Last active
January 8, 2020 14:25
-
-
Save ChronoMonochrome/bf698072aa63cbe391622c439a2e4747 to your computer and use it in GitHub Desktop.
"Trails of cold steel" cheat table
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?xml version="1.0" encoding="utf-8"?> | |
<CheatTable CheatEngineTableVersion="26"> | |
<CheatEntries> | |
<CheatEntry> | |
<ID>6</ID> | |
<Description>"Unlock camera Z pos"</Description> | |
<LastState Activated="1"/> | |
<VariableType>Auto Assembler Script</VariableType> | |
<AssemblerScript>{ Game : ed8.exe | |
Version: | |
Date : 2020-01-08 | |
Author : chrono | |
This script unlocks camera height position | |
} | |
define(address1,"ed8.exe"+19843D) | |
define(address2,"ed8.exe"+198461) | |
define(address3,"ed8.exe"+12E8AB) | |
define(address4,"ed8.exe"+12E8C4) | |
define(bytes1,D9 9E 2C 01 00 00) | |
define(bytes2,D9 9E 3C 01 00 00) | |
define(bytes3,D9 96 24 01 00 00) | |
define(bytes4,D9 96 34 01 00 00) | |
[ENABLE] | |
assert(address1,bytes1) | |
assert(address2,bytes2) | |
assert(address3,bytes3) | |
assert(address4,bytes4) | |
address1: | |
db 90 90 90 90 90 90 | |
address2: | |
db 90 90 90 90 90 90 | |
address3: | |
db 90 90 90 90 90 90 | |
address4: | |
db 90 90 90 90 90 90 | |
[DISABLE] | |
address1: | |
db bytes1 | |
address2: | |
db bytes2 | |
address3: | |
db bytes3 | |
address4: | |
db bytes4 | |
</AssemblerScript> | |
</CheatEntry> | |
<CheatEntry> | |
<ID>10</ID> | |
<Description>"CameraPtr"</Description> | |
<LastState Value="126FF0A0" RealAddress="00C69AA4"/> | |
<ShowAsHex>1</ShowAsHex> | |
<VariableType>4 Bytes</VariableType> | |
<Address>ed8.exe+869AA4</Address> | |
</CheatEntry> | |
<CheatEntry> | |
<ID>11</ID> | |
<Description>"Camera Z pos"</Description> | |
<LastState Value="-4" RealAddress="126FF1CC"/> | |
<VariableType>Float</VariableType> | |
<Address>ed8.exe+869AA4</Address> | |
<Offsets> | |
<Offset>12c</Offset> | |
</Offsets> | |
</CheatEntry> | |
</CheatEntries> | |
<CheatCodes> | |
<CodeEntry> | |
<Description>Change of fstp dword ptr [esi+0000012C]</Description> | |
<Address>0059843D</Address> | |
<ModuleName>ed8.exe</ModuleName> | |
<ModuleNameOffset>19843D</ModuleNameOffset> | |
<Before> | |
<Byte>86</Byte> | |
<Byte>BC</Byte> | |
<Byte>05</Byte> | |
<Byte>00</Byte> | |
<Byte>00</Byte> | |
</Before> | |
<Actual> | |
<Byte>D9</Byte> | |
<Byte>9E</Byte> | |
<Byte>2C</Byte> | |
<Byte>01</Byte> | |
<Byte>00</Byte> | |
<Byte>00</Byte> | |
</Actual> | |
<After> | |
<Byte>D9</Byte> | |
<Byte>86</Byte> | |
<Byte>C0</Byte> | |
<Byte>05</Byte> | |
<Byte>00</Byte> | |
</After> | |
</CodeEntry> | |
<CodeEntry> | |
<Description>Change of fstp dword ptr [esi+0000013C]</Description> | |
<Address>00598461</Address> | |
<ModuleName>ed8.exe</ModuleName> | |
<ModuleNameOffset>198461</ModuleNameOffset> | |
<Before> | |
<Byte>86</Byte> | |
<Byte>AC</Byte> | |
<Byte>05</Byte> | |
<Byte>00</Byte> | |
<Byte>00</Byte> | |
</Before> | |
<Actual> | |
<Byte>D9</Byte> | |
<Byte>9E</Byte> | |
<Byte>3C</Byte> | |
<Byte>01</Byte> | |
<Byte>00</Byte> | |
<Byte>00</Byte> | |
</Actual> | |
<After> | |
<Byte>D9</Byte> | |
<Byte>86</Byte> | |
<Byte>B0</Byte> | |
<Byte>05</Byte> | |
<Byte>00</Byte> | |
</After> | |
</CodeEntry> | |
<CodeEntry> | |
<Description>Change of fst dword ptr [esi+00000124]</Description> | |
<Address>0052E8AB</Address> | |
<ModuleName>ed8.exe</ModuleName> | |
<ModuleNameOffset>12E8AB</ModuleNameOffset> | |
<Before> | |
<Byte>00</Byte> | |
<Byte>00</Byte> | |
<Byte>D9</Byte> | |
<Byte>45</Byte> | |
<Byte>9C</Byte> | |
</Before> | |
<Actual> | |
<Byte>D9</Byte> | |
<Byte>96</Byte> | |
<Byte>24</Byte> | |
<Byte>01</Byte> | |
<Byte>00</Byte> | |
<Byte>00</Byte> | |
</Actual> | |
<After> | |
<Byte>D9</Byte> | |
<Byte>45</Byte> | |
<Byte>A0</Byte> | |
<Byte>D9</Byte> | |
<Byte>96</Byte> | |
</After> | |
</CodeEntry> | |
<CodeEntry> | |
<Description>Change of fst dword ptr [esi+00000134]</Description> | |
<Address>0052E8C4</Address> | |
<ModuleName>ed8.exe</ModuleName> | |
<ModuleNameOffset>12E8C4</ModuleNameOffset> | |
<Before> | |
<Byte>01</Byte> | |
<Byte>00</Byte> | |
<Byte>00</Byte> | |
<Byte>D9</Byte> | |
<Byte>CC</Byte> | |
</Before> | |
<Actual> | |
<Byte>D9</Byte> | |
<Byte>96</Byte> | |
<Byte>34</Byte> | |
<Byte>01</Byte> | |
<Byte>00</Byte> | |
<Byte>00</Byte> | |
</Actual> | |
<After> | |
<Byte>D9</Byte> | |
<Byte>CD</Byte> | |
<Byte>D9</Byte> | |
<Byte>96</Byte> | |
<Byte>38</Byte> | |
</After> | |
</CodeEntry> | |
<CodeEntry> | |
<Description>Change of fstp dword ptr [esi+00000124]</Description> | |
<Address>0052E637</Address> | |
<ModuleName>ed8.exe</ModuleName> | |
<ModuleNameOffset>12E637</ModuleNameOffset> | |
<Before> | |
<Byte>00</Byte> | |
<Byte>00</Byte> | |
<Byte>D9</Byte> | |
<Byte>45</Byte> | |
<Byte>9C</Byte> | |
</Before> | |
<Actual> | |
<Byte>D9</Byte> | |
<Byte>9E</Byte> | |
<Byte>24</Byte> | |
<Byte>01</Byte> | |
<Byte>00</Byte> | |
<Byte>00</Byte> | |
</Actual> | |
<After> | |
<Byte>D9</Byte> | |
<Byte>45</Byte> | |
<Byte>A0</Byte> | |
<Byte>D9</Byte> | |
<Byte>9E</Byte> | |
</After> | |
</CodeEntry> | |
<CodeEntry> | |
<Description>Change of fstp dword ptr [esi+00000134]</Description> | |
<Address>0052E652</Address> | |
<ModuleName>ed8.exe</ModuleName> | |
<ModuleNameOffset>12E652</ModuleNameOffset> | |
<Before> | |
<Byte>00</Byte> | |
<Byte>00</Byte> | |
<Byte>D9</Byte> | |
<Byte>45</Byte> | |
<Byte>B0</Byte> | |
</Before> | |
<Actual> | |
<Byte>D9</Byte> | |
<Byte>9E</Byte> | |
<Byte>34</Byte> | |
<Byte>01</Byte> | |
<Byte>00</Byte> | |
<Byte>00</Byte> | |
</Actual> | |
<After> | |
<Byte>D9</Byte> | |
<Byte>45</Byte> | |
<Byte>B4</Byte> | |
<Byte>D9</Byte> | |
<Byte>9E</Byte> | |
</After> | |
</CodeEntry> | |
</CheatCodes> | |
<UserdefinedSymbols/> | |
</CheatTable> |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment