Jump to content

74.0: Example of use the ARM opcodes view in the memory editor - GameGuardian

You can subscribe to our new videos.



Recommended Comments

You are brilliant 🙂

This is extremely useful for those debugging.

Share this comment


Link to comment

I love you :V xD 
It made my heart happy in such a way ...

Share this comment


Link to comment
5 hours ago, ahuranazda said:

i wanna see some action of this using on games. 🙂

same ,ofcourse great app thanks for make this great tool

Share this comment


Link to comment

You can not take and so just write an example of hacking on video.
First you need to find the right game. This is a lot of time wasted.
Then you need to hack it and record a video.
Still, the video will be the same magical and not understandable.
I do not have this all the time. That is why GG Victim was created, so as not to waste all this time.

Share this comment


Link to comment

what are this values you put?what is the mean of that values?thanks

Share this comment


Link to comment
2 minutes ago, Enyby said:

I modify code, and spoil check pass.

yes i understand you reverse to check to  wrong to give the correct entry but what is the values ,you mean is check pass text or what?

Share this comment


Link to comment

I know code. I read assembler codes. So if wrong code passed it must moved 0 to register. I replace it with move 1. So check always pass and never fail.

Share this comment


Link to comment
Just now, Enyby said:

I know code. I read assembler codes. So if wrong code passed it must moved 0 to register. I replace it with move 1. So check always pass and never fail.

ok thanks bro

Share this comment


Link to comment

I dont understand what this does really. It looks like it could be usefull, just dunno in what way xD

 

 

Nevermind, Holy ***** this is Insane. Nice ***** Job holy

 

d*** 

Edited by YeetMeister

Share this comment


Link to comment

I don't understand, you can explain for me what will It do ? sorry for my English 

Share this comment


Link to comment
On 4/21/2019 at 3:05 PM, Drok said:

I don't understand, you can explain for me what will It do ? sorry for my English 

It's code written in assembly language if you want to hack games you should start learning those and you will get this. The wrong value is moved to the other address so he changed it to compare it with the wrong value instead making any number you put in it be accepted 

Share this comment


Link to comment
On 4/9/2019 at 10:42 PM, Enyby said:

You can not take and so just write an example of hacking on video.
First you need to find the right game. This is a lot of time wasted.
Then you need to hack it and record a video.
Still, the video will be the same magical and not understandable.
I do not have this all the time. That is why GG Victim was created, so as not to waste all this time.

hi can the gg make changes in a pwa chrome app?i know how reverse in devtools in pc but in android not exist the devtools, can i pçossible reverse that variablle from true to false?thanks

Share this comment


Link to comment

All depends from you. I do not think this is can be easy. Javascript is virtual machine. So you try modify app inside this VM.

Share this comment


Link to comment
Just now, Enyby said:

All depends from you. I do not think this is can be easy. Javascript is virtual machine. So you try modify app inside this VM.

in devtools i know how what part of code

[added 2 minutes later]

i not know how use vm, if i can access that part i only need change not need save

Share this comment


Link to comment

Devtools from PC can connect to Chrome in Android.

In any case it is different levels - devtools and GG. Devtools operate VM, GG operates bytes in physical memory. You must know how all implemented for try change anything in physical memory.

Share this comment


Link to comment
1 minute ago, Enyby said:

Devtools from PC can connect to Chrome in Android.

In any case it is different levels - devtools and GG. Devtools operate VM, GG operates bytes in physical memory. You must know how all implemented for try change anything in physical memory.

but i think can not save the changes, if possible save is possible explain how?thanks

Share this comment


Link to comment

You talk about nothing. Any common words. I won't tell you anything. This question is not interesting to me, I'm not going to deal with them. Moreover, I am sure that nothing will come of it. The whole idea was doomed to failure.

Share this comment


Link to comment

Wow, I'm amazed, and so excited! 😮

Thanks for your great work, I would never had waited for a disassembler in GG, but you did it. I'll learn as much as I can from this and I'm sure a lot of people will enjoy this too!

However I still don't really understand why you have to search for the opcode in reverse endian? This endian stuff always disrupt me. 

Share this comment


Link to comment

Reverse endian is same as hex in hex editor. Usual order as hex number. If You want same order bytes as in hex editor (like in IDA) you need reverse hex.

I use IDA for find this instruction so I use reverse HEX.

Share this comment


Link to comment

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...