I watched the video again and didn't see any 004B3D43 in it.. What is this address?[/QUOTE]Quote:
Uncheck "Show module addresses" in the memory viewer.
[Only registered and activated users can see links. Click Here To Register...]
I get messaged so much about that the player pointer in tutorial 1 (8:53) isn't there anymore. That shows that they didn't learn anything from the tutorials.. They don't teach what I intended them to teach. Instead hacks are released with functions from my tutorials without giving me any credits for it, nor did the majority learn anything from it when they are too dumb to jump into a call and look there for the playerpointer.. That's why I requested a close for this topic.
3) The question of the hour is, how long would it take to find the call [metin2client.bin+B3D43]?
1) Thank you
2) Well, I am not one of those *insert an insult*, I genuinely want and am eager to learn. Also I am still for naming everyone that even gave you a small tip in the credits of the project.
3) In my client it is the start of the function that uses "Send Battle Attack Packet Error" In your client it is 0x4B62E0.
[Only registered and activated users can see links. Click Here To Register...]
(P.s. I think I got the starting point wrong :( Might it be the very start B3D40 ? )
(P.p.s. Oh crap, I definitely got it wrong [Again, my thinking], I think it was different though.)
(Googled, Push EBP. Found out it is how the stacks usually start. Stupid me. )