+ Reply to Thread
Page 1 of 2 1 2 LastLast
Showing results 1 to 40 of 41

Thread: ps3usercheat codes to code pattern and viceversa? (questions and discussion)

  1. #1
    Join Date
    Jul 2009
    Posts
    17

    Default someone convert codes into ps3usercheat code tutorial?

    I've heard (source : http://logsoku.com/thread/kohada.2ch...za/1301045322/ ) that there might be a way to "convert" CF codes to be used through normal code modification. Pretty much, you'd need to substract 10000 to get the right adress in the eboot.elf

    For instance, if there was a CodeFreak code of this type
    2000 0039D49C 60000000

    You would have to take the address/offset value (0039D49C) and substract 10000 (in hex value), so the offset you'd be looking for in the eboot.elf would be 0038D49C because 0039D49C-10000=0038D49C, then you'd just have to change the hex values to 600000


    I haven't tested it but from what i could decipher ( going through japanese websites gives me a headache) some people seem to agree with this idea...


    EDIT: I tried with Tales of Graces (max gald upon buying something) and IT WORKS
    This method seems to work for CodeFreak codes who look like this:

    2000 00XXXXXX YYYYYYYY with XXXXXX= offset and YYYYYYYY= hex value

    If offset is greater than 01000000, then it most likely won't work
    Last edited by thugstone; 08-13-2012 at 02:11 PM

  2. #2
    Join Date
    Aug 2005
    Location
    Calgary
    Posts
    5,056

    Default

    its easy to convert the codes over 90% of the codes they do are memory codes thought and take more work to convert then just -0x1000 ..
    for memory codes u need to insert a Subrutine into a free section of the elf .. (not always easy to find)
    ---------------------

    Thanx to anyone that has or is donating to me.. it helps alot with getting new things to hack..
    PS3 Hack PkgsL http://Ps3pkgs.4shared.com/

    Always have your stuff when you need it with @Dropbox.
    Sign up for free! http://db.tt/yqKJ6JdH

  3. #3
    Join Date
    Jul 2009
    Posts
    17

    Default

    Quote Originally Posted by Skiller View Post
    its easy to convert the codes over 90% of the codes they do are memory codes thought and take more work to convert then just -0x1000 ..
    for memory codes u need to insert a Subrutine into a free section of the elf .. (not always easy to find)
    ---------------------
    Yeah well i felt like pointing this out since no one did on this thread

  4. #4
    Join Date
    Aug 2005
    Location
    Calgary
    Posts
    5,056

    Default

    mainly do to the ppl that do the hacking already know this .. but this is good for the ppl starting out so thank you for posting it its one of them things that just comes normal to someone thats done it for so long.. somethings are not brought up till someone elts hits them .

    Thanx to anyone that has or is donating to me.. it helps alot with getting new things to hack..
    PS3 Hack PkgsL http://Ps3pkgs.4shared.com/

    Always have your stuff when you need it with @Dropbox.
    Sign up for free! http://db.tt/yqKJ6JdH

  5. #5
    Join Date
    Jan 2011
    Posts
    24

    Default ps3 usercheat codes to code pattern(OGP and COP)?

    can we convert ps3 usercheat to code pattern(OGP and COP)? because some games in ps3 usercheat results in a black screen. Compared to code pattern which is a sure thing when loading cheats to game.

  6. #6
    Join Date
    May 2011
    Posts
    40

    Default

    That's a good questions. I hope that it's possible.

  7. #7
    Join Date
    Jan 2011
    Posts
    24

    Default

    hope someone who have knowledge in this enlighten us.

  8. #8
    Join Date
    May 2011
    Posts
    132

    Default

    not try to use Enabler Code on ps3usercheat and see if that works

  9. #9
    Join Date
    Mar 2011
    Posts
    1,051

    Default

    you can convert them

  10. #10
    Join Date
    Aug 2005
    Location
    Calgary
    Posts
    5,056

    Default

    Not all can be ported Easly its better to move the codes the other way Auto tools to Usercheats .. this is much simpler :P

    Thanx to anyone that has or is donating to me.. it helps alot with getting new things to hack..
    PS3 Hack PkgsL http://Ps3pkgs.4shared.com/

    Always have your stuff when you need it with @Dropbox.
    Sign up for free! http://db.tt/yqKJ6JdH

  11. #11
    Join Date
    Jan 2012
    Posts
    165

    Default

    how do you do that?many thanks

  12. #12
    Join Date
    Aug 2012
    Posts
    21

    Default moderators please help ps3usercheat code section

    can someone convert codes on our forums into ps3usercheat code and make

    sction for usercheat codes or make tutorial how to convert normal cheat to

    usercheat

  13. #13
    Join Date
    Aug 2005
    Location
    Calgary
    Posts
    5,056

    Default

    Well for the ppl that know how to use CMP auto tools i could probably enable it to show u were the pattern starts with a simple mod ..
    but if u dont use that and u just decrypt the eboot .. all u would need to do is load it into a hex window .. and use the pattern it will then take u to the address that is being modded.. u would then add 0x10000 to the address to get the address used for Usercheats .. i will do some up maybe this weekend to show you guys

    Thanx to anyone that has or is donating to me.. it helps alot with getting new things to hack..
    PS3 Hack PkgsL http://Ps3pkgs.4shared.com/

    Always have your stuff when you need it with @Dropbox.
    Sign up for free! http://db.tt/yqKJ6JdH

  14. #14
    Join Date
    Aug 2012
    Posts
    21

    Default someone convert codes on our forums into ps3usercheat code or make tutorial

    can someone convert codes on our forums into ps3usercheat code and make

    section for usercheat codes or make tutorial how to convert normal cheat to

    usercheat

  15. #15
    Join Date
    Jan 2012
    Posts
    165

    Default

    that would be great.. can anybody help?

  16. #16
    Join Date
    Mar 2011
    Posts
    1,051

    Default

    look up OGP in hex editor +10000 from current offset
    example

    OGP in Hex Editor
    Code:
    SET OGP=12345678
    0x00345678: 12345678
    +10000
    Code:
    0x00355678: 12345678
    so usercheat
    Code:
    00002000 00355678 xxxxxxxx
    x=cop

    just do oposite if you want usercheat > ogp/cop -10000
    Last edited by 정지혜; 08-31-2012 at 01:47 PM

  17. #17
    Join Date
    Jan 2012
    Posts
    165

    Default

    nice thank you very much so with the +10000 is where the memory code is set within the elf?is this the same for all?or did i miss the point complete lol...many thanks

  18. #18
    Join Date
    Mar 2011
    Posts
    1,051

    Default

    Quote Originally Posted by DANNY G View Post
    nice thank you very much so with the +10000 is where the memory code is set within the elf?is this the same for all?or did i miss the point complete lol...many thanks
    works with all OGP
    Last edited by 정지혜; 08-31-2012 at 03:53 PM

  19. #19
    Join Date
    Jan 2011
    Posts
    24

    Default

    thanks for the enlightenment. i will try this.

  20. #20
    Join Date
    Jan 2011
    Posts
    24

    Default

    question. how about longer codes? how are you going to convert it to OGP/COP?

    ex.
    Code:
    00003000 009E8D20 00001F34
    00002000 00000000 461C4000
    00003000 009E8D20 00001F38
    00002000 00000000 461C4000
    00003000 009E8D20 00001F3C
    00002000 00000000 461C4000
    will i also use -10000 for 00000000 to get the ogp? and what does the 00003000 and 00002000 use for? or we can't convert this kind of codes?

