Register for your free account! | Forgot your password?

Go Back   elitepvpers > Coders Den > AutoIt
You last visited: Today at 10:04

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



[Autoit] MemoryPointerRead

Discussion on [Autoit] MemoryPointerRead within the AutoIt forum part of the Coders Den category.

Reply
 
Old   #1
 
elite*gold: 0
Join Date: Sep 2010
Posts: 4
Received Thanks: 2
[Autoit] MemoryPointerRead

Hello everyone, i apologize for my bad english
I would write on this forum to get help. I use as AutoIt programming.
Can you tell me where is the problem please.
thank you in advance

Image:


Code:
#include <NomadMemory.au3>
SetPrivilege("SeDebugPrivilege", 1)

$Address = 0x00690380
Dim $Offset[2] = [0, 0x0]

$Process = _MemoryOpen(ProcessExists("Tutorial-i386.exe"))
$Valeur = _MemoryPointerRead($Address, $Process, $Offset)

MsgBox(0,"","Resultat : " & $Valeur[1])

_MemoryClose($Process)

Why give me the value zero?

VIdeo :
loockys is offline  
Old 07/02/2013, 17:38   #2
 
FacePalmMan's Avatar
 
elite*gold: 0
Join Date: Jan 2013
Posts: 426
Received Thanks: 129
add this to the top of your script:
Code:
#RequireAdmin
FacePalmMan is offline  
Old 07/02/2013, 23:25   #3
 
Croco™'s Avatar
 
elite*gold: 235
Join Date: Jan 2012
Posts: 920
Received Thanks: 377
First off all, the offsets are useless:
Code:
Dim $Offset[2] = [0, 0x0]
Because:
0 = 0
0x0 = 0
0x00690380+0x0+0 = 0x00690380

But the questions is, is 0x00690380 the static address or the pointer ?
Croco™ is offline  
Old 07/02/2013, 23:38   #4
 
elite*gold: 0
Join Date: Mar 2009
Posts: 7,260
Received Thanks: 33,149
Quote:
Originally Posted by Croco™ View Post
First off all, the offsets are useless:
Code:
Dim $Offset[2] = [0, 0x0]
Because:
0 = 0
0x0 = 0
0x00690380+0x0+0 = 0x00690380
First of all... that's not true.

Code:
_MemoryRead(_MemoryRead(0x00690380)+0)
is not equal to
Code:
_MemoryRead(0x00690380+0)
The first value of the array is unused.


You can try to solve this problem by adding two lines:
Code:
#AutoIt3Wrapper_UseX64=n
#RequireAdmin
KDeluxe is offline  
Old 07/04/2013, 14:16   #5
 
elite*gold: 0
Join Date: Sep 2010
Posts: 4
Received Thanks: 2
Thank you for help.
Can you see if my NomadMemory.au3 is not the problem.

Read _MemoryPointerRead gives me a false value and _MemoryRead gives the true value.
I wonder if _MemoryPointerRead can give a true value, it gives me the value 0 why?



loockys is offline  
Old 07/04/2013, 19:53   #6
 
elite*gold: 0
Join Date: Mar 2009
Posts: 7,260
Received Thanks: 33,149
Quote:
Originally Posted by loockys View Post
That image shows me, that you're using a 64 bit OS. That's the reason why I told you to add
Quote:
Originally Posted by KDeluxe View Post
Code:
#AutoIt3Wrapper_UseX64=n
#RequireAdmin
Maybe you have to compile your script.

The _Memory-Functions are using the 'wrong' data types, that's the reason why they only work with 32 bit programs.
KDeluxe is offline  
Old 01/30/2022, 19:48   #7
 
elite*gold: 0
Join Date: Sep 2017
Posts: 7
Received Thanks: 0
any advancement of nomadmemory to use in 64bit games?
Fernando_Liro is offline  
Old 02/04/2022, 11:49   #8
 
elite*gold: 0
Join Date: Sep 2017
Posts: 7
Received Thanks: 0
hello everyone, has anyone managed to read in 64bit games? always when I try in 64bit games the return is zero.
Fernando_Liro is offline  
Old 02/09/2022, 13:13   #9
 
[Beatrice]'s Avatar
 
elite*gold: LOCKED
Join Date: Oct 2014
Posts: 1,258
Received Thanks: 12,469
Quote:
Originally Posted by Fernando_Liro View Post
hello everyone, has anyone managed to read in 64bit games? always when I try in 64bit games the return is zero.
Simply compile your script as x64?
Code:
#AutoIt3Wrapper_UseX64=y
[Beatrice] is offline  
Reply


Similar Threads Similar Threads
AutoIt MemoryRead & MemoryPointerRead
07/31/2011 - AutoIt - 7 Replies
Bin schön länger dabei mittels Autoit Werte aus Minecraft herauszulesen, bin schon so weit das ich die "BaseAddress" eines Pointers ermitteln konnte. Komme jetzt jedoch nicht weiter die "BaseAddress" mit MemoryPointerRead aufzurufen. Mit CheatEngine ermittelte Pointer und Adressen: http://s7.directupload.net/images/110720/temp/q84 3qc3k.jpg Die für den Pointer "Richtige" Adresse bei OpenAL64.dll+2FD00



All times are GMT +1. The time now is 10:05.


Powered by vBulletin®
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2025 elitepvpers All Rights Reserved.