Thank you. The tutorial by itself doesn't explain what it means by "freeze it." And its directions on finding right address aren't quite the same. This was extremely helpful for clarifying what the tutorial's creator wanted for this step.
Legend, you cleared that step up for me, great video but you do a lot of copy and paste off screen and i got lost, lol, you should say this too in video, you go a bit quick at sometimes :) great stuff tho :)
Hey could you help me out? I'm attempting to find the pointer for the health in terraria because every time you quit the game, reload a world, switch chars, the game gets a new address for the health. The thing is when I find what accesses the address I get 3 values and they all have edx in them. If i scan for edx it brings up 6 values that are all different than the address of the health. Is there a way to fix this or does it flat out not work in terraria? Thanks!
Check out video number 8, if you want to do the pointer scanning manually, or you can find the value, right click on it, and do a pointer scan that way as well. They somewhat recently added pointer maps as well to speed up pointer scanning, so I might make a video showing how to use pointer maps to and the pointer scanner to find working pointers as well.
Yeah I've tried both ways and I cannot seem to find the static address. If i try making the pointer multilevel the pointer when I click what accesses this pointer nothing accesses it.
Also if you wouldn't mind me asking, why did you choose EDX instead of EAX in the debugger? You've already explained this in the video, but I am still confused/unclear about this thanks. In additio to this, I also wanna ask why some address are in in a form of 8 bits while some are in assembly code? Thanks in Advance, also +1 like
The instruction "mov [edx],eax" moves the value in eax to the location that edx points to. Judging by that it's safe to assume that edx will be your address. I'm not sure what you mean by the second part of the question, so let me know and I'll answer it the best I can. If you have anything else you want to see a video of let me know and I'll be sure to work on it.
Jesse Ah I see, I think I'll take a lesson or two on assembly coding to further understand this. As for the second question, you know how when you want to copy the address you got down on the cheat table? Sometimes, when we view the address view right-click, we get an assembly code with an offset such as "EDX+00000000A" or something of similar kind. Other times, it's the direct address of bytes. So why is this?
the written tutorial is just wrongly worded, SO incredibly wrongly worded. it explains NOTHING. Whoever wrote those, should try to do it himself step by step, with only actions allowed as described in those tutorial.
Thank you. The tutorial by itself doesn't explain what it means by "freeze it." And its directions on finding right address aren't quite the same. This was extremely helpful for clarifying what the tutorial's creator wanted for this step.
Just so you know, your help goes on for generations.
thanks goodness for somebody clearly eplaining the instructions
holy shit, thank you.
i'm tired of cheat engine teasing me when i exit the tutorial
Thanks mate. This made absolutely no sense from the instructions on the tutorial but now I completely understand it
out of all the other videos this brief tutorial shows the best method, you earnt a sub m8
What do you do if the value of your chosen register doesn't yield a static address upon scanning for it?
Thank you, sir. You help us from a lot of headaches
I can't follow at all dude. The part where you copy a value and than close windows and open one. I have no idea what you just copied.
Legend, you cleared that step up for me, great video but you do a lot of copy and paste off screen and i got lost, lol, you should say this too in video, you go a bit quick at sometimes :) great stuff tho :)
There is only a question mark in the value section
Hey there is nothing written at the adress for me .IDK what to do :(
Hey could you help me out? I'm attempting to find the pointer for the health in terraria because every time you quit the game, reload a world, switch chars, the game gets a new address for the health. The thing is when I find what accesses the address I get 3 values and they all have edx in them. If i scan for edx it brings up 6 values that are all different than the address of the health. Is there a way to fix this or does it flat out not work in terraria? Thanks!
Check out video number 8, if you want to do the pointer scanning manually, or you can find the value, right click on it, and do a pointer scan that way as well. They somewhat recently added pointer maps as well to speed up pointer scanning, so I might make a video showing how to use pointer maps to and the pointer scanner to find working pointers as well.
Yeah I've tried both ways and I cannot seem to find the static address. If i try making the pointer multilevel the pointer when I click what accesses this pointer nothing accesses it.
YOU CLICK TOO FAST THE IMPROTANT PART
wow i wasnt changing the pointer after i found the static address
Thank you finally
Hello there 😎
Thank you
THANK YOU!!!
Also if you wouldn't mind me asking, why did you choose EDX instead of EAX in the debugger? You've already explained this in the video, but I am still confused/unclear about this thanks.
In additio to this, I also wanna ask why some address are in in a form of 8 bits while some are in assembly code?
Thanks in Advance, also +1 like
The instruction "mov [edx],eax" moves the value in eax to the location that edx points to. Judging by that it's safe to assume that edx will be your address.
I'm not sure what you mean by the second part of the question, so let me know and I'll answer it the best I can. If you have anything else you want to see a video of let me know and I'll be sure to work on it.
Jesse Ah I see, I think I'll take a lesson or two on assembly coding to further understand this.
As for the second question, you know how when you want to copy the address you got down on the cheat table? Sometimes, when we view the address view right-click, we get an assembly code with an offset such as "EDX+00000000A" or something of similar kind. Other times, it's the direct address of bytes.
So why is this?
Thanks. Explanation in CE is terrible.
thank sooooo match🤩🤩
fckin magician
The tutorial in CE is poorly written. Thanks for the vid
I'm jinx to say but 0 dislikes is propriate
the written tutorial is just wrongly worded, SO incredibly wrongly worded. it explains NOTHING. Whoever wrote those, should try to do it himself step by step, with only actions allowed as described in those tutorial.