Mount and Blade: Warband 1.173

Upload your cheat tables here (No requests)
Konstantiniyye
Noobzor
Noobzor
Posts: 5
Joined: Tue Mar 20, 2018 1:49 pm
Reputation: 0

Re: Mount and Blade: Warband 1.173

Post by Konstantiniyye »

Hi, can you update for 1.174 please? Some features don't work and often results in a crash. Thanks!

How to use this cheat table?
  1. Install Cheat Engine
  2. Double-click the .CT file in order to open it.
  3. Click the PC icon in Cheat Engine in order to select the game process.
  4. Keep the list.
  5. Activate the trainer options by checking boxes or setting values from 0 to 1

Anno444
What is cheating?
What is cheating?
Posts: 4
Joined: Sun Sep 16, 2018 7:38 am
Reputation: 1

Re: Mount and Blade: Warband 1.173

Post by Anno444 »

Knockouts Only:
Spoiler

Code: Select all

<?xml version="1.0" encoding="utf-8"?>
<CheatTable>
  <CheatEntries>
    <CheatEntry>
      <ID>8460</ID>
      <Description>"Only Knockout"</Description>
      <LastState/>
      <VariableType>Auto Assembler Script</VariableType>
      <AssemblerScript>{ Game   : mb_warband.exe
  Version: 
  Date   : 2019-06-27
  Author : DNSPC

  This script does blah blah blah
}

define(address,"mb_warband.exe"+B7B75)
define(bytes,74 2F)

[ENABLE]

assert(address,bytes)

address:
  jmp mb_warband.exe+B7BA6

[DISABLE]

address:
  db bytes
  // je mb_warband.exe+B7BA6
  // cmp edi,ebp
  // jl mb_warband.exe+B7BA6

{
// ORIGINAL CODE - INJECTION POINT: "mb_warband.exe"+B7B75

"mb_warband.exe"+B7B49: 69 C0 C8 0F 00 00              -  imul eax,eax00000FC8
"mb_warband.exe"+B7B4F: 8B 8C 10 48 02 00 00           -  mov ecx,[eax+edx+00000248]
"mb_warband.exe"+B7B56: 8B 84 10 4C 02 00 00           -  mov eax,[eax+edx+0000024C]
"mb_warband.exe"+B7B5D: 89 44 24 1C                    -  mov [esp+1C],eax
"mb_warband.exe"+B7B61: 8B C1                          -  mov eax,ecx
"mb_warband.exe"+B7B63: 25 80 00 00 00                 -  and eax,00000080
"mb_warband.exe"+B7B68: 33 D2                          -  xor edx,edx
"mb_warband.exe"+B7B6A: 0B C2                          -  or eax,edx
"mb_warband.exe"+B7B6C: 75 26                          -  jne mb_warband.exe+B7B94
"mb_warband.exe"+B7B6E: 83 BE F0 5E 00 00 02           -  cmp dword ptr [esi+00005EF0],02
// ---------- INJECTING HERE ----------
"mb_warband.exe"+B7B75: 74 2F                          -  je mb_warband.exe+B7BA6
"mb_warband.exe"+B7B77: 3B FD                          -  cmp edi,ebp
"mb_warband.exe"+B7B79: 7C 2B                          -  jl mb_warband.exe+B7BA6
// ---------- DONE INJECTING  ----------
"mb_warband.exe"+B7B7B: 83 E1 10                       -  and ecx,10
"mb_warband.exe"+B7B7E: 0B C8                          -  or ecx,eax
"mb_warband.exe"+B7B80: 75 24                          -  jne mb_warband.exe+B7BA6
"mb_warband.exe"+B7B82: E8 59 C8 F4 FF                 -  call mb_warband.exe+43E0
"mb_warband.exe"+B7B87: D9 44 24 14                    -  fld dword ptr [esp+14]
"mb_warband.exe"+B7B8B: DE D9                          -  fcompp 
"mb_warband.exe"+B7B8D: DF E0                          -  fnstsw ax
"mb_warband.exe"+B7B8F: F6 C4 05                       -  test ah,05
"mb_warband.exe"+B7B92: 7A 12                          -  jp mb_warband.exe+B7BA6
"mb_warband.exe"+B7B94: 8B 46 08                       -  mov eax,[esi+08]
}
</AssemblerScript>
    </CheatEntry>
  </CheatEntries>
</CheatTable>
Map Speed Cheat:
Spoiler

Code: Select all

<?xml version="1.0" encoding="utf-8"?>
<CheatTable>
  <CheatEntries>
    <CheatEntry>
      <ID>8446</ID>
      <Description>"Map Speed"</Description>
      <Options moHideChildren="1" moDeactivateChildrenAsWell="1"/>
      <LastState/>
      <VariableType>Auto Assembler Script</VariableType>
      <AssemblerScript>{ Game   : mb_warband.exe
  Version: 
  Date   : 2019-06-23
  Author : DNSPC

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(INJECT,mb_warband.exe,D9 9E 58 02 00 00) // should be unique
alloc(newmem,$100)

label(code)
label(return)
label(speedmult)

newmem:
  cmp [esi+8],0
  jne code
  fmul dword ptr [speedmult]

code:
  fstp dword ptr [esi+00000258]
  jmp return

speedmult:
  dd (float)1.0

INJECT:
  jmp newmem
  nop
return:
registersymbol(INJECT)
registersymbol(speedmult)

[DISABLE]

INJECT:
  db D9 9E 58 02 00 00

unregistersymbol(speedmult)
unregistersymbol(INJECT)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "mb_warband.exe"+15C8BA

"mb_warband.exe"+15C89F: CC                             -  int 3 
"mb_warband.exe"+15C8A0: 81 EC 4C 01 00 00              -  sub esp,0000014C
"mb_warband.exe"+15C8A6: 53                             -  push ebx
"mb_warband.exe"+15C8A7: 56                             -  push esi
"mb_warband.exe"+15C8A8: 8B F1                          -  mov esi,ecx
"mb_warband.exe"+15C8AA: 33 DB                          -  xor ebx,ebx
"mb_warband.exe"+15C8AC: 38 9E 60 02 00 00              -  cmp [esi+00000260],bl
"mb_warband.exe"+15C8B2: 74 50                          -  je mb_warband.exe+15C904
"mb_warband.exe"+15C8B4: 56                             -  push esi
"mb_warband.exe"+15C8B5: E8 B6 DE FF FF                 -  call mb_warband.exe+15A770
// ---------- INJECTING HERE ----------
"mb_warband.exe"+15C8BA: D9 9E 58 02 00 00              -  fstp dword ptr [esi+00000258]
// ---------- DONE INJECTING  ----------
"mb_warband.exe"+15C8C0: 8B 0D 00 A3 8E 00              -  mov ecx,[mb_warband.exe+4EA300]
"mb_warband.exe"+15C8C6: 83 C4 04                       -  add esp,04
"mb_warband.exe"+15C8C9: C7 05 28 31 E0 00 64 00 00 00  -  mov [mb_warband.exe+A03128],00000064
"mb_warband.exe"+15C8D3: 89 1D 2C 31 E0 00              -  mov [mb_warband.exe+A0312C],ebx
"mb_warband.exe"+15C8D9: 8B 46 08                       -  mov eax,[esi+08]
"mb_warband.exe"+15C8DC: 53                             -  push ebx
"mb_warband.exe"+15C8DD: 50                             -  push eax
"mb_warband.exe"+15C8DE: 6A 1E                          -  push 1E
"mb_warband.exe"+15C8E0: E8 BB A2 F2 FF                 -  call mb_warband.exe+86BA0
"mb_warband.exe"+15C8E5: DF 2D 28 31 E0 00              -  fild qword ptr [mb_warband.exe+A03128]
}
</AssemblerScript>
      <CheatEntries>
        <CheatEntry>
          <ID>8443</ID>
          <Description>"Speed Multiplier"</Description>
          <VariableType>Float</VariableType>
          <Address>speedmult</Address>
        </CheatEntry>
      </CheatEntries>
    </CheatEntry>
  </CheatEntries>
</CheatTable>
Probably unnecessary
Alternative Health Cheat:

Code: Select all

<?xml version="1.0" encoding="utf-8"?>
<CheatTable>
  <CheatEntries>
    <CheatEntry>
      <ID>8459</ID>
      <Description>"Health Cheat alt"</Description>
      <LastState/>
      <VariableType>Auto Assembler Script</VariableType>
      <AssemblerScript>{ Game   : mb_warband.exe
  Version: 
  Date   : 2019-06-23
  Author : DNSPC

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(infhealth,mb_warband.exe,D8 64 24 20 52) // should be unique
alloc(newmem,$100)

label(code)
label(return)

newmem:
  cmp [edi+7ac],0
  je code
  fsub dword ptr [esp+20]

code:
  push edx
  jmp return

infhealth:
  jmp newmem
return:
registersymbol(infhealth)

[DISABLE]

infhealth:
  db D8 64 24 20 52

unregistersymbol(infhealth)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "mb_warband.exe"+BC154

"mb_warband.exe"+BC12E: E8 AD EB 16 00        -  call mb_warband.exe+22ACE0
"mb_warband.exe"+BC133: D9 05 B0 7A 7C 00     -  fld dword ptr [mb_warband.exe+3C7AB0]
"mb_warband.exe"+BC139: 51                    -  push ecx
"mb_warband.exe"+BC13A: 8B 0D 54 51 91 00     -  mov ecx,[mb_warband.exe+515154]
"mb_warband.exe"+BC140: D9 1C 24              -  fstp dword ptr [esp]
"mb_warband.exe"+BC143: 50                    -  push eax
"mb_warband.exe"+BC144: 50                    -  push eax
"mb_warband.exe"+BC145: E8 66 2F F5 FF        -  call mb_warband.exe+F0B0
"mb_warband.exe"+BC14A: D9 87 00 60 00 00     -  fld dword ptr [edi+00006000]
"mb_warband.exe"+BC150: 8D 54 24 14           -  lea edx,[esp+14]
// ---------- INJECTING HERE ----------
"mb_warband.exe"+BC154: D8 64 24 20           -  fsub dword ptr [esp+20]
"mb_warband.exe"+BC158: 52                    -  push edx
// ---------- DONE INJECTING  ----------
"mb_warband.exe"+BC159: 8B CF                 -  mov ecx,edi
"mb_warband.exe"+BC15B: D9 5C 24 18           -  fstp dword ptr [esp+18]
"mb_warband.exe"+BC15F: E8 6C DF FD FF        -  call mb_warband.exe+9A0D0
"mb_warband.exe"+BC164: 80 BF 00 5F 00 00 00  -  cmp byte ptr [edi+00005F00],00
"mb_warband.exe"+BC16B: 0F 84 A4 00 00 00     -  je mb_warband.exe+BC215
"mb_warband.exe"+BC171: 8D 44 24 20           -  lea eax,[esp+20]
"mb_warband.exe"+BC175: 50                    -  push eax
"mb_warband.exe"+BC176: E8 15 38 F9 FF        -  call mb_warband.exe+4F990
"mb_warband.exe"+BC17B: 83 C4 04              -  add esp,04
"mb_warband.exe"+BC17E: 85 C0                 -  test eax,eax
}
</AssemblerScript>
    </CheatEntry>
  </CheatEntries>
</CheatTable>
Works on 1.173

User avatar
PeterKunc
Cheater
Cheater
Posts: 36
Joined: Wed Jun 19, 2019 6:24 am
Reputation: 0

Re: Mount and Blade: Warband 1.173

Post by PeterKunc »

sbryzl wrote:
Thu Jan 25, 2018 8:45 pm
Stats
Reputation
Honor
RTR
Renown
Money
Infinite Ammo
God Mode
Teleport
Troop Editor
Item Editor
XP and Level

For the troop editor you can use + and - to change troop id numbers and ctrl+ / ctrl- to change it by 10 at a time.
Works, but needs update to 1.174.

lekkimsm2500
Expert Cheater
Expert Cheater
Posts: 67
Joined: Mon Mar 20, 2017 8:51 pm
Reputation: 7

Post by lekkimsm2500 »

Any hopes for an update?

LazyNChillin25
Expert Cheater
Expert Cheater
Posts: 68
Joined: Tue Dec 12, 2017 2:19 am
Reputation: 1

Re: Mount and Blade: Warband 1.173

Post by LazyNChillin25 »

it still works on 74 ive been using it for awhile, i used the old version of CE as the new ones crashes as soon as i enable them.

Bluoy70
What is cheating?
What is cheating?
Posts: 1
Joined: Tue Jan 22, 2019 12:04 am
Reputation: 0

Re: Mount and Blade: Warband 1.173

Post by Bluoy70 »

update pls!

cjtaser367
Noobzor
Noobzor
Posts: 10
Joined: Wed Apr 19, 2017 6:50 am
Reputation: 0

Re: Mount and Blade: Warband 1.173

Post by cjtaser367 »

pls update to 1.174

CIKOMELANTIK
Expert Cheater
Expert Cheater
Posts: 82
Joined: Fri Mar 03, 2017 12:33 pm
Reputation: 19

Re: Mount and Blade: Warband 1.173

Post by CIKOMELANTIK »

anyone can tell me how to fix menu "Honor Renown RTR Relations" for 1.174?

VenomBronyPL
Noobzor
Noobzor
Posts: 8
Joined: Thu Oct 10, 2019 11:57 pm
Reputation: 2

Re: Mount and Blade: Warband 1.173

Post by VenomBronyPL »

Unlimited Ammo and Thrown weapons are on 0 everytime im turning it on , why ? i have arrows and throwable weapon , whats goin on ?

VenomBronyPL
Noobzor
Noobzor
Posts: 8
Joined: Thu Oct 10, 2019 11:57 pm
Reputation: 2

Re: Mount and Blade: Warband 1.173

Post by VenomBronyPL »

Also MORALE cheats will be good too asap

mythal
What is cheating?
What is cheating?
Posts: 3
Joined: Sat Nov 18, 2017 9:36 pm
Reputation: 0

Re: Mount and Blade: Warband 1.173

Post by mythal »

Only took me 8 years, but I finally remade my old popular M&B helper script and a little tutorial of how to use it!
Download for correct AHK version, the script, and some more info all included this time.

#ahk #script #modding #mountblade

Bessirilus
Noobzor
Noobzor
Posts: 5
Joined: Sat Aug 17, 2019 8:06 pm
Reputation: 2

Re: Mount and Blade: Warband 1.173

Post by Bessirilus »

God mode doesn't work on units, infinite ammo/throwables lock them at 0 and it crashes randomly

KingApin
Expert Cheater
Expert Cheater
Posts: 79
Joined: Fri Feb 28, 2020 11:36 pm
Reputation: 22

Re: Mount and Blade: Warband 1.173

Post by KingApin »

Can it be used on 1.174?

User avatar
darkzix
Noobzor
Noobzor
Posts: 14
Joined: Wed Sep 27, 2017 5:30 am
Reputation: 0

Re: Mount and Blade: Warband 1.173

Post by darkzix »

pls update to 1.174

User avatar
ebtesam30
Expert Cheater
Expert Cheater
Posts: 116
Joined: Sat Jun 27, 2020 12:23 am
Reputation: 10

Re: Mount and Blade: Warband 1.173

Post by ebtesam30 »

can you update it to work on Window Version (game Pass) please?

Post Reply

Who is online

Users browsing this forum: AhrefsBot, coffeecode, SassaMFG, SavicusVonde, Tom andy