Some Memory Address Pointers menu

Shout-Out

User Tag List

Page 1 of 2 12 LastLast
Results 1 to 15 of 28
  1. #1
    zewt's Avatar Member
    Reputation
    13
    Join Date
    Nov 2008
    Posts
    127
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)

    Some Memory Address Pointers

    just sharing some pointers i found. some may be useful, some maybe not enjoy.

    Health: "Diablo III.exe"+00FF13E4 + 0x18 + 0xC8 + 0xC + 0x298 + 0x2C
    Last edited by zewt; 06-02-2012 at 11:46 AM. Reason: UPDATED FOR NEW PATCH 1.0.2a

    Some Memory Address Pointers
  2. #2
    projectbarcelona's Avatar Member
    Reputation
    2
    Join Date
    Mar 2012
    Posts
    21
    Thanks G/R
    0/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Just a quick note. You have one listed as "Hatred" I tried it with my Wizard which doesn't have hatred, they have arcane power and it seems like it only shows the maximum arcane power not the current power unlike your health address which shows current health instead of maximum health. Would be interesting to be able to grab both current and maximum for both.

  3. #3
    JoshRMT's Avatar Member
    Reputation
    2
    Join Date
    Jan 2012
    Posts
    19
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)

    Quick question

    I'm an experienced software developer, but very new to the reversing scene. I just have a real quick question regarding your memory addresses, don't be afraid to be as technical as necessary. I'm just wondering how you go about taking a memory address and then finding it based on the 'static address' you found originally. In other words, how would you find something like 'maximum health' and then trace it back to the original static address?

    Thanks!

  4. #4
    caosmen's Avatar Member
    Reputation
    1
    Join Date
    Feb 2012
    Posts
    25
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Hi Josh,

    try out the Cheat Engine Tutorials. Several Methods are there explained.
    also you can scan around these areas of pointer to find near by information too. like scan for armor you see in the next 10 memories you dex, vit, and some more. one memory base with trees have most time near around other memorys who are in relation.

    sorry for the bad explanation, my english isnt the best .

  5. #5
    BitHacker's Avatar Master Sergeant
    Reputation
    13
    Join Date
    May 2012
    Posts
    114
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Edited: Lack of info...
    Last edited by BitHacker; 05-28-2012 at 09:06 AM.

  6. #6
    zewt's Avatar Member
    Reputation
    13
    Join Date
    Nov 2008
    Posts
    127
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by BitHacker View Post
    Offsets are NFG... lol ....

    Please see video...
    Download reclass2.mp4 from Sendspace.com - send big files the easy way

    0x18 + 0xC8 + 0xC


    NOTHING BUT ZEROOOOOOOOOOOOO AT ALL THOSE LOCATIONS..

    Anyone have the real offsets???
    Really? Your saying my offsets are wrong and then asking for the right ones? lol

  7. #7
    sdq928's Avatar Private
    Reputation
    1
    Join Date
    Mar 2010
    Posts
    12
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Thanks.But all I see is zero.

  8. #8
    zewt's Avatar Member
    Reputation
    13
    Join Date
    Nov 2008
    Posts
    127
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by sdq928 View Post
    Thanks.But all I see is zero.
    sdq, i will check again tomorrow but if autopots was working for you like you said it was, these should work fine.

  9. #9
    EternalSilence's Avatar Private
    Reputation
    1
    Join Date
    May 2012
    Posts
    1
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by zewt View Post
    just sharing some pointers i found. some may be useful, some maybe not enjoy.

    Health: "Diablo III.exe"+00FE31CC + 0x18 + 0xC8 + 0xC + 0x2A0 + 0x14
    Hatred: "Diablo III.exe"+00FE31CC + 0x18 + 0xC8 + 0xC + 0x1CC + 0x11C
    Armor: "Diablo III.exe"+00FE31CC + 0x18 + 0xC8 + 0xC + 0x368 + 0x8

    I found also what I believe to be a coordinate. Can anyone confirm whether this is truly an x or y coordinate?

    In menu's i get a float value of: 64.72097778 (could be useful to detect if we are at menu or in a game)

    Here it is:

    "Diablo III.exe"+00DF2E84 + 0x8
    Just some clarification for people.. you read the integer @ 00FE31CC, add 0x18 to it, read the integer again, add 0xC8, etc...

  10. #10
    truetarin's Avatar Member
    Reputation
    8
    Join Date
    Dec 2010
    Posts
    33
    Thanks G/R
    2/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Works fine for me, thanks!
    Do you have any other addresses, e.g. coords?

  11. #11
    zewt's Avatar Member
    Reputation
    13
    Join Date
    Nov 2008
    Posts
    127
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by truetarin View Post
    Works fine for me, thanks!
    Do you have any other addresses, e.g. coords?
    Hey thanks for confirming. I found a pointer which i think is a coordinate but im not 100% on it. I will keep digging today at some point.

  12. #12
    ARMqt's Avatar Private
    Reputation
    1
    Join Date
    May 2012
    Posts
    3
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    hey guys,

    I just programming on an directx overlay and its done but i try to fill my test text with values but all I see is zeros too.

    Just some clarification for people.. you read the integer @ 00FE31CC, add 0x18 to it, read the integer again, add 0xC8, etc...
    yea ofc like

    Code:
    C# Code:
                int memoryaddress = 0x00FE31CC;
                int pointerbase;
    
                memoryvalue = oMemory.Read((IntPtr)memoryaddress, 4, out bytesread);
                pointerbase = BitConverter.ToInt32(memoryvalue, 0);
                pointerbase += 0x18;
    
                memoryvalue = oMemory.Read((IntPtr)pointerbase, 4, out bytesread);
                pointerbase = BitConverter.ToInt32(memoryvalue, 0);
                pointerbase += 0xC8;
    
                ...
    but after add the 0xC8 offset the pointer points to nothing (debug code with VS)

    I tested my code - another program with pointers like this "HP: 0x0057C310 + 0x98 + 0x4 + 0x288 + 0x24 + 0x458" too and it works

    iam not really good with memory, maybe i get something wrong with the pointers?!


    sorry for my english and mess up this thread.

    EDIT: even with CE i found nothing
    Last edited by ARMqt; 05-29-2012 at 08:58 AM.

  13. #13
    truetarin's Avatar Member
    Reputation
    8
    Join Date
    Dec 2010
    Posts
    33
    Thanks G/R
    2/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Code:
                    BlackMagic diablo = new BlackMagic();
                    diablo.OpenProcessAndThread(SProcess.GetProcessFromWindowTitle("Diablo III"));
                    IntPtr baseDiablo = diablo.MainModule.BaseAddress;
                    Console.WriteLine("baseDiablo: " + baseDiablo);
    
                    // Try to get current health
                    uint value = diablo.ReadUInt((uint)baseDiablo + 0xFE31CC);
                    value += 0x18;
                    value = diablo.ReadUInt(value);
                    value += 0xC8;
                    value = diablo.ReadUInt(value);
                    value += 0xC;
                    value = diablo.ReadUInt(value);
                    value += 0x2A0;
                    value = diablo.ReadUInt(value);
                    value += 0x14;
                    float hp = diablo.ReadFloat(value);
    Works for me

  14. #14
    ARMqt's Avatar Private
    Reputation
    1
    Join Date
    May 2012
    Posts
    3
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    oh yea i forgot to add the base address "Diablo III.exe"+00FE31CC

    well thx truetarin

  15. #15
    caosmen's Avatar Member
    Reputation
    1
    Join Date
    Feb 2012
    Posts
    25
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by ARMqt View Post
    oh yea i forgot to add the base address "Diablo III.exe"+00FE31CC

    well thx truetarin
    HI,

    i think you all forget the base... dont scam him that it not work. he proved it with a tool. and yes all work if you do it right way !

Page 1 of 2 12 LastLast

Similar Threads

  1. Diablo III Memory Address Pointers (Health) Question
    By barryhutthole in forum Diablo 3 Memory Editing
    Replies: 4
    Last Post: 10-31-2012, 03:25 AM
  2. [3.0.9] Memory Address
    By JuJuBoSc in forum WoW Memory Editing
    Replies: 18
    Last Post: 04-15-2009, 12:18 PM
  3. And what does one do with all these memory addresses?
    By Nonominator in forum WoW Memory Editing
    Replies: 6
    Last Post: 03-23-2008, 06:52 PM
  4. where is that guide to finding the memory-address which Enables model editing
    By mikesanders in forum WoW ME Questions and Requests
    Replies: 2
    Last Post: 07-12-2007, 11:19 PM
All times are GMT -5. The time now is 12:58 PM. Powered by vBulletin® Version 4.2.3
Copyright © 2025 vBulletin Solutions, Inc. All rights reserved. User Alert System provided by Advanced User Tagging (Pro) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Google Authenticator verification provided by Two-Factor Authentication (Free) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Digital Point modules: Sphinx-based search