Results 1 to 13 of 13
  1. #1
    csnreyes's Avatar
    Join Date
    May 2008
    Gender
    male
    Location
    vegas
    Posts
    144
    Reputation
    10
    Thanks
    13

    Official Complete MHS Thread(come here for help also)

    I want anyone who needs help with MHS to post here including whats freeze mean and other nonsense as that.

    Downloads:
    Link 1
    Help for MHS



    Taken from MHS site:
    Code:
     Features
    
        * Searching
              o Data Type Search
                    + Many data types, including byte, short, long, __int64, float, double, and more.
                    + Many search types.
                          # Exact Value
                          # Not Equal To
                          # Range
                          # Greater Than
                          # Lower Than
                          # Unknown
                    + Perform aligned searches (recommended).
              o String Search
                    + ASCII, Unicode, binary, Wildcard, and Regular Expression searches.
                    + Useful options such as Match Case, Whole Word Only, and Aligned.
                    + The only memory searcher available with Wildcard and Regular Expression searches.
              o Pointer Search
                    + Find dynamic and/or static pointers.
                    + Find pointers that point to an exact location, not at a location, a range of locations, locations higher or lower than another location, or all pointers.
                    + Save the offset of your desired address from where each found pointer points. This helps you clearly see which pointers point to areas close to your desired address.
              o Group Search
                    + Find patterns of numbers using various techniques.
                    + Useful for finding tilemaps in tile-based games, especially in ROM games.
              o Sub Search
                    + All of the standard sub-search types, including Same, Not Equal To, Different, Increased, Decreased, Exact Value, Range, and Changed By.
                    + New sub-search type helps you find your target even faster! Use "Same As Original" to find numbers that are the same as they were when you first started your search!
              o Script Search
                    + Unlimited potential. You have full control over what is added to the list and what is not.
                    + Easy to use and fully documented with easy-to-understand examples.
              o Fastest Searches
                    + Memory Hacking Software features the fastest searches available.
              o Search Options
                    + Pause the target process while searching (improves speed greatly).
                    + Adjust the searching thread's priority.
                    + Omit useless sections of memory from your search (improves speed greatly).
                    + Postflush and precache use threading to perform file operations while the search continues.
                    + Optionally use Epsilon for float/double searches. Smart Epsilon uses Epsilon only on numbers that might cause rounding errors.
        * View RAM In Real-Time
              o RAM Watcher
                    + View RAM addresses as bytes, characters, integers, shorts, longs, floats, and bits, all at once. Easy to see what an address is in many different types.
                    + All addresses are displayed in real-time. Watch them change as you play your game. Easy to see what addresses are related to what game actions.
              o Hex Viewer
                    + Also loads any size of file quickly and with little RAM consumption.
                    + View addresses literally or relatively.
                    + Color codes show you areas in RAM that are static, executable, free, mapped, and unmapped. Chunk boundaries are highlighted for you, and you can optionally highlight all pointers.
                    + All addresses are displayed in real-time. Watch them change as you play your game. Easy to see what addresses are related to what game actions.
                    + Optionally highlight addresses that have changed. Extremely easy to determine when and why a value in RAM is changing based off your in-game actions.
                    + Multiple display types show you the RAM in bytes, characters, integers, signed/unsigned shorts, signed/unsigned longs, signed/unsigned 64-bit integers, floats, and doubles.
                    + Quickly jump to pointer locations.
                    + Much more.
        * Debugging
              o Executable Breakpoints
                    + When a breakpoint is hit, up to 3 functions can be called. Even more is that you get to decide which functions are called! But that's not all. Not only can you pick from any of the built-in functions, you can write your own using a DLL plug-in! A sample project for this type of plug-in is on this site. Still more: breakpoints can also call your script functions, making it even easier to add your own custom code for handling breakpoint hits.
              o Read/Write/Access Breakpoints
                    + All the same features as above, but the break occurs when the target address is read, written or accessed. Very useful for finding the code that changes your ammo or health!
                    + Built-in functions do a range of tasks, from beeping to opening a disassembly window and allowing you to step through the code.
                    + Any combination of 3 functions can be used for each breakpoint, including your own custom plug-in functions and script functions.
              o Conditional Breakpoints
                    + You can set any condition on a breakpoint you can imagine.
                    + The conditional syntax matches that of C/C++, with keywords EAX, ECX, EDX, etc. used to access the values of registers, and new keyword HC to get the hit count of the breakpoint.
              o Exports/Imports List
                    + Lists any module's exports and crosschecks them with the selected module's imports to give you a condensed list of every module from which any other module imports functions.
                    + Every function is listed with its address in the target process's memory space, so hooking functions and tracing memory is exceptionally easy.
              o Save Breakpoints
                    + Share with your friends easily. The exporter wraps together all the files needed to make your breakpoint work on your friends' machines.
        * Disassembling
              o Decoded Addresses
                    + Calls are decoded to function names when possible.
              o Single-Stepping
              o Assemble Code
                    + The Disassembler can also assemble! Change the game's code to do what you want.
              o NOP!
                    + Automatically NOP entire commands quickly and easily. But what's even better is that you can also un'NOP them! For a period of time, Memory Hacking Software will remember the commands you NOP'ed and allow you to undo the NOP'ing easily.
              o Highlights
                    + The Disassembler uses colors to highlight jumps, calls, and their targets when you move your mouse over them. This makes it very easy to see where a jump goes.
              o Useful Status Bar
                    + The Disassembler's status bar gives you additional information. It decodes address equations such as “ESI+4*EBX” and explains ASM commands, often providing a preview of the results after they are executed.
              o Inject Code
                    + Memory Hacking Software allows you to inject code into the target process more easily than you could with any other software. All you must supply is the address where you want to take control and the actual code you want to be executed. Memory Hacking Software will find a code cave for you, compile your ASM into machine code, add JMP's to the code cave and back to the original code, and it adds the instructions being overwritten by the initial JMP to your code cave. This allows you to focus on exactly what you want to do: inject code. It even gives you a preview of your code cave so you know exactly what it is doing.
              o Call Remote Functions
                    + Call any function in the target process with any number of parameters.
                    + Parameters can be any valid expression, making it easy to construct parameter lists.
                    + The return value of the remote function is shown after being called.
                    + Stable and user-friendly—little risk of crashing Memory Hacking Software or the target process if the parameters, function address, or calling type are incorrect.
              o Auto Hack
                    + Shows you all the code that reads/writes/accesses addresses.
                    + Explains the resulting code and shows register values at the time of execution.
              o Customize
                    + Change the font to your liking. Any style or color.
                    + Change the colors. Don't like the defaults? Some colors are hard to see? Like white text on a black background?
                    + Change the output. Prefer IDEAL decoding? Want lower-case disassembly? Tons of options.
              o Many Features Still Beta, but Plenty to Come!
        * Inject Code
              o Specify a code-cave address, or let Memory Hacking Software find or allocate one for you.
              o Memory Hacking Software automatically adds the JMP to the code cave.
              o Adding the JMP to the code cave causes some instructions in the original code to be overwritten, but these are automatically moved to the code cave too, with your choice to put them at the beginning or end.
              o The JMP back to the original code is automatically added for you.
              o Injections can be set to load automatically when a process is opened.
        * Inject DLL’s
              o Inject DLL’s of your choice into the target process. All injected DLL’s are listed and can be removed at any time, and can even be set to automatically be removed when Memory Hacking Software closes.
              o Remotely call any function from any injected DLL inside the target process. No restrictions on calling convention (__cdecl or __stdcall), return type, or parameters. Any valid expression is allowed as a parameter, making it easy to write your parameter list.
              o Remotely calling your DLL functions is safe and easy—even if incorrect parameters are passed or the wrong calling convention is used, there is little risk of crashing the target process or Memory Hacking Software.
              o The return value is taken from the target process and shown to you.
        * Scripting
              o Memory Hacking Software features a full-sized programming language with full C capabilities. IDE, compiler, and virtual machine are all included so coders are ready to write scripts straight out of the box.
              o Syntax matches C, so there is no need to learn a new language. C/C++ coders are ready to go.
              o New extern variables make it easy to read from/write to the target progress’ RAM.
              o Scripts are compiled into bytecode like Java for extremely fast execution.
              o Includes a full 100% standard-compliant preprocessor, which even supports variadic macros.
              o Includes an extensive and fully documented API.
              o All script features are well documented and many examples are provided.
        * Hotkeys
              o Assign any function to any key.
              o Scripts can be assigned to hotkeys to allow you to perform any operation at the touch of a button.
        * Real-Time Expression Evaluator
              o All C/C++ operators recognized, including <<, >>, &, ~, ||, and !, to present a few.
              o Recognizes module names and converts them to their respective base addresses.
              o New [ ] operators read RAM from the target process and use the resulting value in the expression. For example, [([[Project64.exe+0xD6A3C]+0x62988]&0xFFFFFF)+[Project64.exe+0xD6A3C]+0x2D4] is a valid expression while Project64.exe is open.
              o All expressions are evaluated in real-time, so you see the results while the target process’s RAM changes.
        * More
              o Converting
              o Many Options
              o Many Unique Features
              o Very Stable
    Screen Shot from ken135's thread
    How to open a process

    What to click and how to open

    Magnifying Glass

    This is what pops up from the magnifying glass, this is where you search for addresses.

    Second Magnifying Glass to continue a search from your original one

    This is what pops up from there

    Now to lock your address right click and click lock
    Last edited by csnreyes; 07-31-2008 at 01:54 PM.

  2. #2
    csnreyes's Avatar
    Join Date
    May 2008
    Gender
    male
    Location
    vegas
    Posts
    144
    Reputation
    10
    Thanks
    13
    Could this be stickied please

  3. #3
    gudsoldier's Avatar
    Join Date
    Jul 2008
    Gender
    male
    Location
    In your Girlfriends Closet.
    Posts
    1,010
    Reputation
    14
    Thanks
    278
    My Mood
    Mellow
    Nice double post... but I don't think there's a moderator here on this forum... if there was, sorry I didn't know you were there.. and if there isn't, I'd happily be a moderator.. I used to run my own forum.. where's that link....
    Stop flaming each other, it helps no one, and causes a step backwards rather than a step forwards.

    Read the rules before you decide to voice your opinion.

    Check your Grammar/Spelling/Facts before typing, otherwise I or another member will do it for you. And that just makes you look stupid.

  4. #4
    csnreyes's Avatar
    Join Date
    May 2008
    Gender
    male
    Location
    vegas
    Posts
    144
    Reputation
    10
    Thanks
    13
    Lol I used to run a forum also actually many with more then 20k members on each but they usually die out within 2 years

  5. #5
    hakufu's Avatar
    Join Date
    May 2006
    Gender
    male
    Location
    Florida
    Posts
    177
    Reputation
    10
    Thanks
    7
    ahaha, we need a moderator for all this,

    i'd like to moderate it
    <(banana?)

    PS: read my name backwards...

  6. #6
    CyberStriker's Avatar
    Join Date
    May 2008
    Gender
    male
    Posts
    149
    Reputation
    10
    Thanks
    12
    You can't open CA like that. You need to open it in Restricted Mode.

  7. #7
    gudsoldier's Avatar
    Join Date
    Jul 2008
    Gender
    male
    Location
    In your Girlfriends Closet.
    Posts
    1,010
    Reputation
    14
    Thanks
    278
    My Mood
    Mellow
    I already posted and said that in a movie.. I believe it should be quite clear as rain now.
    Stop flaming each other, it helps no one, and causes a step backwards rather than a step forwards.

    Read the rules before you decide to voice your opinion.

    Check your Grammar/Spelling/Facts before typing, otherwise I or another member will do it for you. And that just makes you look stupid.

  8. #8
    tigran's Avatar
    Join Date
    Jul 2008
    Posts
    1
    Reputation
    10
    Thanks
    0
    isnt tthis packet edditing and cant u get sued for this?

  9. #9
    csnreyes's Avatar
    Join Date
    May 2008
    Gender
    male
    Location
    vegas
    Posts
    144
    Reputation
    10
    Thanks
    13
    No its not packet editing, its like a UCE(undetected cheat engine)

    you can't get sued anyhow

  10. #10
    Rickyrudy's Avatar
    Join Date
    Feb 2008
    Gender
    male
    Posts
    277
    Reputation
    10
    Thanks
    26
    Ok, Why does my game client detect a speed hack whenever i do unknown scans?

  11. #11
    csnreyes's Avatar
    Join Date
    May 2008
    Gender
    male
    Location
    vegas
    Posts
    144
    Reputation
    10
    Thanks
    13
    hmm I have never had that happen maybe you should open the process in restricted mode

  12. #12
    Rickyrudy's Avatar
    Join Date
    Feb 2008
    Gender
    male
    Posts
    277
    Reputation
    10
    Thanks
    26
    Ehh i think i know what the problem is >.> Pause when scanning.. Unknown initial value scans usually take a while so when the scan is done the process tries to catch up and crash >.> Just a guess i'll turn off pause when scanning now for the game to come up so i can test.

  13. #13
    csnreyes's Avatar
    Join Date
    May 2008
    Gender
    male
    Location
    vegas
    Posts
    144
    Reputation
    10
    Thanks
    13
    O lol shouldve told me that happened lol I wouldve known

Similar Threads

  1. [Solved] do you know understand about VB? so come here and help me
    By [TIB]injector's in forum CrossFire Help
    Replies: 14
    Last Post: 09-12-2011, 05:27 PM
  2. need help please come here
    By rino1992 in forum WarRock - International Hacks
    Replies: 8
    Last Post: 06-06-2007, 11:30 AM
  3. For a bypass come here
    By test in forum WarRock - International Hacks
    Replies: 15
    Last Post: 05-15-2007, 01:25 PM
  4. All Hacking Downloads Come Here Plz!
    By naomelembro14 in forum WarRock - International Hacks
    Replies: 7
    Last Post: 02-27-2007, 01:21 AM
  5. fast! Dave come here
    By Big Black in forum WarRock - International Hacks
    Replies: 4
    Last Post: 12-31-2005, 04:03 AM

Tags for this Thread