Sword Art Online: Fatal Bullet(Steam)DIY

Ask about cheats/tables for single player games here
korell
Noobzor
Noobzor
Posts: 13
Joined: Sat Mar 04, 2017 6:57 am
Reputation: 2

Re: Sword Art Online: Fatal Bullet(Steam)DIY

Post by korell »

Thanks for the good work. Haven't noticed anything weird being affected by both scripts.

Dekirai
Expert Cheater
Expert Cheater
Posts: 98
Joined: Sat Feb 03, 2018 9:25 pm
Reputation: 34

Re: Sword Art Online: Fatal Bullet(Steam)DIY

Post by Dekirai »

Infinite Ammo all Weapons

Code: Select all

{ Game   : SAOFB-Win64-Shipping.exe
  Version:
  Date   : 2018-02-25
  Author : Dekirai

  This script does blah blah blah
}

[ENABLE]


aobscanmodule(infammo,SAOFB-Win64-Shipping.exe,89 83 7C 06 00 00 48) // should be unique
alloc(newmem,$1000,"SAOFB-Win64-Shipping.exe"+33E502)

label(code)
label(return)

newmem:

code:
  mov [rbx+0000067C],eax
  jmp return

infammo:
  nop
  nop
  nop
  nop
  nop
  nop
return:
registersymbol(infammo)

[DISABLE]

infammo:
  db 89 83 7C 06 00 00

unregistersymbol(infammo)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "SAOFB-Win64-Shipping.exe"+33E502

"SAOFB-Win64-Shipping.exe"+33E4E1: 0F 84 87 00 00 00        -  je SAOFB-Win64-Shipping.exe+33E56E
"SAOFB-Win64-Shipping.exe"+33E4E7: 80 B8 84 06 00 00 00     -  cmp byte ptr [rax+00000684],00
"SAOFB-Win64-Shipping.exe"+33E4EE: 75 D6                    -  jne SAOFB-Win64-Shipping.exe+33E4C6
"SAOFB-Win64-Shipping.exe"+33E4F0: 48 83 C4 20              -  add rsp,20
"SAOFB-Win64-Shipping.exe"+33E4F4: 5B                       -  pop rbx
"SAOFB-Win64-Shipping.exe"+33E4F5: C3                       -  ret
"SAOFB-Win64-Shipping.exe"+33E4F6: 8B 83 7C 06 00 00        -  mov eax,[rbx+0000067C]
"SAOFB-Win64-Shipping.exe"+33E4FC: 85 C0                    -  test eax,eax
"SAOFB-Win64-Shipping.exe"+33E4FE: 74 08                    -  je SAOFB-Win64-Shipping.exe+33E508
"SAOFB-Win64-Shipping.exe"+33E500: FF C8                    -  dec eax
// ---------- INJECTING HERE ----------
"SAOFB-Win64-Shipping.exe"+33E502: 89 83 7C 06 00 00        -  mov [rbx+0000067C],eax
// ---------- DONE INJECTING  ----------
"SAOFB-Win64-Shipping.exe"+33E508: 48 8B CB                 -  mov rcx,rbx
"SAOFB-Win64-Shipping.exe"+33E50B: E8 20 9A 00 00           -  call SAOFB-Win64-Shipping.exe+347F30
"SAOFB-Win64-Shipping.exe"+33E510: 84 C0                    -  test al,al
"SAOFB-Win64-Shipping.exe"+33E512: 74 5A                    -  je SAOFB-Win64-Shipping.exe+33E56E
"SAOFB-Win64-Shipping.exe"+33E514: 80 BB 85 06 00 00 00     -  cmp byte ptr [rbx+00000685],00
"SAOFB-Win64-Shipping.exe"+33E51B: 75 51                    -  jne SAOFB-Win64-Shipping.exe+33E56E
"SAOFB-Win64-Shipping.exe"+33E51D: 80 BB 89 03 00 00 05     -  cmp byte ptr [rbx+00000389],05
"SAOFB-Win64-Shipping.exe"+33E524: 75 21                    -  jne SAOFB-Win64-Shipping.exe+33E547
"SAOFB-Win64-Shipping.exe"+33E526: 4C 8D 83 98 06 00 00     -  lea r8,[rbx+00000698]
"SAOFB-Win64-Shipping.exe"+33E52D: 41 B9 01 00 00 00        -  mov r9d,00000001
}

doggyJack
What is cheating?
What is cheating?
Posts: 3
Joined: Sun Feb 25, 2018 11:43 am
Reputation: 0

