Cheat Engine
Cheat Engine
  • 16
  • 220 890
How to download Cheat Engine
This shows you how to download Cheat Engine, and shows some behind the scenes info
If it's still too difficult, consider joining patreon: patreon.com/cheatengine/
zhlédnutí: 23 837

Video

Loading DBVM without the driver on a secure boot enabled system
zhlédnutí 11KPřed 2 lety
Warning: This is for expert level users who understand what DBVM is and the things you can do with it. In this video I'll show how to load DBVM without using a driver, and then using DBVM without using the driver as well. This all on a secure boot protected system (just to be clear, if the drive is E: the vmdisk.img and dbvmuefi.efi go to E:\ , not E:\EFI or E:\EFI\BOOT) Consider joining CE's P...
Cheat Engine Code Filter Feature
zhlédnutí 6KPřed 3 lety
Cheat Engine has a feature called Code Filter. It's like Ultimap, but can run without specialized hardware (Intel CPU) It does require a list of addresses that belong to the target, but in 64-bit the Unwind info is good enough for most uses (Warning: It's not so good with JIT'ed code or integrity checks) If you like these videos or Cheat Engine and would like to support me, join my Patreon at w...
Preview/Example: Immortality for Terraria on Mac
zhlédnutí 1,9KPřed 3 lety
Just showing of one of the new features for the upcoming CE version (Works the same on windows, but there it's .NET base instead of mono) In the current release version you can do the same in windows . But you'll have to go to the address of Terraria.Player.KillMe manually instead of picking it from a list , and you may have to have died once first For mac in the beta2 for mac I posted on patre...
Integrity Check Bypass
zhlédnutí 12KPřed 3 lety
Showing how to create an integrity check bypass for some games (The CE Graphical Tutorial specifically, but the method also works in other games) First find what accesses the code Optionally: Find what accesses the code that accesses the code (in case it's split up) Then copy the module memory Adjust the read instructions to read from the copy instead of the original (And make sure they all are...
Cheat Engine Graphical Tutorial Step 3
zhlédnutí 9KPřed 5 lety
In this tutorial I'll show how to solve step 3 by finding the position of the enemies and then force them out of the way It shows not to make any assumptions about the axis system used and first figure that out before finding the rest cheatengine.org/ (Had to cut out the fastforward part where playing and failing the platforming part because openshot just kept fetching the end of the video inst...
Cheat Engine Graphical Tutorial Step 2
zhlédnutí 11KPřed 5 lety
In this tutorial I'll show how to solve step 2 by freezing the enemy health with an allow decrease, and how to do it using a code injection that gives 1 hit kill and show how to refactor a piece of code to it's bare minimum Makes use of the 'forgot value scan' to show what to do if you lose track and the commonality scanner to show differences between player and enemy cheatengine.org/
Cheat Engine Graphical Tutorial Step 1
zhlédnutí 14KPřed 5 lety
In this tutorial I'll show how to do an unknown initial value scan using the All type and how to use the compare to first scan option. Also showing the difference between a display value and an actual value cheatengine.org/
Cheat Engine Tutorial Step 9 : Shared Code
zhlédnutí 14KPřed 5 lety
In this video i'll explain the basics of object oriented programming and shared code, and how to do a code injection filtering between player and enemy. It shows the use of the commonality scanner and structure dissect and then how to create a cheat table entry using the auto assembler script assign to cheat table (just ignore the bird sounds in the first quarter of the video) cheatengine.org/
Cheat Engine Tutorial Step 8 : Multilevel Pointers
zhlédnutí 27KPřed 5 lety
In this tutorial I show how to scan for multilevel pointers using both the pointermap method, and the manual method using the debugger. www.cheatengine.org
Cheat Engine Tutorial Step 7 : Code Injection
zhlédnutí 19KPřed 5 lety
In this tutorial I explain how to do basic Code Injection and explain the basics of an code injection auto assembler script www.cheatengine.org
Cheat Engine Tutorial Step 6 : Single level pointer
zhlédnutí 24KPřed 5 lety
Explanation on pointers and how to use a level1 pointer in Cheat Engine Get Cheat Engine at cheatengine.org/
Cheat Engine Tutorial Step 5 : Code Finder
zhlédnutí 13KPřed 5 lety
In this tutorial I try to explain how to use the code finder. The code finder lets you find out which pieces of code are responsible for changing certain values.
Cheat Engine Tutorial Step 4 Floating Points
zhlédnutí 18KPřed 5 lety
This tutorial shows how to scan for two different floating point type values, and how to change them using the addresslist, and the contextmenu of the found address list
Cheat Engine Tutorial Step 3 : Unknown initial value
zhlédnutí 9KPřed 5 lety
Step 3 of the tutorial. Figuring out the address of a value where you don't know what the value is
First Tutorial
zhlédnutí 8KPřed 5 lety
First Tutorial

Komentáře

  • @whatthefox97
    @whatthefox97 Před 14 dny

    can we view the source code with CE?

  • @held2053
    @held2053 Před 18 dny

    Somehow I am stuck on this - I find the Address with the value, change value to test, then create of Address1 - I then generate a Pointermap of That Var - I close and reopen the tutorial and select it as active - Change Value a few times and change pointer and then change value again - Create a new scan and search for the new value and find the address - Take then This Var and pointerscan for this address - Check Box: Compare Results, take the File of the Pointermap and select That Var as adress - Kept the "default options" (Different: max different offsets per node on at 3 & changed nr of threads scanning from 4) Then either: version1 - Get one Result, changed value and pointer - value did not change at all Version2: - Get multiple resutls, change pointer, value changed accordingly - Freeze pointer and change value to 5000 - Change Pointer - Failed somehow I am also now trying it out a few more times, looking if I somehow did something wrong

    • @held2053
      @held2053 Před 18 dny

      Okay, after trying it ONE MORE TIME it somehow worked now I am heavily confused

  • @tomifilep1
    @tomifilep1 Před 23 dny

    This method patched in the latest win updates ? just becuz not work

    • @cheat_engine
      @cheat_engine Před 21 dnem

      Exactly where does it go wrong for you? If at the start, make sure you're not on an AMD

    • @tomifilep1
      @tomifilep1 Před 20 dny

      @@cheat_engine Intel sure

  • @CJJ1025
    @CJJ1025 Před měsícem

    你好,你的教程非常有用,我可以把它转载到中国的视频平台bilibili上吗?以方便更多的人更好的学习CE。 Hello, your tutorial is very useful. May I repost it on the Chinese video platform Bilibili to make it more accessible to people who want to learn CE better?

  • @le_o_na_do
    @le_o_na_do Před měsícem

    finished the video, the problem is i don't know what any of these steps really mean. i once wanna quit and a popup said its useful and i did it because of that but i just dont get it. What is it for??

  • @DD_reel
    @DD_reel Před měsícem

    cheat engine is a virus its used by many people but over time it makes your pc super slow and the new version is spyware

  • @PickyMcCritical
    @PickyMcCritical Před měsícem

    there is soo, soo much information needed for this step that is nowhere in the tutorial or this video. i am so very confused.

  • @daktuno
    @daktuno Před 2 měsíci

    I tried to add that to the cheat table afterwards. It told me to add [enable] and [disable] tags. I tried, but after I injected the code, the tutorial window crash and closed. lol

  • @kamuransonecek607
    @kamuransonecek607 Před 2 měsíci

    it stops after printing "launching DBVM"

  • @FINDROBLOX
    @FINDROBLOX Před 2 měsíci

    dude im loving this ive only used cheat engine for basics like changing stat values and stuff but sometimes im limited and this just fixed everything for me and now i know why sometimes values wont change and stuff not just from this video but like your other videos thank you

  • @schizotriblesix
    @schizotriblesix Před 2 měsíci

    I tried it three times now and it suddenly worked I don't know what failed me the first two times, but I would asume that it has to do with the speed of the klicks and edits in between, as I was rolling the tutorial back at least 20 times and even so it sounds anoying... I would recommand watching this tutorial at 0,25 speed.

  • @CoisasdaLuisaHelena
    @CoisasdaLuisaHelena Před 2 měsíci

    hello, may u help me? I installed cheat engine but then after I uninstalled it because of the malware warning. I uninstalled it and the other third apps quickly. However, my windows defender still warms be about malware in a location that does not exist. :( is it a bug from windows defender or should I be worried?

  • @TheOriginalElkstone
    @TheOriginalElkstone Před 3 měsíci

    Yeah this shit just straight up doesn't work, at all

  • @DJBALLAHOUSE
    @DJBALLAHOUSE Před 3 měsíci

    My Rufus does not generate the System Volume Information folder on my pen driver disk

    • @cheat_engine
      @cheat_engine Před 3 měsíci

      that's ok

    • @donotprikel
      @donotprikel Před 15 dny

      You do not need the folder. Windows automaticly generates the folder for all drives. Its most likely there you just didnt disable hide protected system files in the view options in explorer. It is not needed and wont impair the functionality of DBVM installer

  • @daniel1478965
    @daniel1478965 Před 3 měsíci

    Journey sharing. 1. understand what the assembly is doing in "Show disassembler" 2. find out how to declare variable 3. find out how to do condition check 4. do code injection and pass the tutorial above 4 steps took me 6 hrs and following is the result. alloc(newmem,2048,"Tutorial-x86_64.exe"+2F25D) label(returnhere) label(originalcode) label(exit) label(num) newmem: //this is allocated memory, you have read,write,execute access //place your code here cmp rbx,[[Tutorial-x86_64.exe+325B10]+888] je originalcode cmp rbx,[[Tutorial-x86_64.exe+325B10]+890] je originalcode cvtsi2ss xmm0,[num] originalcode: movss [rbx+08],xmm0 exit: jmp returnhere num: dd 0 "Tutorial-x86_64.exe"+2F25D: jmp newmem returnhere:

  • @daniel1478965
    @daniel1478965 Před 3 měsíci

    Thanks. I got 4 offsets of points and added 4 offsets to 4 addresses separately, then freeze the 4 points by checkbox "Active". And I was trying to skip 3 middle points, rewrite the assembly to set the value of static address to the address of decimal value("5000"), but I failed and stuck for 10+ hrs.

  • @Crashyyyn
    @Crashyyyn Před 3 měsíci

    nice tutorial// but can't we just change the jg to jmp for the integrity check bypass ?

  • @David.Pham.
    @David.Pham. Před 3 měsíci

    i think the most confuse part is the offset, once you understand offset using calc, then it will be alot easier

  • @alirezafallahiazar3949
    @alirezafallahiazar3949 Před 4 měsíci

    Thanks 👍👍👍

  • @Shootnone13
    @Shootnone13 Před 4 měsíci

    how do you do this on msi bios 5

  • @rainair402
    @rainair402 Před 4 měsíci

    I also want to point out: That little diagram with Game.exe at the beginning of video is very helpful to understand multilevel pointers. Thanks for that as well. I watched so many videos today and they didn't explained anything, of why and how.

  • @rainair402
    @rainair402 Před 4 měsíci

    Today I got the big aha-moment with this video. Basically multilevel pointers are programmatically: 1. Read baseAddress + staticAddress 2. Read from (baseAddress + staticAddress) into result 3. Add pointer to result. Read from (result + pointer) 4. Iterate till end of all multilevel pointers are consumed 5. Read the real value at the end as the end result. I needed to write a program in C# myself to understand all that. And it worked like a charm.

  • @langus.
    @langus. Před 5 měsíci

    the download wont work for me, it just says the site refused the connection

  • @cemtuncaysahinkaya
    @cemtuncaysahinkaya Před 5 měsíci

    How we understand 4 byts gets to 8 byts? are all value typs of them related each others what will gonna do in other value typs And what happens when address value typ is float? because some of games using health and mana as float.

  • @papacitoloko1117
    @papacitoloko1117 Před 5 měsíci

    Is there ever a reason why there would be no reliable pointers from one instance of a game to the next, whether it be death or restarting the game? Oh also, is the single number in the '[ # ]' square brackets the offset or can the offset be something like [rdi+rax*8+28]

    • @cheat_engine
      @cheat_engine Před 5 měsíci

      It's possible there is no reliable pointer if objects are created in a random order affected by things like internet speed etc... e.g the player character might be placed after a monster inside an array and then iterated over each time instead of using a handy pointer. It's unlikely but possible yes. with stuff like [rdi+rax*8+28] the rax*8+28 is the offset, so if rax is 1, then then offset is 28+8=30 . (If RAX is high, like 50+ then this is one of those examples where pointers may not work)

    • @papacitoloko1117
      @papacitoloko1117 Před 5 měsíci

      @@cheat_engine yes, the value of rax is 0x24306ac4080

    • @papacitoloko1117
      @papacitoloko1117 Před 5 měsíci

      @@cheat_engine thanks for the help, so I've been looking for an alternative to static pointers and I think I found it. I've been able to single out the address I want by searching for array of bytes (might be 80+ bytes long lol), but I was wondering if there was a way to populate the addresses through a script on to the cheat table, since it's basically a scan then clicking on the one address that pops up. I'd also want to know if it were possible to automate a list of addresses using that address as a base, like for example that address would be the base address and then I'd need one thats 0x30 offset from that, then 0xb0, 0xc0, 0xd0 etc.

    • @cheat_engine
      @cheat_engine Před 5 měsíci

      @@papacitoloko1117 you can use groupscan or aobscan using Lua Memscan objects and then use the results to add addresses to the addresslist

  • @scrappy8845
    @scrappy8845 Před 5 měsíci

    I downloaded it maybe a few days later i get a random ad pop up and started installing by itself ends up being weatherzero which is dangerous, you think its better to get ce through patreon?

  • @andrey730
    @andrey730 Před 5 měsíci

    This was very insightful - as a bonus I've learned a bit about dereferencing syntax in assembler and how to identify which instruction is writing and which is reading from the address. thank you!

  • @test-rj2vl
    @test-rj2vl Před 5 měsíci

    Can you explain that jmp short? Normal jmp would do something wrong? Doesn't jmp take addresses?

    • @cheat_engine
      @cheat_engine Před 5 měsíci

      No. jmp short is just 2 bytes long and might sometimes be preferred but in the end it doesn't matter

  • @NoneYuh-kg1qz
    @NoneYuh-kg1qz Před 5 měsíci

    This dude is making almost 15k/month for doing nothing

  • @alteration1568
    @alteration1568 Před 5 měsíci

    Eac can dedect it??

  • @SwiperPiper
    @SwiperPiper Před 6 měsíci

    it dont work for me, im on windows 11...

  • @I-Am-Ra
    @I-Am-Ra Před 6 měsíci

    So i'm playing The Coin Game and i'm trying to spam spawn in a bunch of a certain item that i have in my packback, but i want to keep the item in there, so i can continuously take it out. Would this be possible through the pointers? I want to be able to create a mountain of crap in the game for a funny video idea, but have no clue what i'm doing.

  • @4sap41
    @4sap41 Před 6 měsíci

    After a bunch of research, I figured a way to go around the crashing here's the code: newmem: //this is allocated memory, you have read,write,execute access //place your code here cmp [ebx+10], 1 je short buff originalcode: mov [ebx+04],eax fldz jmp exit buff: mov eax, [ebx+04] jmp originalcode exit: jmp returnhere hope this helps

  • @sunny25750
    @sunny25750 Před 6 měsíci

    i will explain as much as i understand: 2:28 :he scanning to find the P1 address at that time 2:41 :scan them then add them to the group to make compare easier 3:36 :that window will future scan them to know each group is matching with each offset, then he remember the offset 0th is 14(just for easy to do) 4:34 :he open the offset list to compare the offset(that table will also make diffrent between each address), there is a change pointer at offset 10th then next offset is 18 so he add new elememt 14th (the 14 above) and name it "teamnr" (just easy to see), adding other address, then matching them in right group, then there is a purple line appear, that is wat the differrent between player and the bot , u guy can see group 1 has value 1, group 2 have value 2 (remember this number) 6:24 :just repeat that progress again but extra 7:37 :code inject with cheat table to turn it on/off by clicking the X mark, he use "cmp" to compare "[rbx+14]",the "14" is the 14 above ",1" is the value compare (the 1 above), je to go through a specific place in the code "short exit" to exit the the code, (if the 14th offset is 1 then it ignore DECREASED HEALTH and jump out without doing original code label) i hope this is help u guy and not a big misunderstood lmao

  • @landinn.n
    @landinn.n Před 6 měsíci

    This is AMAZING but.... why did you search up cuddly hedgehogs in the bottom of your screen ToT

  • @projetoconexaodivina
    @projetoconexaodivina Před 7 měsíci

    when i double click on RAX commonality scanner it shows: acess vioation

  • @Baconbro3857
    @Baconbro3857 Před 7 měsíci

    what does the malware do ? because there is 10 malware not sure if dangerous please respond?

    • @cheat_engine
      @cheat_engine Před 7 měsíci

      it shows you an option to download a third party app like an anti virus or firewall, and if you click accept it installs it, and if you click decline it doesn't

  • @glebzhigunov173
    @glebzhigunov173 Před 7 měsíci

    how to manipulate with ammo amount?

    • @cheat_engine
      @cheat_engine Před 7 měsíci

      Hint: Not everything shown is the way it is stored

  • @Ergonyx
    @Ergonyx Před 7 měsíci

    I can't get the manual method to work outside of the tutorial. Tried about 40+ games and not one has worked with the manual method while most have worked with the pointermap method. Not sure what I'm doing wrong since I'm following every step in the video.

    • @cheat_engine
      @cheat_engine Před 7 měsíci

      Do you ever encounter static memory? E.g the game might have an anti cheat in which case CE will have trouble recognizing static memory (Which also affects the pointerscan)

    • @Ergonyx
      @Ergonyx Před 7 měsíci

      @@cheat_engine I rarely get static addresses doing the pointerscan and never get them doing the manual method. I'll get a whole bunch of results (that the tutorial doesn't explain how to filter through) or no results at all when attempting the manual method.

  • @pepeto18
    @pepeto18 Před 8 měsíci

    dudue bro plz can u at last zoom in the things you selecting this is not what it says on the tutorials that comes wit the program no even the one is on forum plz some suport

  • @VStyleMentVS
    @VStyleMentVS Před 8 měsíci

    If you are looking for the bullets, they are saved in reverse. So if you have 5 bullets in game, it is saved as 0 (you have shot 0 bullets). When you have 4 - look for 1 (as you shot only one) and so on. Managed to solve it that way.

    • @rahmisyafitri3030
      @rahmisyafitri3030 Před 8 měsíci

      this works well... thank you for saving my life

    • @mikezicg7422
      @mikezicg7422 Před měsícem

      This gives a really good insight. is this the most possible case when a certain clearly displayed integer value from game can't be searched up in the engine even selecting all value type? for most real case the upper limit of that value usually unknown. what should to in that case? thanks

  • @arnaudh2082
    @arnaudh2082 Před 8 měsíci

    whyt do you close the tutorial to reopen it ?? please explain all your actions it doesnt make any sense

    • @cheat_engine
      @cheat_engine Před 8 měsíci

      Closing the tutorial will cause all memory allocations to be randomized so that way it's easier to see which pointers are valid

  • @user-lf9vj7dn4c
    @user-lf9vj7dn4c Před 8 měsíci

    what are the eax, ebx, edx, things mean?

    • @cheat_engine
      @cheat_engine Před 8 měsíci

      Those are called registers. They are storage locations for a processor that you can use to store temporary values in. It's a lot faster than memory

  • @Androeeduser
    @Androeeduser Před 8 měsíci

    BRO CHEAT ENGINE NOT WORKING ON MY MOBILE I CANNOT USE CHEAT ENGINE ON MOBILE MY PC CAN'T DOWNLOAD ANYTHING

  • @Sam-ob3sb
    @Sam-ob3sb Před 9 měsíci

    its really hard to understand what you are saying

  • @harisperantauan3278
    @harisperantauan3278 Před 9 měsíci

    Assalamu'alaikum

  • @harisperantauan3278
    @harisperantauan3278 Před 9 měsíci

    Assalamu'alaikum

  • @longtherandomperson2584
    @longtherandomperson2584 Před 9 měsíci

    gave me offercore

    • @cheat_engine
      @cheat_engine Před 9 měsíci

      It doesn't 'give' offercore. it 'has' offercore. It's what shows the advertisement during the installation.

  • @nulle5311
    @nulle5311 Před 9 měsíci

    I try it dont work. Idk why but its still a integrity check error. The 3rd tutorial doesnt help, but this time i think it could be work. I had the same view screen on my memory viewer. But it was a failure.

  • @nulle5311
    @nulle5311 Před 9 měsíci

    11:49 that clear throat