  21. #21
    Join Date
    Mar 2011
    Posts
    1,051

    Default

    Quote Originally Posted by kaiser7044 View Post
    question. how about longer codes? how are you going to convert it to OGP/COP?

    ex.
    Code:
    00003000 009E8D20 00001F34
    00002000 00000000 461C4000
    00003000 009E8D20 00001F38
    00002000 00000000 461C4000
    00003000 009E8D20 00001F3C
    00002000 00000000 461C4000
    will i also use -10000 for 00000000 to get the ogp? and what does the 00003000 and 00002000 use for? or we can't convert this kind of codes?
    009E8D20 -10000 and for code types: http://www.codemasters-project.net/v...de-Types-(WIP)

    if it's outside the elf you can't convert it directly like skiller said
    Last edited by 정지혜; 09-02-2012 at 07:22 AM

  22. #22
    Join Date
    Aug 2005
    Location
    Calgary
    Posts
    5,056

    Default

    that 0003 code is a pointer code .. u can not directly convert that code u would need to make a subrutine .. and them are alot more advanced and alot harder to do to needing to find space to run your subrutine in the elf..

    Thanx to anyone that has or is donating to me.. it helps alot with getting new things to hack..
    PS3 Hack PkgsL http://Ps3pkgs.4shared.com/

    Always have your stuff when you need it with @Dropbox.
    Sign up for free! http://db.tt/yqKJ6JdH

  23. #23
    Join Date
    Sep 2012
    Posts
    19

    Default

    Can someone please explain what does this code do? :
    00003000 01733FA8 0000003C
    00003000 00000000 000003D4
    00003000 00000000 000000F0
    00002000 00000000 4A000000

    It's from the ps3usercheat db for BLUS-30762(BF3)
    I mean does it set value at mem loc 01733FA8 to 0x3C etc.. or what?
    And what's with the zeroes? That WIP thread on code explanation doesnt say anything for code-types 00002-3.

  24. #24
    Join Date
    Nov 2005
    Posts
    7,184

    Default

    please read post #22

  25. #25
    Join Date
    Sep 2012
    Posts
    19

    Default

    Quote Originally Posted by lee4 View Post
    please read post #22
    I did, i want to know what this code does, eg does it do sth like **code_address=value ??

  26. #26
    Join Date
    Nov 2005
    Posts
    7,184

    Default

    obviously you do not understand the statement on post#22

    re-post post#22 with line-break
    Quote Originally Posted by Skiller View Post
    that 0003 code is a pointer code ..

    you can not directly convert

    that code you would need to make a subroutine ..

    and them are alot more advanced

    and alot harder to do

    to needing to find space to run your subroutine in the elf..
    Quote Originally Posted by lordv View Post
    Can someone please explain what does this code do? :
    00003000 01733FA8 0000003C
    00003000 00000000 000003D4
    00003000 00000000 000000F0
    00002000 00000000 4A000000

    It's from the ps3usercheat db for BLUS-30762(BF3)
    I mean does it set value at mem loc 01733FA8 to 0x3C etc.. or what?
    And what's with the zeroes? That WIP thread on code explanation doesnt say anything for code-types 00002-3.
    01733FA8 is pointer address that points to other address is not show in the code
    3C, 3D4 and F0 are offsets that multiple jump to other address is not show in the code
    4A000000 is value

  27. #27
    Join Date
    Sep 2012
    Posts
    19

    Default

    Quote Originally Posted by lee4 View Post
    obviously you do not understand the statement on post#22

    re-post post#22 with line-break



    01733FA8 is pointer address that points to other address is not show in the code
    3C, 3D4 and F0 are offsets that multiple jump to other address is not show in the code
    4A000000 is value
    So this code does
    *((*0x01733FA8)+0x3C)=0x4A000000
    Etc.. ??
    Also is this code applied only once?
    Thanks for answering
    Last edited by lordv; 09-04-2012 at 12:40 AM

  28. #28
    Join Date
    Aug 2005
    Location
    Calgary
    Posts
    5,056

    Default

    the code should be activated everytime there hook is used .. just like an old cheat divice ..