Re: Sword Art Online: Fatal Bullet(Steam)DIY

Post by doggyJack »

How can I cheat on my xp ? Is there any code for XP cheating ?

vdduc1989
What is cheating?
What is cheating?
Posts: 4
Joined: Sun Feb 25, 2018 11:50 am
Reputation: 1

Re: Sword Art Online: Fatal Bullet(Steam)DIY

Post by vdduc1989 »

qweasdzxc17 wrote:
Sun Feb 25, 2018 7:22 am

Code: Select all

{ Game   : SAOFB-Win64-Shipping.exe
  Version: 
  Date   : 2018-02-25
  Author : qweasdzxc17

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(SAOFBNoMats,SAOFB-Win64-Shipping.exe,72 29 F8 89 41 10 48 83 B9 ?? ?? ?? ?? ?? 74 2F 48 8B 89)
registersymbol(SAOFBNoMats)

SAOFBNoMats+03:
  db 90 90 90


[DISABLE]

SAOFBNoMats+03:
  db 89 41 10

unregistersymbol(SAOFBNoMats)

{
// ORIGINAL CODE - INJECTION POINT: "SAOFB-Win64-Shipping.exe"+5CF49E1

"SAOFB-Win64-Shipping.exe"+5CF49CA: 8B 41 10                 -  mov eax,[rcx+10]
"SAOFB-Win64-Shipping.exe"+5CF49CD: 48 89 CB                 -  mov rbx,rcx
"SAOFB-Win64-Shipping.exe"+5CF49D0: 85 D2                    -  test edx,edx
"SAOFB-Win64-Shipping.exe"+5CF49D2: 78 7D                    -  js SAOFB-Win64-Shipping.exe+5CF4A51
"SAOFB-Win64-Shipping.exe"+5CF49D4: 39 C2                    -  cmp edx,eax
"SAOFB-Win64-Shipping.exe"+5CF49D6: 89 C7                    -  mov edi,eax
"SAOFB-Win64-Shipping.exe"+5CF49D8: 0F 4C FA                 -  cmovl edi,edx
"SAOFB-Win64-Shipping.exe"+5CF49DB: 85 FF                    -  test edi,edi
"SAOFB-Win64-Shipping.exe"+5CF49DD: 74 72                    -  je SAOFB-Win64-Shipping.exe+5CF4A51
"SAOFB-Win64-Shipping.exe"+5CF49DF: 29 F8                    -  sub eax,edi
// ---------- INJECTING HERE ----------
"SAOFB-Win64-Shipping.exe"+5CF49E1: 89 41 10                 -  mov [rcx+10],eax
"SAOFB-Win64-Shipping.exe"+5CF49E4: 48 83 B9 A0 00 00 00 00  -  cmp qword ptr [rcx+000000A0],00
// ---------- DONE INJECTING  ----------
"SAOFB-Win64-Shipping.exe"+5CF49EC: 74 2F                    -  je SAOFB-Win64-Shipping.exe+5CF4A1D
"SAOFB-Win64-Shipping.exe"+5CF49EE: 48 8B 89 A0 00 00 00     -  mov rcx,[rcx+000000A0]
"SAOFB-Win64-Shipping.exe"+5CF49F5: 89 7C 24 30              -  mov [rsp+30],edi
"SAOFB-Win64-Shipping.exe"+5CF49F9: C6 44 24 38 01           -  mov byte ptr [rsp+38],01
"SAOFB-Win64-Shipping.exe"+5CF49FE: 48 85 C9                 -  test rcx,rcx
"SAOFB-Win64-Shipping.exe"+5CF4A01: 75 07                    -  jne SAOFB-Win64-Shipping.exe+5CF4A0A
"SAOFB-Win64-Shipping.exe"+5CF4A03: FF 15 BF BE BE 09        -  call qword ptr [SAOFB-Win64-Shipping.exe+F8E08C8]
"SAOFB-Win64-Shipping.exe"+5CF4A09: CC                       -  int 3 
"SAOFB-Win64-Shipping.exe"+5CF4A0A: 48 8B 01                 -  mov rax,[rcx]
"SAOFB-Win64-Shipping.exe"+5CF4A0D: 4C 8D 4C 24 30           -  lea r9,[rsp+30]
}
No items usage for enhancing and transforming.
May affect more than as stated, use with caution and let me know about any side-effects.

