Scan memory of wow and find the address of number (287451) in less than 1 minute. menu

Shout-Out

User Tag List

Results 1 to 7 of 7
  1. #1
    wancharle's Avatar Private
    Reputation
    1
    Join Date
    Mar 2010
    Posts
    3
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)

    Scan memory of wow and find the address of number (287451) in less than 1 minute.

    Hello everybody, excuse my English because I am Brazilian and speak Portuguese. This text was translated by google translate.

    I'm creating a ADDom that need to connect to the internet and update the information during the game.
    My problem is that blizard not allow a ADDom do IO operations. Then I had the idea of creating a bridge between my ADDom cheeter and a program that will make our communications with the Internet and forwards the response to the ADDom.
    My program is written in python using the library pymen (made by a member of this forum). And it is ready. However the function responsible for seeking the address of my table communication takes 30 minutes to find it.

    The program cheet engine takes only 5 seconds to do the same thing.
    Currently I do the scan in a linear fashion. Starts at byte address 0x0000 and I riding a 4 on 4 bytes to find the value.

    I wonder if anyone knows of any smarter way to do this. I am not a C programmer and I know nothing about assembly, but a friend of mine said that the programs have addresses special memories to store text, int, float and double. He said I should find out what the default address for the numbers and start looking for from those addresses.

    However I do not know anything about that and would like your help.
    Now if the problem is that the speed of python. I wonder if anyone has a scanner memory and simple that can be run on the command line as follows:
    c: \ \ scan_memory - process_id 12345 - scan-double '287451 '

    and print out:
    found 5 address:
    0x22FFCC
    0x3322FB
    0xAF33FF
    0x123456
    0x652DCA

    If someone wants to do this program for me until I can pay a few dollars (I can not pay much, but I think you would buy for a few beers ).


    Thank you for your attention.

    Scan memory of wow and find the address of number (287451) in less than 1 minute.
  2. #2
    lanman92's Avatar Active Member
    Reputation
    50
    Join Date
    Mar 2007
    Posts
    1,033
    Thanks G/R
    0/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Well if you are not searching for code, you could only search in the data section(use VirtualQueryEx to distinguish). Vice versa for finding code patterns. Start searching at address 0x401000, the windows executable base address. That should increase search speed a lot, as reading address 0x0000-0x400FFF probably throws an exception and take a lot of time.

  3. #3
    wancharle's Avatar Private
    Reputation
    1
    Join Date
    Mar 2010
    Posts
    3
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)

    thanks

    thanks,

    Thanks to great tutorials and examples of this forum, I managed to create a simple scanner memory in C using the devcpp. Using the linear method in python I spent 30 minutes to find the address. In my new program takes me 2 minutes.

    I'll try this approach now that you talked about: VirtualQueryEx try to reduce the time to 5s as cheet engine does.

    Does anyone know where I can find a very simple example of using VirtualQueryEx?

    So long and thanks for the tip.

  4. #4
    flo8464's Avatar Active Member
    Reputation
    30
    Join Date
    Apr 2009
    Posts
    434
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Copying larger chunks of data will make your search much, much faster.
    Hey, it compiles! Ship it!

  5. #5
    deCutter's Avatar Member
    Reputation
    5
    Join Date
    Apr 2009
    Posts
    17
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by wancharle View Post
    Does anyone know where I can find a very simple example of using VirtualQueryEx?
    VirtualQueryEx Function (Windows)
    I also suggest you buy a book in your language about Windows virtual memory system.

  6. #6
    SinnerG's Avatar Member
    Reputation
    6
    Join Date
    Aug 2006
    Posts
    78
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    This is how I would do it:

    Read the memory in large blocks, convert the whole block to an ASCII string, and search for the number 'in ASCII form'

    I could search any text inside wow in a couple of seconds this way

  7. #7
    lanman92's Avatar Active Member
    Reputation
    50
    Join Date
    Mar 2007
    Posts
    1,033
    Thanks G/R
    0/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    You can read the entire memory space of WoW in one call and copy it into your process. Just suspend all threads so that it doesn't change while you're scanning your copy. The local memory reads will be faster. If you are on a 64-bit computer, you can check 64(qword) bits at a time instead of 32(dword).

Similar Threads

  1. [How-To] cheap and pro SWTOR SERCIVE check out Gamereasy.com.less than 3.3$/1m.
    By gamereasysns in forum Star Wars: The Old Republic
    Replies: 0
    Last Post: 04-05-2015, 08:49 PM
  2. [How-To] cheap and pro SWTOR SERCIVE check out Gamereasy.com.less than 3.3$/1m.
    By gamereasysns in forum Star Wars: The Old Republic
    Replies: 0
    Last Post: 04-01-2015, 08:32 PM
  3. Need help to setup PQR and find the right profile...
    By bigd in forum WoW Bots Questions & Requests
    Replies: 4
    Last Post: 12-02-2013, 09:15 AM
  4. where is that guide to finding the memory-address which Enables model editing
    By mikesanders in forum WoW ME Questions and Requests
    Replies: 2
    Last Post: 07-12-2007, 11:19 PM
All times are GMT -5. The time now is 03:17 AM. Powered by vBulletin® Version 4.2.3
Copyright © 2025 vBulletin Solutions, Inc. All rights reserved. User Alert System provided by Advanced User Tagging (Pro) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Google Authenticator verification provided by Two-Factor Authentication (Free) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Digital Point modules: Sphinx-based search