Some static addresses I found :
0147F924 Player X, float
0147F928 Player Z, float
0147F92C Player Y, float
In the compass the values are displayed multiplied by 10.
Some static addresses I found :
0147F924 Player X, float
0147F928 Player Z, float
0147F92C Player Y, float
In the compass the values are displayed multiplied by 10.
Nice work mate
skype: zoopizoop
Thanks! Nice find.
Cant find that.. is that swtor.exe + 147F924 which is outside of the gamespace. I'm guessing you found it but you didnt tell us where the game was loaded at. It changes (atleast on my machine) every time I load the game, so need it in a format like swtor.exe + XXXXX
---------- Post added at 09:37 PM ---------- Previous post was at 09:33 PM ----------
Here is the actual offsets:
swtor.exe+F72DC8 = x, +4 = Z, +8 = Y
I hope that helps.
-Snip-
Don't ask for rep! - Ground Zero
Last edited by Ground Zero; 12-24-2011 at 12:28 PM.
Oh the info I could supply... but won't....
That one offset got me started, and I've found quite a few now..mob array, health, isstealth, isaggro, etc.
The game is pretty easy to find offsets, I'm really surprised there is not a bot out yet.
swtor.exe+0 is 00400000
If you want addresses based on it then you just need to substract 00400000 from the adress I gave.
Thus :
0147F924 = 00400000+0107F924
0147F924 = swtor.exe+0107F924
You addresses also work fine.
Some more addresses :
[0147BB68] + 3C : Player angle, float, in radians, with origin in Y axix
[ [ [ [ [ 10027E8C] + 3B8 ] + 504 ] + 14 ] + 8 ] + 40 : Player health, float, percentage from 0.0 to 100.0
any news/updates/info on the anti cheat system, is it active ? working?, bypass?
This is the basic code to read the health without error checking/attaching/etc.
Code:ReadProcessMemory( processHandle, (LPCVOID) 0x10027E8C , &address, sizeof(address), &bytesRead ); ReadProcessMemory( processHandle, (LPCVOID) (address+0x3B8) , &address, sizeof(address), &bytesRead ); ReadProcessMemory( processHandle, (LPCVOID) (address+0x504) , &address, sizeof(address), &bytesRead ); ReadProcessMemory( processHandle, (LPCVOID) (address+0x14) , &address, sizeof(address), &bytesRead ); ReadProcessMemory( processHandle, (LPCVOID) (address+0x8) , &address, sizeof(address), &bytesRead ); ReadProcessMemory( processHandle, (LPCVOID) (address+0x40) , &health, sizeof(health), &bytesRead );
one question, if i modify x, y or z it does not do anything at all. Is this intended to be or not?
@asdfx123 - Correct, those are copies.. to teleport you have to modify other values.. but be forewarned, they have rubberband code in place so if you teleport more than a few meters away you will pop back.
@gameroz - Yea that wont work on all machines, if you have dll's loaded in different spaces in memory that wont work on your machine. Hence most people post offsets in the fashion Module+OFFSET so that you can see it on all machines. However, you can still find it easily. just load up cheat engine, find your hp %, and do a pointer scan, and with the defaults it lists, you will find the offset, and you can fix for your machine.