EDIT: Whoops, Register symbol on wrong line.
this also effect when you sell and move items to item box so when you have it active, you will be overweight very quickly since you can only carry a limited amount of items with you 170 to be exact.

User avatar
cdtrico
Expert Cheater
Expert Cheater
Posts: 139
Joined: Mon Apr 03, 2017 6:13 pm
Reputation: 8

Re: Sword Art Online: Fatal Bullet(Steam)DIY

Post by cdtrico »

qweasdzxc17 wrote:
Sun Feb 25, 2018 9:39 am
Spoiler
cdtrico wrote:
Sun Feb 25, 2018 9:16 am
qweasdzxc17 wrote:
Sun Feb 25, 2018 8:45 am
Spoiler

Code: Select all

{ Game   : SAOFB-Win64-Shipping.exe
  Version: 
  Date   : 2018-02-25
  Author : qweasdzxc17

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(SAOFBSkillProf,SAOFB-Win64-Shipping.exe,44 89 14 B8 48 8D 8B ?? ?? ?? ?? 48 8B 43 38) // should be unique
alloc(QuickSkillProf,$1000,"SAOFB-Win64-Shipping.exe"+5B4527E)

label(QuickSkillProfOri)
label(QuickSkillProfRet)
label(addinto)

QuickSkillProf:
  pushf
  cmp r10d,#999
  jge QuickSkillProfOri
  jmp addinto

addinto:
  mov r10d,#999

QuickSkillProfOri:
  popf
  mov [rax+rdi*4],r10d
  lea rcx,[rbx+000000C0]
  jmp QuickSkillProfRet

SAOFBSkillProf:
  jmp QuickSkillProf
  nop
  nop
  nop
  nop
  nop
  nop
QuickSkillProfRet:
registersymbol(SAOFBSkillProf)

[DISABLE]

SAOFBSkillProf:
  db 44 89 14 B8 48 8D 8B C0 00 00 00

unregistersymbol(SAOFBSkillProf)
dealloc(QuickSkillProf)

{
// ORIGINAL CODE - INJECTION POINT: "SAOFB-Win64-Shipping.exe"+5B4527E

"SAOFB-Win64-Shipping.exe"+5B4525B: 3B 53 40              -  cmp edx,[rbx+40]
"SAOFB-Win64-Shipping.exe"+5B4525E: 7D 48                 -  jnl SAOFB-Win64-Shipping.exe+5B452A8
"SAOFB-Win64-Shipping.exe"+5B45260: 48 8B 43 38           -  mov rax,[rbx+38]
"SAOFB-Win64-Shipping.exe"+5B45264: 48 89 7C 24 30        -  mov [rsp+30],rdi
"SAOFB-Win64-Shipping.exe"+5B45269: 48 63 FA              -  movsxd  rdi,edx
"SAOFB-Win64-Shipping.exe"+5B4526C: 45 85 C0              -  test r8d,r8d
"SAOFB-Win64-Shipping.exe"+5B4526F: 78 0D                 -  js SAOFB-Win64-Shipping.exe+5B4527E
"SAOFB-Win64-Shipping.exe"+5B45271: 41 BA E8 03 00 00     -  mov r10d,000003E8
"SAOFB-Win64-Shipping.exe"+5B45277: 45 39 D0              -  cmp r8d,r10d
"SAOFB-Win64-Shipping.exe"+5B4527A: 45 0F 4C D0           -  cmovl r10d,r8d
// ---------- INJECTING HERE ----------
"SAOFB-Win64-Shipping.exe"+5B4527E: 44 89 14 B8           -  mov [rax+rdi*4],r10d
"SAOFB-Win64-Shipping.exe"+5B45282: 48 8D 8B C0 00 00 00  -  lea rcx,[rbx+000000C0]
// ---------- DONE INJECTING  ----------
"SAOFB-Win64-Shipping.exe"+5B45289: 48 8B 43 38           -  mov rax,[rbx+38]
"SAOFB-Win64-Shipping.exe"+5B4528D: 44 8B 04 B8           -  mov r8d,[rax+rdi*4]
"SAOFB-Win64-Shipping.exe"+5B45291: E8 4A 0B 83 FA        -  call SAOFB-Win64-Shipping.exe+375DE0
"SAOFB-Win64-Shipping.exe"+5B45296: 48 8B 43 38           -  mov rax,[rbx+38]
"SAOFB-Win64-Shipping.exe"+5B4529A: 8B 04 B8              -  mov eax,[rax+rdi*4]
"SAOFB-Win64-Shipping.exe"+5B4529D: 48 8B 7C 24 30        -  mov rdi,[rsp+30]
"SAOFB-Win64-Shipping.exe"+5B452A2: 48 83 C4 20           -  add rsp,20
"SAOFB-Win64-Shipping.exe"+5B452A6: 5B                    -  pop rbx
"SAOFB-Win64-Shipping.exe"+5B452A7: C3                    -  ret 
"SAOFB-Win64-Shipping.exe"+5B452A8: 44 89 D0              -  mov eax,r10d
}
Use any skill twice to obtain 100% proficiency, let me know if there are any bugs.