    Thanx to anyone that has or is donating to me.. it helps alot with getting new things to hack..
    PS3 Hack PkgsL http://Ps3pkgs.4shared.com/

    Always have your stuff when you need it with @Dropbox.
    Sign up for free! http://db.tt/yqKJ6JdH

  29. #29
    Join Date
    Sep 2012
    Posts
    19

    Default

    Quote Originally Posted by Skiller View Post
    the code should be activated everytime there hook is used .. just like an old cheat divice ..
    Thanks Skiller, so my first line is correct?
    Last edited by lordv; 09-04-2012 at 02:20 AM

  30. #30
    Join Date
    Aug 2005
    Location
    Calgary
    Posts
    5,056

    Default

    well if in turn your calling fro the value on 0x01733FA8 to replace the value then yes ..

    it more read like this

    Lis r*, 0x0173
    Lw r*, 0x3FA8(r*)
    Lw r*, 0x3C(r*)
    Lw r*, 0x3d4(r*)
    Lw r*, 0xF0(r*)
    Lis r*, 0x4a00
    Stw r*, 0x0(r*)

    00003000 01733FA8 0000003C
    00003000 00000000 000003D4
    00003000 00000000 000000F0
    00002000 00000000 4A000000

    Then again this is a implemented code by Usercheats they desided not to use Codefreeks 6 codetype (pointer)
    and changed the 3 code to that of there own ..

    Thanx to anyone that has or is donating to me.. it helps alot with getting new things to hack..
    PS3 Hack PkgsL http://Ps3pkgs.4shared.com/

    Always have your stuff when you need it with @Dropbox.
    Sign up for free! http://db.tt/yqKJ6JdH

  31. #31
    Join Date
    Sep 2012
    Posts
    19

    Default

    Quote Originally Posted by Skiller View Post
    well if in turn your calling fro the value on 0x01733FA8 to replace the value then yes ..

    it more read like this

    Lis r*, 0x0173
    Lw r*, 0x3FA8(r*)
    Lw r*, 0x3C(r*)
    Lw r*, 0x3d4(r*)
    Lw r*, 0xF0(r*)
    Lis r*, 0x4a00
    Stw r*, 0x0(r*)

    00003000 01733FA8 0000003C
    00003000 00000000 000003D4
    00003000 00000000 000000F0
    00002000 00000000 4A000000

    Then again this is a implemented code by Usercheats they desided not to use Codefreeks 6 codetype (pointer)
    and changed the 3 code to that of there own ..
    Ah so in c pseudocode it's : *(*(*(*(0x01733FA8) +0x3c)+0x3d4)+0xF0)=0x4a000000
    ??

  32. #32
    Join Date
    Mar 2007
    Posts
    227

    Default

    thank you guys for a bit clarifying, but it is still some riddle to me

    i am trying to port a code but i am totally lost with these pointer addresses, as i am only a noob on this matter

    only thing i can figure, the address at 0x007DBBE4 is an empty space in eboot, which i have found in other eboot on different address.

    so what exactly do these mean in my example? i cannot figure any relation
    are these codes some sort of subroutine, which is executed on 0x007DBBE4 offset and as endresult 0x0000270F written? but why these lot address jumps, if so

    Code:
    00003000 007DBBE4 00000000
    00003000 00000000 000008D8
    00003000 00000000 00002394
    00003000 00000000 00000E5E
    00001000 00000000 0000270F
    00003000 007DBBE4 00000000
    00003000 00000000 000008D8
    00003000 00000000 00002394
    00003000 00000000 0000001C
    00003000 00000000 00002404
    00003000 00000000 00000E5E
    00001000 00000000 0000270F

  33. #33
    Join Date
    Sep 2012
    Posts
    19

    Default

    Quote Originally Posted by rippchen View Post
    thank you guys for a bit clarifying, but it is still some riddle to me

    i am trying to port a code but i am totally lost with these pointer addresses, as i am only a noob on this matter

    only thing i can figure, the address at 0x007DBBE4 is an empty space in eboot, which i have found in other eboot on different address.

    so what exactly do these mean in my example? i cannot figure any relation
    are these codes some sort of subroutine, which is executed on 0x007DBBE4 offset and as endresult 0x0000270F written? but why these lot address jumps, if so

    Code:
    00003000 007DBBE4 00000000
    00003000 00000000 000008D8
    00003000 00000000 00002394
    00003000 00000000 00000E5E
    00001000 00000000 0000270F
    00003000 007DBBE4 00000000
    00003000 00000000 000008D8
    00003000 00000000 00002394
    00003000 00000000 0000001C
    00003000 00000000 00002404
    00003000 00000000 00000E5E
    00001000 00000000 0000270F
    In Ida hit G and jump to 7Dbbe4. It should have a data xref here.

