thanks, like always lanman92. Wow now all makes sence. Ill +rep you next time ill +rep someone because now I cant.
lanman92 do you remember when you gaved me this offset to find hp
MemoryRead (Playerbase+0x0

and to that add (0x17*4) and read again
where is that 0x08 taken from?
Can it be that the 0x08 was taken from
here
Code:
push offset aUsageUnithealt ; "Usage: UnitHealth(\"unit\")"
push ebx
call sub_7AEEE0
add esp, 8
xor eax, eax
pop ebx
mov esp, ebp
pop ebp
retn
I assume that the 4 in +(0x17*4) is due to the value type (4 bytes) and UNIT_FIELD_HEALTH = 0x17. not shure how he got it thou ???
BTW.. in order to get offsets with ida can i do it in a CE fashion, like mark what it writes to that exact adress, and maby then run process or atach process? and later check the movements eg; esi+0x44 to get offset? breakpoints, would they do the same? When ever I do a run process It gives a acces violation error and screen goes black like if trying to lunch wow.exe.
So all this just can be sed in one question how do you find offsets for eg the UNIT_... with IDA.