Skip to content

Instantly share code, notes, and snippets.

@ChronoMonochrome
Last active January 8, 2020 14:25
Show Gist options
  • Save ChronoMonochrome/bf698072aa63cbe391622c439a2e4747 to your computer and use it in GitHub Desktop.
Save ChronoMonochrome/bf698072aa63cbe391622c439a2e4747 to your computer and use it in GitHub Desktop.
"Trails of cold steel" cheat table
<?xml version="1.0" encoding="utf-8"?>
<CheatTable CheatEngineTableVersion="26">
<CheatEntries>
<CheatEntry>
<ID>6</ID>
<Description>"Unlock camera Z pos"</Description>
<LastState Activated="1"/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>{ Game : ed8.exe
Version:
Date : 2020-01-08
Author : chrono
This script unlocks camera height position
}
define(address1,"ed8.exe"+19843D)
define(address2,"ed8.exe"+198461)
define(address3,"ed8.exe"+12E8AB)
define(address4,"ed8.exe"+12E8C4)
define(bytes1,D9 9E 2C 01 00 00)
define(bytes2,D9 9E 3C 01 00 00)
define(bytes3,D9 96 24 01 00 00)
define(bytes4,D9 96 34 01 00 00)
[ENABLE]
assert(address1,bytes1)
assert(address2,bytes2)
assert(address3,bytes3)
assert(address4,bytes4)
address1:
db 90 90 90 90 90 90
address2:
db 90 90 90 90 90 90
address3:
db 90 90 90 90 90 90
address4:
db 90 90 90 90 90 90
[DISABLE]
address1:
db bytes1
address2:
db bytes2
address3:
db bytes3
address4:
db bytes4
</AssemblerScript>
</CheatEntry>
<CheatEntry>
<ID>10</ID>
<Description>"CameraPtr"</Description>
<LastState Value="126FF0A0" RealAddress="00C69AA4"/>
<ShowAsHex>1</ShowAsHex>
<VariableType>4 Bytes</VariableType>
<Address>ed8.exe+869AA4</Address>
</CheatEntry>
<CheatEntry>
<ID>11</ID>
<Description>"Camera Z pos"</Description>
<LastState Value="-4" RealAddress="126FF1CC"/>
<VariableType>Float</VariableType>
<Address>ed8.exe+869AA4</Address>
<Offsets>
<Offset>12c</Offset>
</Offsets>
</CheatEntry>
</CheatEntries>
<CheatCodes>
<CodeEntry>
<Description>Change of fstp dword ptr [esi+0000012C]</Description>
<Address>0059843D</Address>
<ModuleName>ed8.exe</ModuleName>
<ModuleNameOffset>19843D</ModuleNameOffset>
<Before>
<Byte>86</Byte>
<Byte>BC</Byte>
<Byte>05</Byte>
<Byte>00</Byte>
<Byte>00</Byte>
</Before>
<Actual>
<Byte>D9</Byte>
<Byte>9E</Byte>
<Byte>2C</Byte>
<Byte>01</Byte>
<Byte>00</Byte>
<Byte>00</Byte>
</Actual>
<After>
<Byte>D9</Byte>
<Byte>86</Byte>
<Byte>C0</Byte>
<Byte>05</Byte>
<Byte>00</Byte>
</After>
</CodeEntry>
<CodeEntry>
<Description>Change of fstp dword ptr [esi+0000013C]</Description>
<Address>00598461</Address>
<ModuleName>ed8.exe</ModuleName>
<ModuleNameOffset>198461</ModuleNameOffset>
<Before>
<Byte>86</Byte>
<Byte>AC</Byte>
<Byte>05</Byte>
<Byte>00</Byte>
<Byte>00</Byte>
</Before>
<Actual>
<Byte>D9</Byte>
<Byte>9E</Byte>
<Byte>3C</Byte>
<Byte>01</Byte>
<Byte>00</Byte>
<Byte>00</Byte>
</Actual>
<After>
<Byte>D9</Byte>
<Byte>86</Byte>
<Byte>B0</Byte>
<Byte>05</Byte>
<Byte>00</Byte>
</After>
</CodeEntry>
<CodeEntry>
<Description>Change of fst dword ptr [esi+00000124]</Description>
<Address>0052E8AB</Address>
<ModuleName>ed8.exe</ModuleName>
<ModuleNameOffset>12E8AB</ModuleNameOffset>
<Before>
<Byte>00</Byte>
<Byte>00</Byte>
<Byte>D9</Byte>
<Byte>45</Byte>
<Byte>9C</Byte>
</Before>
<Actual>
<Byte>D9</Byte>
<Byte>96</Byte>
<Byte>24</Byte>
<Byte>01</Byte>
<Byte>00</Byte>
<Byte>00</Byte>
</Actual>
<After>
<Byte>D9</Byte>
<Byte>45</Byte>
<Byte>A0</Byte>
<Byte>D9</Byte>
<Byte>96</Byte>
</After>
</CodeEntry>
<CodeEntry>
<Description>Change of fst dword ptr [esi+00000134]</Description>
<Address>0052E8C4</Address>
<ModuleName>ed8.exe</ModuleName>
<ModuleNameOffset>12E8C4</ModuleNameOffset>
<Before>
<Byte>01</Byte>
<Byte>00</Byte>
<Byte>00</Byte>
<Byte>D9</Byte>
<Byte>CC</Byte>
</Before>
<Actual>
<Byte>D9</Byte>
<Byte>96</Byte>
<Byte>34</Byte>
<Byte>01</Byte>
<Byte>00</Byte>
<Byte>00</Byte>
</Actual>
<After>
<Byte>D9</Byte>
<Byte>CD</Byte>
<Byte>D9</Byte>
<Byte>96</Byte>
<Byte>38</Byte>
</After>
</CodeEntry>
<CodeEntry>
<Description>Change of fstp dword ptr [esi+00000124]</Description>
<Address>0052E637</Address>
<ModuleName>ed8.exe</ModuleName>
<ModuleNameOffset>12E637</ModuleNameOffset>
<Before>
<Byte>00</Byte>
<Byte>00</Byte>
<Byte>D9</Byte>
<Byte>45</Byte>
<Byte>9C</Byte>
</Before>
<Actual>
<Byte>D9</Byte>
<Byte>9E</Byte>
<Byte>24</Byte>
<Byte>01</Byte>
<Byte>00</Byte>
<Byte>00</Byte>
</Actual>
<After>
<Byte>D9</Byte>
<Byte>45</Byte>
<Byte>A0</Byte>
<Byte>D9</Byte>
<Byte>9E</Byte>
</After>
</CodeEntry>
<CodeEntry>
<Description>Change of fstp dword ptr [esi+00000134]</Description>
<Address>0052E652</Address>
<ModuleName>ed8.exe</ModuleName>
<ModuleNameOffset>12E652</ModuleNameOffset>
<Before>
<Byte>00</Byte>
<Byte>00</Byte>
<Byte>D9</Byte>
<Byte>45</Byte>
<Byte>B0</Byte>
</Before>
<Actual>
<Byte>D9</Byte>
<Byte>9E</Byte>
<Byte>34</Byte>
<Byte>01</Byte>
<Byte>00</Byte>
<Byte>00</Byte>
</Actual>
<After>
<Byte>D9</Byte>
<Byte>45</Byte>
<Byte>B4</Byte>
<Byte>D9</Byte>
<Byte>9E</Byte>
</After>
</CodeEntry>
</CheatCodes>
<UserdefinedSymbols/>
</CheatTable>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment