Difference between revisions of "Auto Assembler:reassemble"
Jump to navigation
Jump to search
(Created page with 'Category:Assembler '''Auto Assembler''' reassemble(''Address'') Reassembles the given address, writing at it's declared location. It acts like a smart [[Auto Assembler:readM…') |
m (Minor corrections) |
||
(5 intermediate revisions by one other user not shown) | |||
Line 3: | Line 3: | ||
Reassembles the given address, writing at it's declared location. It acts like a smart [[Auto Assembler:readMem|readMem]]. | Reassembles the given address, writing at it's declared location. It acts like a smart [[Auto Assembler:readMem|readMem]]. | ||
− | Reads the address's instruction, | + | Reads the address's instruction, re-evaluates any addresses, reassembles the address's instruction at its declared location. |
− | This is great for code changes in game updates, as well as [https://en.wikipedia.org/wiki/Polymorphic_code polymorphic code] or any code that has polymorphic like behavior. | + | This is great for code changes in game updates, as well as [https://en.wikipedia.org/wiki/Polymorphic_code polymorphic code], or any code that has polymorphic like behavior. |
− | |||
+ | Note: It doesn't accept labels, just registered symbols and addresses. | ||
=== Command Parameters === | === Command Parameters === | ||
Line 21: | Line 21: | ||
== Examples == | == Examples == | ||
− | reassemble( | + | reassemble(SomeRegisteredSymbol) |
reassemble(00123ABC) | reassemble(00123ABC) | ||
Line 28: | Line 28: | ||
reassemble(injectionPoint) | reassemble(injectionPoint) | ||
jmp return | jmp return | ||
+ | |||
+ | <pre>alloc(memTestMemory, 0x400) | ||
+ | registerSymbol(memTestMemory) | ||
+ | |||
+ | memTestMemory: | ||
+ | reassemble("Tutorial-i386.exe"+24B25) | ||
+ | reassemble("Tutorial-i386.exe"+24B29) | ||
+ | reassemble("Tutorial-i386.exe"+24B2D) | ||
+ | |||
+ | //// Read Memory | ||
+ | // Tutorial-i386.exe+24B25 - 83 45 EC 01 - add dword ptr [ebp-14],01 | ||
+ | // Tutorial-i386.exe+24B29 - 83 7D EC 64 - cmp dword ptr [ebp-14],64 | ||
+ | // Tutorial-i386.exe+24B2D - 74 02 - je Tutorial-i386.exe+24B31 | ||
+ | |||
+ | //// Assembled Memory | ||
+ | // memTestMemory - 83 45 EC 01 - add dword ptr [ebp-14],01 | ||
+ | // 003F0004 - 83 7D EC 64 - cmp dword ptr [ebp-14],64 | ||
+ | // 003F0008 - 0F84 234B0300 - je Tutorial-i386.exe+24B31</pre> | ||
== See also == | == See also == | ||
* [[Cheat_Engine:Auto Assembler|Auto Assembler]] | * [[Cheat_Engine:Auto Assembler|Auto Assembler]] | ||
+ | * [[Auto_Assembler:Commands|Auto Assembler Commands]] | ||
+ | * [http://forum.cheatengine.org/viewtopic.php?p=5485950#5485950 A Post by Dark Bite] | ||
=== Related Commands === | === Related Commands === | ||
Line 48: | Line 68: | ||
* [[Auto Assembler:unregisterSymbol|unregisterSymbol]] | * [[Auto Assembler:unregisterSymbol|unregisterSymbol]] | ||
* [[Auto Assembler:LUA ASM|LUA ASM]] | * [[Auto Assembler:LUA ASM|LUA ASM]] | ||
− |
Latest revision as of 17:36, 4 February 2022
Auto Assembler reassemble(Address)
Reassembles the given address, writing at it's declared location. It acts like a smart readMem. Reads the address's instruction, re-evaluates any addresses, reassembles the address's instruction at its declared location. This is great for code changes in game updates, as well as polymorphic code, or any code that has polymorphic like behavior.
Note: It doesn't accept labels, just registered symbols and addresses.
Command Parameters[edit]
Parameter | Type | Description |
---|---|---|
Address | string | The address or symbol of the memory block to change access rights |
Examples[edit]
reassemble(SomeRegisteredSymbol)
reassemble(00123ABC)
originalCode: reassemble(injectionPoint) jmp return
alloc(memTestMemory, 0x400) registerSymbol(memTestMemory) memTestMemory: reassemble("Tutorial-i386.exe"+24B25) reassemble("Tutorial-i386.exe"+24B29) reassemble("Tutorial-i386.exe"+24B2D) //// Read Memory // Tutorial-i386.exe+24B25 - 83 45 EC 01 - add dword ptr [ebp-14],01 // Tutorial-i386.exe+24B29 - 83 7D EC 64 - cmp dword ptr [ebp-14],64 // Tutorial-i386.exe+24B2D - 74 02 - je Tutorial-i386.exe+24B31 //// Assembled Memory // memTestMemory - 83 45 EC 01 - add dword ptr [ebp-14],01 // 003F0004 - 83 7D EC 64 - cmp dword ptr [ebp-14],64 // 003F0008 - 0F84 234B0300 - je Tutorial-i386.exe+24B31