Quote:
Originally Posted by marci0
bottomy, i changed the 5D4D475B ( [GM] ) to any random name that are in stall in loa, using the [Only registered and activated users can see links. Click Here To Register...] , but when i come near the name nothing happens :(
|
make sure you reverse the bytes, when you put them in the compare. also make sure you are not already where the character is cause the name only goes through the function when the character first comes onto your screen. another thing is you could just remove the jnz, so then any character that loads will then trigger it. or you if you do want it to trigger when a char comes, just make it compare 1 letter so 'cmp byte ptr [eax+70],00//change 00 to the byte for the letter you want to check'
Quote:
Originally Posted by ikudosi
How come in all ascii to hex converters 5D4D475B = ]MG[ ... and for [GM] it's 5B474D5D
|
well that's cause it is ]MG[ those bytes, you reverse the bytes and you do this because of how the processor architecture stores byte code in the memory. and since PC's use x86 architecture now, so we use little-endian which is one of the types of byte ordering.
I've updated the scripts for 5.1.5 with the offsets according to this thread:
[Only registered and activated users can see links. Click Here To Register...]
but it will not work since he hasn't put up the offsets for elusive hack so i can't workout/update that part. so if anybody could get me/post the offsets for elusive hack then i could update these fully. otherwise they won't get done until probably tomorrow or the day after, i've been kind of busy :/.