EDIT: je to jge.


The other code assigns now, thanks!
This one is great too, except now I get an error at line 12 'Failure to determine what "SAOFB-win64-shipping.exe"+5B4527E means'.
Sorry for the trouble.
If i'm not wrong that error just means CE hasnt hooked onto the game process yet.
Ah, correct, sorry, first time I actually had to hook CE to save a script to a table.

User avatar
NumberXer0
Expert Cheater
Expert Cheater
Posts: 1028
Joined: Sun Mar 12, 2017 2:17 pm
Reputation: 92

Re: Sword Art Online: Fatal Bullet(Steam)DIY

Post by NumberXer0 »

qweasdzxc17 wrote:
Sun Feb 25, 2018 8:45 am

Code: Select all

{ Game   : SAOFB-Win64-Shipping.exe
  Version: 
  Date   : 2018-02-25
  Author : qweasdzxc17

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(SAOFBSkillProf,SAOFB-Win64-Shipping.exe,44 89 14 B8 48 8D 8B ?? ?? ?? ?? 48 8B 43 38) // should be unique
alloc(QuickSkillProf,$1000,"SAOFB-Win64-Shipping.exe"+5B4527E)

label(QuickSkillProfOri)
label(QuickSkillProfRet)
label(addinto)

QuickSkillProf:
  pushf
  cmp r10d,#999
  jge QuickSkillProfOri
  jmp addinto

addinto:
  mov r10d,#999

QuickSkillProfOri:
  popf
  mov [rax+rdi*4],r10d
  lea rcx,[rbx+000000C0]
  jmp QuickSkillProfRet

SAOFBSkillProf:
  jmp QuickSkillProf
  nop
  nop
  nop
  nop
  nop
  nop
QuickSkillProfRet:
registersymbol(SAOFBSkillProf)

[DISABLE]

SAOFBSkillProf:
  db 44 89 14 B8 48 8D 8B C0 00 00 00

unregistersymbol(SAOFBSkillProf)
dealloc(QuickSkillProf)

{
// ORIGINAL CODE - INJECTION POINT: "SAOFB-Win64-Shipping.exe"+5B4527E

"SAOFB-Win64-Shipping.exe"+5B4525B: 3B 53 40              -  cmp edx,[rbx+40]
"SAOFB-Win64-Shipping.exe"+5B4525E: 7D 48                 -  jnl SAOFB-Win64-Shipping.exe+5B452A8
"SAOFB-Win64-Shipping.exe"+5B45260: 48 8B 43 38           -  mov rax,[rbx+38]
"SAOFB-Win64-Shipping.exe"+5B45264: 48 89 7C 24 30        -  mov [rsp+30],rdi
"SAOFB-Win64-Shipping.exe"+5B45269: 48 63 FA              -  movsxd  rdi,edx
"SAOFB-Win64-Shipping.exe"+5B4526C: 45 85 C0              -  test r8d,r8d
"SAOFB-Win64-Shipping.exe"+5B4526F: 78 0D                 -  js SAOFB-Win64-Shipping.exe+5B4527E
"SAOFB-Win64-Shipping.exe"+5B45271: 41 BA E8 03 00 00     -  mov r10d,000003E8
"SAOFB-Win64-Shipping.exe"+5B45277: 45 39 D0              -  cmp r8d,r10d
"SAOFB-Win64-Shipping.exe"+5B4527A: 45 0F 4C D0           -  cmovl r10d,r8d
// ---------- INJECTING HERE ----------
"SAOFB-Win64-Shipping.exe"+5B4527E: 44 89 14 B8           -  mov [rax+rdi*4],r10d
"SAOFB-Win64-Shipping.exe"+5B45282: 48 8D 8B C0 00 00 00  -  lea rcx,[rbx+000000C0]
// ---------- DONE INJECTING  ----------
"SAOFB-Win64-Shipping.exe"+5B45289: 48 8B 43 38           -  mov rax,[rbx+38]
"SAOFB-Win64-Shipping.exe"+5B4528D: 44 8B 04 B8           -  mov r8d,[rax+rdi*4]
"SAOFB-Win64-Shipping.exe"+5B45291: E8 4A 0B 83 FA        -  call SAOFB-Win64-Shipping.exe+375DE0
"SAOFB-Win64-Shipping.exe"+5B45296: 48 8B 43 38           -  mov rax,[rbx+38]
"SAOFB-Win64-Shipping.exe"+5B4529A: 8B 04 B8              -  mov eax,[rax+rdi*4]
"SAOFB-Win64-Shipping.exe"+5B4529D: 48 8B 7C 24 30        -  mov rdi,[rsp+30]
"SAOFB-Win64-Shipping.exe"+5B452A2: 48 83 C4 20           -  add rsp,20
"SAOFB-Win64-Shipping.exe"+5B452A6: 5B                    -  pop rbx
"SAOFB-Win64-Shipping.exe"+5B452A7: C3                    -  ret 
"SAOFB-Win64-Shipping.exe"+5B452A8: 44 89 D0              -  mov eax,r10d
}
Use any skill twice to obtain 100% proficiency, let me know if there are any bugs.

EDIT: je to jge.
Absolutely fantastic. Works great for Skills and Gadgets. Any chance you could look into the Weapon Proficiency next?

DrummerIX
ViP
ViP
Posts: 3228
Joined: Wed Mar 22, 2017 6:15 pm
Reputation: 3740

Re: Sword Art Online: Fatal Bullet(Steam)DIY

Post by DrummerIX »

KS212 wrote:
Sun Feb 25, 2018 4:31 am
DrummerIX wrote:
Sun Feb 25, 2018 2:47 am
Is this good JRPG? I guess it has many games in the series, but I've never played them. I don't particular enjoy 3rd person shooters, which this game seemed to introduce. Anyway, do you all recommend it?
This is not really a JRPG, its a full blown shooter with proper shooter mechanics. The rest of the game is tied together with visual novel like story sequences. Its more Tokyo Xanadu than ToCS.
Thanks for the response. I think I'll pass on this game then.

hbq0449
What is cheating?
What is cheating?
Posts: 2
Joined: Sun Nov 12, 2017 12:02 pm
Reputation: 1

Re: Sword Art Online: Fatal Bullet(Steam)DIY

Post by hbq0449 »

Medals be 9999 on increase. you can change it to some multiplier.

Code: Select all

{ Game   : SAOFB-Win64-Shipping.exe
  Version: 
  Date   : 2018-02-25
  Author : hanbq

  This script does blah blah blah
}

[ENABLE]


aobscanmodule(metal_increase,SAOFB-Win64-Shipping.exe,43 89 04 1A 49 8B 40 38) // should be unique
alloc(newmem,$1000,"SAOFB-Win64-Shipping.exe"+5B437BE)

label(code)
label(return)

newmem:
  mov eax, 0000270f
  //inc eax
  //inc eax
  //inc eax
code:
  mov [r10+r11],eax
  mov rax,[r8+38]
  jmp return

metal_increase:
  jmp newmem
  nop
  nop
  nop
return:
registersymbol(metal_increase)

[DISABLE]

metal_increase:
  db 43 89 04 1A 49 8B 40 38

unregistersymbol(metal_increase)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "SAOFB-Win64-Shipping.exe"+5B437BE

"SAOFB-Win64-Shipping.exe"+5B4379A: 4C 8D 1C 8D 00 00 00 00  -  lea r11,[rcx*4+00000000]
"SAOFB-Win64-Shipping.exe"+5B437A2: 41 8B 0C 8A              -  mov ecx,[r10+rcx*4]
"SAOFB-Win64-Shipping.exe"+5B437A6: 41 89 C9                 -  mov r9d,ecx
"SAOFB-Win64-Shipping.exe"+5B437A9: 41 01 F9                 -  add r9d,edi
"SAOFB-Win64-Shipping.exe"+5B437AC: 79 04                    -  jns SAOFB-Win64-Shipping.exe+5B437B2
"SAOFB-Win64-Shipping.exe"+5B437AE: 31 C0                    -  xor eax,eax
"SAOFB-Win64-Shipping.exe"+5B437B0: EB 0C                    -  jmp SAOFB-Win64-Shipping.exe+5B437BE
"SAOFB-Win64-Shipping.exe"+5B437B2: B8 0F 27 00 00           -  mov eax,0000270F
"SAOFB-Win64-Shipping.exe"+5B437B7: 41 39 C1                 -  cmp r9d,eax
"SAOFB-Win64-Shipping.exe"+5B437BA: 41 0F 4C C1              -  cmovl eax,r9d
// ---------- INJECTING HERE ----------
"SAOFB-Win64-Shipping.exe"+5B437BE: 43 89 04 1A              -  mov [r10+r11],eax
"SAOFB-Win64-Shipping.exe"+5B437C2: 49 8B 40 38              -  mov rax,[r8+38]
// ---------- DONE INJECTING  ----------
"SAOFB-Win64-Shipping.exe"+5B437C6: 41 8B 14 03              -  mov edx,[r11+rax]
"SAOFB-Win64-Shipping.exe"+5B437CA: 39 D1                    -  cmp ecx,edx
"SAOFB-Win64-Shipping.exe"+5B437CC: 74 10                    -  je SAOFB-Win64-Shipping.exe+5B437DE
"SAOFB-Win64-Shipping.exe"+5B437CE: 49 8D 88 B0 02 00 00     -  lea rcx,[r8+000002B0]
"SAOFB-Win64-Shipping.exe"+5B437D5: 44 0F B6 C3              -  movzx r8d,bl
"SAOFB-Win64-Shipping.exe"+5B437D9: E8 22 25 83 FA           -  call SAOFB-Win64-Shipping.exe+375D00
"SAOFB-Win64-Shipping.exe"+5B437DE: 48 8B 5C 24 30           -  mov rbx,[rsp+30]
"SAOFB-Win64-Shipping.exe"+5B437E3: 48 83 C4 20              -  add rsp,20
"SAOFB-Win64-Shipping.exe"+5B437E7: 5F                       -  pop rdi
"SAOFB-Win64-Shipping.exe"+5B437E8: C3                       -  ret 
}
Medals will not decrease when buy things:

Code: Select all

{ Game   : SAOFB-Win64-Shipping.exe
  Version: 
  Date   : 2018-02-25
  Author : hanbq

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(metal_dec,SAOFB-Win64-Shipping.exe,41 89 14 1B 49 8B 4A 38) // should be unique
alloc(newmem,$1000,"SAOFB-Win64-Shipping.exe"+5B4328C)

label(code)
label(return)

newmem:

code:
  // mov [r11+rbx],edx
  mov rcx,[r10+38]
  jmp return

metal_dec:
  jmp newmem
  nop
  nop
  nop
return:
registersymbol(metal_dec)

[DISABLE]

metal_dec:
  db 41 89 14 1B 49 8B 4A 38

unregistersymbol(metal_dec)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "SAOFB-Win64-Shipping.exe"+5B4328C

"SAOFB-Win64-Shipping.exe"+5B4326C: 48 8D 1C 85 00 00 00 00                 -  lea rbx,[rax*4+00000000]
"SAOFB-Win64-Shipping.exe"+5B43274: 41 8B 04 83                             -  mov eax,[r11+rax*4]
"SAOFB-Win64-Shipping.exe"+5B43278: 89 C1                                   -  mov ecx,eax
"SAOFB-Win64-Shipping.exe"+5B4327A: 01 D1                                   -  add ecx,edx
"SAOFB-Win64-Shipping.exe"+5B4327C: 79 04                                   -  jns SAOFB-Win64-Shipping.exe+5B43282
"SAOFB-Win64-Shipping.exe"+5B4327E: 31 D2                                   -  xor edx,edx
"SAOFB-Win64-Shipping.exe"+5B43280: EB 0A                                   -  jmp SAOFB-Win64-Shipping.exe+5B4328C
"SAOFB-Win64-Shipping.exe"+5B43282: BA 0F 27 00 00                          -  mov edx,0000270F
"SAOFB-Win64-Shipping.exe"+5B43287: 39 D1                                   -  cmp ecx,edx
"SAOFB-Win64-Shipping.exe"+5B43289: 0F 4C D1                                -  cmovl edx,ecx
// ---------- INJECTING HERE ----------
"SAOFB-Win64-Shipping.exe"+5B4328C: 41 89 14 1B                             -  mov [r11+rbx],edx
"SAOFB-Win64-Shipping.exe"+5B43290: 49 8B 4A 38                             -  mov rcx,[r10+38]
// ---------- DONE INJECTING  ----------
"SAOFB-Win64-Shipping.exe"+5B43294: 8B 14 0B                                -  mov edx,[rbx+rcx]
"SAOFB-Win64-Shipping.exe"+5B43297: 39 D0                                   -  cmp eax,edx
"SAOFB-Win64-Shipping.exe"+5B43299: 74 0D                                   -  je SAOFB-Win64-Shipping.exe+5B432A8
"SAOFB-Win64-Shipping.exe"+5B4329B: 49 8D 8A B0 02 00 00                    -  lea rcx,[r10+000002B0]
"SAOFB-Win64-Shipping.exe"+5B432A2: 5B                                      -  pop rbx
"SAOFB-Win64-Shipping.exe"+5B432A3: E9 58 2A 83 FA                          -  jmp SAOFB-Win64-Shipping.exe+375D00
"SAOFB-Win64-Shipping.exe"+5B432A8: 5B                                      -  pop rbx
"SAOFB-Win64-Shipping.exe"+5B432A9: C3                                      -  ret 
"SAOFB-Win64-Shipping.exe"+5B432AA: CC                                      -  int 3 
"SAOFB-Win64-Shipping.exe"+5B432AB: F9                                      -  stc 
}
Medals item stock will not decrease.

Code: Select all

{ Game   : SAOFB-Win64-Shipping.exe
  Version: 
  Date   : 2018-02-25
  Author : hanbq

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(metal_stock_desc,SAOFB-Win64-Shipping.exe,41 2B C6 44 0F 49 E0) // should be unique
alloc(newmem,$1000,"SAOFB-Win64-Shipping.exe"+5D32E0)

label(code)
label(return)

newmem:
  xor r14d, r14d
code:
  sub eax,r14d
  cmovns r12d,eax
  jmp return

metal_stock_desc:
  jmp newmem
  nop
  nop
return:
registersymbol(metal_stock_desc)

[DISABLE]

metal_stock_desc:
  db 41 2B C6 44 0F 49 E0

unregistersymbol(metal_stock_desc)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "SAOFB-Win64-Shipping.exe"+5D32E0

"SAOFB-Win64-Shipping.exe"+5D32C3: E8 E8 15 76 00        -  call SAOFB-Win64-Shipping.exe+D348B0
"SAOFB-Win64-Shipping.exe"+5D32C8: FF C7                 -  inc edi
"SAOFB-Win64-Shipping.exe"+5D32CA: 49 FF C6              -  inc r14
"SAOFB-Win64-Shipping.exe"+5D32CD: 83 FF 02              -  cmp edi,02
"SAOFB-Win64-Shipping.exe"+5D32D0: 72 AE                 -  jb SAOFB-Win64-Shipping.exe+5D3280
"SAOFB-Win64-Shipping.exe"+5D32D2: 45 33 E4              -  xor r12d,r12d
"SAOFB-Win64-Shipping.exe"+5D32D5: 44 8B 75 77           -  mov r14d,[rbp+77]
"SAOFB-Win64-Shipping.exe"+5D32D9: 8B 46 34              -  mov eax,[rsi+34]
"SAOFB-Win64-Shipping.exe"+5D32DC: 85 C0                 -  test eax,eax
"SAOFB-Win64-Shipping.exe"+5D32DE: 78 0B                 -  js SAOFB-Win64-Shipping.exe+5D32EB
// ---------- INJECTING HERE ----------
"SAOFB-Win64-Shipping.exe"+5D32E0: 41 2B C6              -  sub eax,r14d
"SAOFB-Win64-Shipping.exe"+5D32E3: 44 0F 49 E0           -  cmovns r12d,eax
// ---------- DONE INJECTING  ----------
"SAOFB-Win64-Shipping.exe"+5D32E7: 44 89 66 34           -  mov [rsi+34],r12d
"SAOFB-Win64-Shipping.exe"+5D32EB: 45 8B C6              -  mov r8d,r14d
"SAOFB-Win64-Shipping.exe"+5D32EE: 48 8B D6              -  mov rdx,rsi
"SAOFB-Win64-Shipping.exe"+5D32F1: 49 8B CD              -  mov rcx,r13
"SAOFB-Win64-Shipping.exe"+5D32F4: E8 07 5D FF FF        -  call SAOFB-Win64-Shipping.exe+5C9000
"SAOFB-Win64-Shipping.exe"+5D32F9: 41 8B C7              -  mov eax,r15d
"SAOFB-Win64-Shipping.exe"+5D32FC: 48 81 C4 B8 00 00 00  -  add rsp,000000B8
"SAOFB-Win64-Shipping.exe"+5D3303: 41 5F                 -  pop r15
"SAOFB-Win64-Shipping.exe"+5D3305: 41 5E                 -  pop r14
"SAOFB-Win64-Shipping.exe"+5D3307: 41 5D                 -  pop r13
}

