for people interested in getting CE's debugger to work without crashing, i shall give you some tips.
BTW this is regarding IAH, i have not tested EU version, some thoughts on any differences between the two would be apreciated, as you tend to find, some hacks work for some versions and some dont for others.
Anyway, providing your bypass works (which ive not tested, i have my own) you need to make sure your CE settings are correct. im using CE 5.5
Make sure you have "try to prevent detection of debugger" and under Extra options, make sure you have unticked "Read/Write Process Memory".
Lastly, tick "user kernelmode debugger options when possible"
and tick "Stealth Mode (usermode)"
you should now be able to find out what accesses any address.
(if you cant, its your bypass, like i say, my own works fine

)
Some more information, everything i have found so far is client side, but thats not to say i wont find something which is benificial. Not everything that is Client Sided, is useless, i will give you an example.
Depending on how the monster images are rendered, and the process behind your char attacking them or being attacked by them, you could find yourself with a Client Side Monster Vac.
This means, others would see you hitting the air, which your screen sees the monsters all gathered in one spot.
Of course, this is only possible if theres not some sort of server sided check on monster positions relative to your own when dying.
But other possibilities would be finding the differences in an archer attack compared to a melee attack, and see if you can extend the range with melee.
Lastly, item pickup. Increasing the range in which you auto pickup may be possible depending on whether the client handles the info, and its not compared via the server.
I would like to say at this point tho, by digging around with Olly in the client.exe and checking out some of the packet procedures, i would really advice anyone with some knowledge of decrypting packets, should move straight onto doing just that, reason being, you may find it alot eaiser to create hacks with packet manipulation.