Difference between revisions of "Auto Assembler:reassemble"
Jump to navigation
Jump to search
(→See also) |
|||
Line 49: | Line 49: | ||
== See also == | == See also == | ||
* [[Cheat_Engine:Auto Assembler|Auto Assembler]] | * [[Cheat_Engine:Auto Assembler|Auto Assembler]] | ||
+ | * [[Auto_Assembler:Commands|Auto Assembler Commands]] | ||
=== Related Commands === | === Related Commands === |
Revision as of 00:29, 13 January 2018
Auto Assembler reassemble(Address)
Reassembles the given address, writing at it's declared location. It acts like a smart readMem. Reads the address's instruction, reevaluates any addresses, reassembles the address's instruction at it's declared location. This is great for code changes in game updates, as well as polymorphic code or any code that has polymorphic like behavior.
Command Parameters
Parameter | Type | Description |
---|---|---|
Address | string | The address or symbol of the memory block to change access rights |
Examples
reassemble(SomeSymbol)
reassemble(00123ABC)
originalCode: reassemble(injectionPoint) jmp return
alloc(memTestMemory, 0x400) registerSymbol(memTestMemory) memTestMemory: reassemble("Tutorial-i386.exe"+24B25) reassemble("Tutorial-i386.exe"+24B29) reassemble("Tutorial-i386.exe"+24B2D) //// Read Memory // Tutorial-i386.exe+24B25 - 83 45 EC 01 - add dword ptr [ebp-14],01 // Tutorial-i386.exe+24B29 - 83 7D EC 64 - cmp dword ptr [ebp-14],64 // Tutorial-i386.exe+24B2D - 74 02 - je Tutorial-i386.exe+24B31 //// Assembled Memory // memTestMemory - 83 45 EC 01 - add dword ptr [ebp-14],01 // 003F0004 - 83 7D EC 64 - cmp dword ptr [ebp-14],64 // 003F0008 - 0F84 234B0300 - je Tutorial-i386.exe+24B31