who can figure out the hp, or cp. or exp multiplier... quite weird....and weapon proficiency is a weird things. float and double find nothing..

furthestben
Novice Cheater
Novice Cheater
Posts: 20
Joined: Sun Feb 25, 2018 3:20 pm
Reputation: 6

Re: Sword Art Online: Fatal Bullet(Steam)DIY

Post by furthestben »

Even though it says "account created today" I've actually been on here for years, however I can clearly say this game has been a pain in my backside.

Keeps saying "scan:controller:No readable memory" even though I am attached to the process or "access violation" when I try to attach to the process and not the application.

So it simply does not allow me to search for a memory. I've installed the new launcher and disabled EAC, so I am generally confused on what to do here.

CyberHawkX1
What is cheating?
What is cheating?
Posts: 3
Joined: Sun Feb 25, 2018 3:40 pm
Reputation: 0

Re: Sword Art Online: Fatal Bullet(Steam)DIY

Post by CyberHawkX1 »

@hbq0449 Tried the medals 9999 and didn't work still have the same medals amount as before and tried buying something and still the same amount though when I tried the no medal decrease that one worked.

jombokits
Cheater
Cheater
Posts: 39
Joined: Mon Mar 20, 2017 10:40 am
Reputation: 4

Re: Sword Art Online: Fatal Bullet(Steam)DIY

Post by jombokits »

does anyone know if the medal trader restocks?

User avatar
cdtrico
Expert Cheater
Expert Cheater
Posts: 139
Joined: Mon Apr 03, 2017 6:13 pm
Reputation: 8

Re: Sword Art Online: Fatal Bullet(Steam)DIY

Post by cdtrico »

jombokits wrote:
Sun Feb 25, 2018 4:17 pm
does anyone know if the medal trader restocks?
afaik it doesn't

Also thanks for the new great cheats :D

LiSiCin
What is cheating?
What is cheating?
Posts: 2
Joined: Sun Feb 25, 2018 4:17 pm
Reputation: 0

Re: Sword Art Online: Fatal Bullet(Steam)DIY

Post by LiSiCin »

Image


:D

Roxas027
What is cheating?
What is cheating?
Posts: 3
Joined: Fri Feb 16, 2018 7:21 am
Reputation: 0

Re: Sword Art Online: Fatal Bullet(Steam)DIY

Post by Roxas027 »

How do you find XP? i tried with all type value and can't find it

User avatar
cdtrico
Expert Cheater
Expert Cheater
Posts: 139
Joined: Mon Apr 03, 2017 6:13 pm
Reputation: 8

Re: Sword Art Online: Fatal Bullet(Steam)DIY

Post by cdtrico »

Roxas027 wrote:
Sun Feb 25, 2018 4:46 pm
How do you find XP? i tried with all type value and can't find it
Try all and then unknown value, it took me quite some time to find it, but with increase and decrease (on log out without returning home) I found it.

Post Reply

Who is online

Users browsing this forum: andreninpad, Colinious, Glenn565, Google Adsense [Bot], lmrlmax, SemrushBot