cheatengine 5.8.19 → 5.8.20
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README_CN.md +41 -41
- package/package.json +1 -1
package/README_CN.md
CHANGED
|
@@ -383,47 +383,47 @@ Hook 函数以拦截调用并捕获参数。
|
|
|
383
383
|
|
|
384
384
|
## 推荐工作流
|
|
385
385
|
|
|
386
|
-
### 指针追踪
|
|
387
|
-
```
|
|
388
|
-
|
|
389
|
-
|
|
390
|
-
|
|
391
|
-
|
|
392
|
-
|
|
393
|
-
|
|
394
|
-
|
|
395
|
-
|
|
396
|
-
|
|
397
|
-
|
|
398
|
-
|
|
399
|
-
```
|
|
400
|
-
|
|
401
|
-
### 函数分析
|
|
402
|
-
```
|
|
403
|
-
|
|
404
|
-
|
|
405
|
-
|
|
406
|
-
|
|
407
|
-
|
|
408
|
-
|
|
409
|
-
|
|
410
|
-
|
|
411
|
-
```
|
|
412
|
-
|
|
413
|
-
### 逆向未知代码
|
|
414
|
-
```
|
|
415
|
-
|
|
416
|
-
|
|
417
|
-
|
|
418
|
-
|
|
419
|
-
|
|
420
|
-
|
|
421
|
-
|
|
422
|
-
|
|
423
|
-
|
|
424
|
-
|
|
425
|
-
|
|
426
|
-
```
|
|
386
|
+
### 指针追踪
|
|
387
|
+
```json
|
|
388
|
+
// 自动 (首选)
|
|
389
|
+
{"name": "ce_find_pointer_path", "arguments": {"address": "0x255D5E758", "user_prompted": true}}
|
|
390
|
+
// 返回: base_address, offsets, ce_pointer_notation
|
|
391
|
+
|
|
392
|
+
// 手动 (自动失败时)
|
|
393
|
+
// 1. 查找访问该地址的代码
|
|
394
|
+
{"name": "ce_find_what_accesses", "arguments": {"address": "0x255D5E758", "user_prompted": true}}
|
|
395
|
+
// 2. 从结果获取寄存器值 (如 RBX=0x255D5E658)
|
|
396
|
+
// 3. 搜索存储该值的指针
|
|
397
|
+
{"name": "ce_value_scan", "arguments": {"value": "0x255D5E658", "type": "qword"}}
|
|
398
|
+
// 4. 重复直到找到 game.exe+offset
|
|
399
|
+
```
|
|
400
|
+
|
|
401
|
+
### 函数分析
|
|
402
|
+
```json
|
|
403
|
+
// 1. 查找函数边界
|
|
404
|
+
{"name": "ce_find_function_boundaries", "arguments": {"address": "0x14587EDB0"}}
|
|
405
|
+
|
|
406
|
+
// 2. 跟踪执行
|
|
407
|
+
{"name": "ce_break_and_trace", "arguments": {"address": "0x14587EDB0", "max_steps": 100}}
|
|
408
|
+
|
|
409
|
+
// 3. 生成特征码用于更新
|
|
410
|
+
{"name": "ce_generate_signature", "arguments": {"address": "0x14587EDB0"}}
|
|
411
|
+
```
|
|
412
|
+
|
|
413
|
+
### 逆向未知代码
|
|
414
|
+
```json
|
|
415
|
+
// 1. 反汇编
|
|
416
|
+
{"name": "ce_disassemble", "arguments": {"address": "0x14587EDB0", "count": 20}}
|
|
417
|
+
|
|
418
|
+
// 2. 符号跟踪理解逻辑
|
|
419
|
+
{"name": "ce_symbolic_trace", "arguments": {"address": "0x14587EDB0", "initial_state": {"rcx": "this"}}}
|
|
420
|
+
|
|
421
|
+
// 3. 为复杂函数构建 CFG
|
|
422
|
+
{"name": "ce_build_cfg", "arguments": {"address": "0x14587EDB0"}}
|
|
423
|
+
|
|
424
|
+
// 4. 检测模式
|
|
425
|
+
{"name": "ce_detect_patterns", "arguments": {"address": "0x14587EDB0"}}
|
|
426
|
+
```
|
|
427
427
|
|
|
428
428
|
---
|
|
429
429
|
|