
      <AssemblerScript>{ Game   : mb_warband.exe
  Version: 
  Date   : 2019-06-23
  Author : DNSPC

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(INJECT,mb_warband.exe,D9 9E 58 02 00 00) // should be unique
alloc(newmem,$100)

label(code)
label(return)
label(speedmult)

newmem:
  cmp [esi+8],0
  jne code
  fmul dword ptr [speedmult]

code:
  fstp dword ptr [esi+00000258]
  jmp return

speedmult:
  dd (float)1.0

INJECT:
  jmp newmem
  nop
return:
registersymbol(INJECT)
registersymbol(speedmult)

[DISABLE]

INJECT:
  db D9 9E 58 02 00 00

unregistersymbol(speedmult)
unregistersymbol(INJECT)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "mb_warband.exe"+15C8BA

"mb_warband.exe"+15C89F: CC                             -  int 3 
"mb_warband.exe"+15C8A0: 81 EC 4C 01 00 00              -  sub esp,0000014C
"mb_warband.exe"+15C8A6: 53                             -  push ebx
"mb_warband.exe"+15C8A7: 56                             -  push esi
"mb_warband.exe"+15C8A8: 8B F1                          -  mov esi,ecx
"mb_warband.exe"+15C8AA: 33 DB                          -  xor ebx,ebx
"mb_warband.exe"+15C8AC: 38 9E 60 02 00 00              -  cmp [esi+00000260],bl
"mb_warband.exe"+15C8B2: 74 50                          -  je mb_warband.exe+15C904
"mb_warband.exe"+15C8B4: 56                             -  push esi
"mb_warband.exe"+15C8B5: E8 B6 DE FF FF                 -  call mb_warband.exe+15A770
// ---------- INJECTING HERE ----------
"mb_warband.exe"+15C8BA: D9 9E 58 02 00 00              -  fstp dword ptr [esi+00000258]
// ---------- DONE INJECTING  ----------
"mb_warband.exe"+15C8C0: 8B 0D 00 A3 8E 00              -  mov ecx,[mb_warband.exe+4EA300]
"mb_warband.exe"+15C8C6: 83 C4 04                       -  add esp,04
"mb_warband.exe"+15C8C9: C7 05 28 31 E0 00 64 00 00 00  -  mov [mb_warband.exe+A03128],00000064
"mb_warband.exe"+15C8D3: 89 1D 2C 31 E0 00              -  mov [mb_warband.exe+A0312C],ebx
"mb_warband.exe"+15C8D9: 8B 46 08                       -  mov eax,[esi+08]
"mb_warband.exe"+15C8DC: 53                             -  push ebx
"mb_warband.exe"+15C8DD: 50                             -  push eax
"mb_warband.exe"+15C8DE: 6A 1E                          -  push 1E
"mb_warband.exe"+15C8E0: E8 BB A2 F2 FF                 -  call mb_warband.exe+86BA0
"mb_warband.exe"+15C8E5: DF 2D 28 31 E0 00              -  fild qword ptr [mb_warband.exe+A03128]
}
</AssemblerScript>
      <CheatEntries>
        <CheatEntry>
          <ID>8443</ID>
          <Description>"Speed Multiplier"</Description>
          <VariableType>Float</VariableType>
          <Address>speedmult</Address>
        </CheatEntry>
      </CheatEntries>
    </CheatEntry>
  </CheatEntries>
</CheatTable>
Probably unnecessaryShow
Alternative Health Cheat:

Code: Select all

<?xml version="1.0" encoding="utf-8"?>
<CheatTable>
  <CheatEntries>
    <CheatEntry>
      <ID>8459</ID>
      <Description>"Health Cheat alt"</Description>
      <LastState/>
      <VariableType>Auto Assembler Script</VariableType>
      <AssemblerScript>{ Game   : mb_warband.exe
  Version: 
  Date   : 2019-06-23
  Author : DNSPC

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(infhealth,mb_warband.exe,D8 64 24 20 52) // should be unique
alloc(newmem,$100)

label(code)
label(return)

newmem:
  cmp [edi+7ac],0
  je code
  fsub dword ptr [esp+20]

code:
  push edx
  jmp return

infhealth:
  jmp newmem
return:
registersymbol(infhealth)

[DISABLE]

infhealth:
  db D8 64 24 20 52

unregistersymbol(infhealth)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "mb_warband.exe"+BC154

"mb_warband.exe"+BC12E: E8 AD EB 16 00        -  call mb_warband.exe+22ACE0
"mb_warband.exe"+BC133: D9 05 B0 7A 7C 00     -  fld dword ptr [mb_warband.exe+3C7AB0]
"mb_warband.exe"+BC139: 51                    -  push ecx
"mb_warband.exe"+BC13A: 8B 0D 54 51 91 00     -  mov ecx,[mb_warband.exe+515154]
"mb_warband.exe"+BC140: D9 1C 24              -  fstp dword ptr [esp]
"mb_warband.exe"+BC143: 50                    -  push eax
"mb_warband.exe"+BC144: 50                    -  push eax
"mb_warband.exe"+BC145: E8 66 2F F5 FF        -  call mb_warband.exe+F0B0
"mb_warband.exe"+BC14A: D9 87 00 60 00 00     -  fld dword ptr [edi+00006000]
"mb_warband.exe"+BC150: 8D 54 24 14           -  lea edx,[esp+14]
// ---------- INJECTING HERE ----------
"mb_warband.exe"+BC154: D8 64 24 20           -  fsub dword ptr [esp+20]
"mb_warband.exe"+BC158: 52                    -  push edx
// ---------- DONE INJECTING  ----------
"mb_warband.exe"+BC159: 8B CF                 -  mov ecx,edi
"mb_warband.exe"+BC15B: D9 5C 24 18           -  fstp dword ptr [esp+18]
"mb_warband.exe"+BC15F: E8 6C DF FD FF        -  call mb_warband.exe+9A0D0
"mb_warband.exe"+BC164: 80 BF 00 5F 00 00 00  -  cmp byte ptr [edi+00005F00],00
"mb_warband.exe"+BC16B: 0F 84 A4 00 00 00     -  je mb_warband.exe+BC215
"mb_warband.exe"+BC171: 8D 44 24 20           -  lea eax,[esp+20]
"mb_warband.exe"+BC175: 50                    -  push eax
"mb_warband.exe"+BC176: E8 15 38 F9 FF        -  call mb_warband.exe+4F990
"mb_warband.exe"+BC17B: 83 C4 04              -  add esp,04
"mb_warband.exe"+BC17E: 85 C0                 -  test eax,eax
}
</AssemblerScript>
    </CheatEntry>
  </CheatEntries>
</CheatTable>
Works on 1.173

User avatar
PeterKunc
Cheater
Cheater
Posts: 28
Joined: Wed Jun 19, 2019 6:24 am
Reputation: 0

Re: Mount and Blade: Warband 1.173

Post by PeterKunc » Thu Jul 25, 2019 4:56 pm

sbryzl wrote:
Thu Jan 25, 2018 8:45 pm
Stats
Reputation
Honor
RTR
Renown
Money
Infinite Ammo
God Mode
Teleport
Troop Editor
Item Editor
XP and Level

For the troop editor you can use + and - to change troop id numbers and ctrl+ / ctrl- to change it by 10 at a time.
Works, but needs update to 1.174.

lekkimsm2500
Cheater
Cheater
Posts: 27
Joined: Mon Mar 20, 2017 8:51 pm
Reputation: 0

Post by lekkimsm2500 » Sat Aug 31, 2019 9:26 pm

Any hopes for an update?

LazyNChillin25
Expert Cheater
Expert Cheater
Posts: 73
Joined: Tue Dec 12, 2017 2:19 am
Reputation: 0

Re: Mount and Blade: Warband 1.173

Post by LazyNChillin25 » Sun Sep 01, 2019 5:43 am

it still works on 74 ive been using it for awhile, i used the old version of CE as the new ones crashes as soon as i enable them.

Bluoy70
What is cheating?
What is cheating?
Posts: 1
Joined: Tue Jan 22, 2019 12:04 am
Reputation: 0

Re: Mount and Blade: Warband 1.173

Post by Bluoy70 » Wed Sep 11, 2019 2:05 pm

update pls!

cjtaser367
Noobzor
Noobzor
Posts: 8
Joined: Wed Apr 19, 2017 6:50 am
Reputation: 0

Re: Mount and Blade: Warband 1.173

Post by cjtaser367 » Thu Sep 12, 2019 7:25 am

pls update to 1.174

Post Reply

Who is online

Users browsing this forum: 4x4F, Baidu [Spider], ComManDerBG, DaGooney, Google Adsense [Bot], hacksalan, kijin, manila35, STN, Sxsxarael, thecolbstar