Reverse Engineering

At first, it might be easy to write Cheat Engine off as a gimmick. However, in reality, it is a highly optimised reverse engineering workshop, for both managed, and unmanaged applications. For application files, Cheat Engine can be used as a Hex Editor, to disassemble, and reassemble the file, allowing permanent changes to be made to application, in ASM. At runtime, multiple debuggers can be attached to a process, and scripts written in C, LUA, or ASM, can be applied to, or injected into the process. This powerful approach to reverse engineering allows for rapid development of proof of concept tools for modifying any application. For managed processes, fields, and methods can be accessed by name, and assemblies can be decompiled to MSIL on the fly. There are myriad other uses for Cheat Engine, as well.

Click here to add your own text

Click here to add your own text

Click here to add your own text

Click here to add your own text

Click here to add your own text