-
Member
translating memory addresses / offsets
I'm trying to figure out the following:
I can find memory address values in cheat engine fine through the traditional methods.
but once I have these addresses, I can't access them programatically using the readProcessMemory() it seems like I'm looking in the wrong place.
My question is the following:
How do I translate memory addresses from cheat engine, to something I can read in readProcessMemory()?
here is what I've tried:
Subtracting the base address of the process (discovered through vb program) from the cheat engine process, and then reading that memory address (doesn't work).
If anyone could please inform me of the proposed fundamental mistake that I am making, I'd be more than greatful.
-
Banned
There are 2 swtor processes. Make sure you are reading from the right one.
-
Most data is relative to MemoryMan.dll, so grab the base address of this module, and grab your offsets that way so its not so system dependent. Also, are you getting the pointers from CE?
-
Post Thanks / Like - 1 Thanks
hackerlol (1 members gave Thanks to DrD for this useful post)
-
Member
So I'm using the same swtor process that cheat engine is using when I find the values.
As far as pointers go, my first crack at a program was to simply display the value of "Distance to Target" in a text box upon a button click. I found this value at a specific memory address using cheat engine, So I don't believe that I need to look for the pointer to it (at least until i make a real program).
The value remains in the same memory address during my entire experiment. I can move my char around, and see the value change in cheat engine, but it remains at the same location.
Does it make sense that my memoryman.dll offset and swtor.exe offset is the same ?
-
Member
Update: I do not have a memoryman.dll when i iterate through my process modules.. ?