Here is what i have patched so far:

bf3.exe+621CC1 - E8 7A07ECFF - call bf3.exe+4E2440
bf3.exe+621CC6 - 8B 4D 08 - mov ecx,[ebp+08]
bf3.exe+621CC9 - 89 44 24 1C - mov [esp+1C],eax
bf3.exe+621CCD - 85 C9 - test ecx,ecx
bf3.exe+621CCF - 0F84 640E0000 - je bf3.exe+622B39
bf3.exe+621CD5 - 8B 7D 10 - mov edi,[ebp+10]
bf3.exe+621CD8 - 85 FF - test edi,edi
bf3.exe+621CDA - 0F84 590E0000 - je bf3.exe+622B39
bf3.exe+621CE0 - 8B 80 1C030000 - mov eax,[eax+0000031C]
bf3.exe+621CE6 - 3B 81 1C030000 - cmp eax,[ecx+0000031C]
bf3.exe+621CEC - 8B 75 14 - mov esi,[ebp+14]
bf3.exe+621CEF - 89 44 24 3C - mov [esp+3C],eax
bf3.exe+621CF3 - 0F94 C0 - sete al //mov 1 into al to show enemies
bf3.exe+621CF6 - 88 44 24 21 - mov [esp+21],al
bf3.exe+621CFA - 84 C0 - test al,al
bf3.exe+621CFC - 75 11 - jne bf3.exe+621D0F
bf3.exe+621CFE - 85 F6 - test esi,esi
bf3.exe+621D00 - 75 0D - jne bf3.exe+621D0F
bf3.exe+621D02 - 80 BF 71030000 00 - cmp byte ptr [edi+00000371],00
bf3.exe+621D09 - 0F85 2A0E0000 - jne bf3.exe+622B39
bf3.exe+621D0F - 6A 00 - push 00
bf3.exe+621D11 - 6A 00 - push 00
bf3.exe+621D13 - 8D 8C 24 48010000 - lea ecx,[esp+00000148]
bf3.exe+621D1A - E8 01E6E7FF - call bf3.exe+4A0320
bf3.exe+621D1F - F3 0F10 05 90FD0902 - movss xmm0,[bf3.exe+1C9FD90]
bf3.exe+621D27 - 0F57 C9 - xorps xmm1,xmm1
bf3.exe+621D2A - F3 0F10 C8 - movss xmm1,xmm0
bf3.exe+621D2E - F3 0F11 84 24 40040000 - movss [esp+00000440],xmm0
bf3.exe+621D37 - 0F28 C1 - movaps xmm0,xmm1

Next function:

bf3.exe+4A03FB - E8 7023BDFF - call bf3.exe+72770
bf3.exe+4A0400 - 83 0F 02 - or dword ptr [edi],02
bf3.exe+4A0403 - 8A 45 0C - mov al,[ebp+0C]
bf3.exe+4A0406 - F3 0F10 05 90FD0902 - movss xmm0,[bf3.exe+1C9FD90]
bf3.exe+4A040E - 8B 55 08 - mov edx,[ebp+08]
bf3.exe+4A0411 - F3 0F11 86 9C020000 - movss [esi+0000029C],xmm0
bf3.exe+4A0419 - F3 0F10 05 34540B02 - movss xmm0,[bf3.exe+1CB5434]
bf3.exe+4A0421 - 88 86 B4020000 - mov [esi+000002B4],al
bf3.exe+4A0427 - B0 01 - mov al,01 //mov 0 here to show names
bf3.exe+4A0429 - F3 0F11 86 C0020000 - movss [esi+000002C0],xmm0
bf3.exe+4A0431 - 0F57 C0 - xorps xmm0,xmm0
bf3.exe+4A0434 - 88 86 BE020000 - mov [esi+000002BE],al
bf3.exe+4A043A - 88 86 C4020000 - mov [esi+000002C4],al
bf3.exe+4A0440 - 88 86 E4020000 - mov [esi+000002E4],al
bf3.exe+4A0446 - 5F - pop edi
bf3.exe+4A0447 - 88 9E A0020000 - mov [esi+000002A0],bl
bf3.exe+4A044D - 88 9E A1020000 - mov [esi+000002A1],bl
bf3.exe+4A0453 - 88 9E A2020000 - mov [esi+000002A2],bl
bf3.exe+4A0459 - 88 9E A3020000 - mov [esi+000002A3],bl
bf3.exe+4A045F - 89 9E A4020000 - mov [esi+000002A4],ebx
bf3.exe+4A0465 - 89 9E AC020000 - mov [esi+000002AC],ebx
bf3.exe+4A046B - 89 9E B0020000 - mov [esi+000002B0],ebx
bf3.exe+4A0471 - 89 9E B8020000 - mov [esi+000002B8],ebx
bf3.exe+4A0477 - 88 9E BD020000 - mov [esi+000002BD],bl
bf3.exe+4A047D - 89 9E CC020000 - mov [esi+000002CC],ebx
bf3.exe+4A0483 - 88 9E D0020000 - mov [esi+000002D0],bl
bf3.exe+4A0489 - 88 9E D1020000 - mov [esi+000002D1],bl

Last but not least:

bf3.exe+6220B1 - E8 BA23FBFF - call bf3.exe+5D4470
bf3.exe+6220B6 - D9 44 24 24 - fld dword ptr [esp+24]
bf3.exe+6220BA - DFF1 - fcomip st(0),st(1)
bf3.exe+6220BC - DDD8 - fstp st(0)
bf3.exe+6220BE - C6 44 24 1B 01 - mov byte ptr [esp+1B],01
bf3.exe+6220C3 - 77 05 - ja bf3.exe+6220CA
bf3.exe+6220C5 - C6 44 24 1B 00 - mov byte ptr [esp+1B],00
bf3.exe+6220CA - 8A 4C 24 1B - mov cl,[esp+1B]
bf3.exe+6220CE - 33 C0 - xor eax,eax
bf3.exe+6220D0 - 38 8C 24 11040000 - cmp [esp+00000411],cl
bf3.exe+6220D7 - 8D 8C 24 40010000 - lea ecx,[esp+00000140]
bf3.exe+6220DE - 0F94 C0 - sete al
bf3.exe+6220E1 - 48 - dec eax
bf3.exe+6220E2 - 83 E0 07 - and eax,07
bf3.exe+6220E5 - 50 - push eax
bf3.exe+6220E6 - E8 35D4FAFF - call bf3.exe+5CF520
bf3.exe+6220EB - 8A 54 24 1B - mov dl,[esp+1B] //mov dl 1 to show bars
bf3.exe+6220EF - 8B 43 04 - mov eax,[ebx+04]
bf3.exe+6220F2 - 8D 8C 24 A0010000 - lea ecx,[esp+000001A0]
bf3.exe+6220F9 - 88 94 24 11040000 - mov [esp+00000411],dl
bf3.exe+622100 - D9 40 70 - fld dword ptr [eax+70]
bf3.exe+622103 - 51 - push ecx
bf3.exe+622104 - D9 5C 24 28 - fstp dword ptr [esp+28]
bf3.exe+622108 - 8B CB - mov ecx,ebx
bf3.exe+62210A - E8 6123FBFF - call bf3.exe+5D4470
bf3.exe+62210F - D9 44 24 24 - fld dword ptr [esp+24]
bf3.exe+622113 - DFF1 - fcomip st(0),st(1)

That's all so far.

so as we know mr apoco here makes memory driven nametags by reversing their functions in CE problem is how did he come to find the tags address?

was it searching if enemy spotted search 1 , if not 0 etc
or a simple teamswitch 1 and 2 hack and viewed the memory from there
anyone got any ideas?