Skip to content

Z1KOx/MemoryAPI

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

26 Commits
 
 
 
 
 
 
 
 

Repository files navigation

MemoryAPI

How does this work

Memory Access

// Reading memory
Memory localPlayer( LOCAL_PLAYER );
auto currentAmmo = localPlayer.read<DWORD>( 0x140 );

// Writing to memory
localPlayer.write( 0xF8, 500 );

Process and Module Address Retrieval

// Obtaining the process ID
Memory mem;
auto procID = mem.getProcID( "target.exe" );

// Acquiring the module base address
auto modBaseAddr = mem.getModuleBase( "target.exe", procID );

Nop opcode

// This is how you initialize a NOP instruction
NopHook decAmmoShooting( reinterpret_cast<BYTE*>(MODULE_BASE + 0x637E9), 2 );

// To toggle the NOP state
decAmmoShooting.toggleActivation() ? ( decAmmoShooting.nop(), printf("Nop activated\n") )
                                   : ( decAmmoShooting.patchNop(), printf("Nop patched\n") );

// Or simply apply the NOP instruction
decAmmoShooting.nop();

Getting Started

Clone this project using Git

git clone https://github.com/Z1KOx/MemoryAPI.git
  • If Git is not installed on your system, you can download it from the official website.

About

A tool for analyzing memory and processes in game hacking.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages