Code:Make Address , Offset , Value . Source : #define Address 0xAddress // Address By Cheat engine #define Hex 0xhex Offset // Hex Offset By Cheat Engine #define Value 0xvalue // Value ON Make Function Called Address , Offset , Value . Source : DWORD WINAPI LoopFunction(LPVOID param) { while (1) { if (GetAsyncKeyState(VK_PRIOR)&1) // Hotkey Function *(int*)((*(int*)Address) + Offset) = Value; Sleep(100); } } Make Threads . Source . CreateThread(0, 0, LoopFunction, 0, 0, 0); Example Completed Code ( Tested anti Wall Xshot C++ ) #include <windows.h> #include <stdio.h> /*================================ Antiwall ================================*/ #define Antiwall 0x12F5FC #define Antiwall2 0x2c0 #define Antiwall3 66269 /*================================ Antiwall OFF ================================*/ #define oAntiwall 0x12F5FC #define oAntiwall2 0x2c0 #define oAntiwall3 66279 /*================================================= =============================*/ DWORD XpsBlackHat = 0; LPTSTR COD = "MAT.exe"; void Patch(void *adr, void *ptr, int size) { DWORD NewProtection; VirtualProtect(adr,size,PAGE_EXECUTE_WRITECOPY, &NewProtection); memcpy(adr,ptr,size); VirtualProtect(adr,size,NewProtection, &NewProtection); } DWORD WINAPI LoopFunction(LPVOID param) { while (1) { if (GetAsyncKeyState(VK_PRIOR)&1) *(int*)((*(int*)Antiwall) + Antiwall2) = Antiwall3; Sleep(100); if (GetAsyncKeyState(VK_NEXT)&1) *(int*)((*(int*)oAntiwall) + oAntiwall2) = oAntiwall3; Sleep(10); } } BOOL WINAPI DllMain ( HMODULE hDll, DWORD dwReason, LPVOID lpReserved ) { DisableThreadLibraryCalls(hDll); if (dwReason == DLL_PROCESS_ATTACH) { MessageBox(0,"ON : Pageup / OFF PageDown","INFORMATION",MB_OK | MB_ICONINFORMATION); CreateThread(0, 0, LoopFunction, 0, 0, 0); } return TRUE; }