Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Pulling opcodes #3

Open
lunyx opened this issue Mar 1, 2016 · 12 comments
Open

Pulling opcodes #3

lunyx opened this issue Mar 1, 2016 · 12 comments
Labels

Comments

@lunyx
Copy link
Collaborator

lunyx commented Mar 1, 2016

When searching for the I_TELEPORT string to pull opcodes, where do you search from? I found the address for it in the memory viewer, but I can't see it in the assembly viewer. Going to the address in assembly viewer does not show the address, but rather some module + offset.

@lunyx lunyx added the question label Mar 1, 2016
@neowutran
Copy link
Owner

everything is in memory view, search for I_TELEPORT, then search for the beginning of the function (something like 10 line before the I_TELEPORT "Call, Call, Call"), right click, go to address, copy the address

@neowutran
Copy link
Owner

good? or still pb?

@lunyx
Copy link
Collaborator Author

lunyx commented Mar 1, 2016

Still can't find it.

@neowutran
Copy link
Owner

Cheat engine -> memory view -> view -> referenced string
Will take some time
Search for I_TELEPORT in the popup, you will find an address "0x019D06E9"
go to that address. Scroll up until you find "Call, Call, Call" (should be ~10 line above the I_TELEPORT address). Right click, go to address, copy the address you see.

http://puu.sh/nrfBH/84b0860690.png
http://puu.sh/nrfI4/cb3723eb5a.png

@neowutran
Copy link
Owner

You are stuck somewhere, or you found out how to get the opcode?

(added NA file btw)

@lunyx
Copy link
Collaborator Author

lunyx commented Mar 1, 2016

I was doing dungeons, but it looks like the address might be 019EE38? Is that what you have?

http://i.imgur.com/lNZw41Z.png

@neowutran
Copy link
Owner

the address is 0x019D06C0 (right click on what you found, go to address, and that it, and copy what is in the text input)

@lunyx
Copy link
Collaborator Author

lunyx commented Mar 3, 2016

I'm not seeing that anywhere. http://i.imgur.com/O0NV7UX.png

If I go to the address, I get what was in my previous image.

@Gl0
Copy link
Collaborator

Gl0 commented Mar 3, 2016

Scanning memory for referenced strings take significant time, if you stop before it ends - you will see nothing.

@lunyx
Copy link
Collaborator Author

lunyx commented Mar 4, 2016

It's already done as far as I can tell. I just left it there for a few hours and came back to it.

@Gl0
Copy link
Collaborator

Gl0 commented Mar 4, 2016

if you see http://i.imgur.com/lNZw41Z.png - just right click on copycopycopy and select go to address to see address of this code, thats all you need to compile opcode dll.

@Generhr
Copy link

Generhr commented Dec 12, 2018

I know this is an old topic but how do you pull OP codes? I tried that dll posted on ragezone but it just returned an error.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

4 participants