    Quote Originally Posted by rippchen View Post
    thank you guys for a bit clarifying, but it is still some riddle to me

    i am trying to port a code but i am totally lost with these pointer addresses, as i am only a noob on this matter

    only thing i can figure, the address at 0x007DBBE4 is an empty space in eboot, which i have found in other eboot on different address.

    so what exactly do these mean in my example? i cannot figure any relation
    are these codes some sort of subroutine, which is executed on 0x007DBBE4 offset and as endresult 0x0000270F written? but why these lot address jumps, if so

    Code:
    00003000 007DBBE4 00000000
    00003000 00000000 000008D8
    00003000 00000000 00002394
    00003000 00000000 00000E5E
    00001000 00000000 0000270F
    00003000 007DBBE4 00000000
    00003000 00000000 000008D8
    00003000 00000000 00002394
    00003000 00000000 0000001C
    00003000 00000000 00002404
    00003000 00000000 00000E5E
    00001000 00000000 0000270F
    Probably the value that gets changed is part of a struct of a struct etc.. with the first address being a pointer perhaps
    to an array of these structs..

  34. #34
    Join Date
    Mar 2011
    Posts
    1,051

    Default

    that sure explains it for me thanks skiller

  35. #35
    Join Date
    Mar 2010
    Posts
    23

    Default

    question... from an example:

    OGP = 12345678ABCD56781234FFFF
    COP = 98765432FEDCBA001234FFFF

    how can i get the offset.. or address..? i'm assuming in example, 1234FFFF would be the value.. right..? i tried opening the eboot with hex editor but i can't seem to find it.. i know i'm doing something wrong.. just don't know what it is..

  36. #36
    Join Date
    Mar 2007
    Posts
    227

    Default

    these are all "only" values or instruction sets. the offset you only find in hexeditor when searching for the original pattern and then look for the exact offset where the code patterns are modified

    in your example it is:
    98765432 -> 1st offset starting at 98
    FEDCBA00 -> 2nd offset starting at FE

    you hilight the bytes in hex and look at the offsets and add 10000 to these addresses, to get the usercheat offset. so hilight the found original pattern "12345678" and also "ABCD5678" and add 10000 to each offset

    vice versa

    the other way round you also have to use a hexeditor, to search for the original value/instruction.

    example taken from you but an imaginary offset:
    00002000 0026D4E4 98765432
    00002000 0026D4E8 FEDCBA00

    you now have on 1st row the codetype (please refer to codefreak codetypes here on this site, for example it says how many bytes are changed) 2nd row the offset, from which you have to substract 10000 to get the right address, and go there in hexeditor. the 3rd row is the hacked value, which gets newly written to this offset.
    now look on offset "0026D4E4-10000=0025D4E4" for the value and also on "0026D4E8-10000=0025D4E8".

    you will find taken from your example:
    12345678 -> offset 0025D4E4
    ABCD5678 -> offset 0025D4E8

    now you can make search patterns from usercheat code and you will see, there is no reference to any changing offset and only the values/instructions:
    OGP = 12345678ABCD56781234FFFF
    COP = 98765432FEDCBA001234FFFF

    to make things more difficult:
    these instructions/values CAN contain other offsets, but which are not relevant for you with porting. these are interesting, if you want to hack a code itself
    Last edited by rippchen; 10-19-2012 at 02:40 AM Reason: forgot important detail

  37. #37
    Join Date
    Mar 2010
    Posts
    23

    Default

    thanks rippchen.. its starting to be clearer now. so there is no way to convert OGP/COP to usercheat using simple methods.. so, i am assuming i have to open something with hex editor in order to find the offset.. is it a normal eboot for the game? a modded eboot? a pkg? an elf? param.sfo?

  38. #38
    Join Date
    Mar 2012
    Posts
    134

    Default

    00003000 00F40424 000003B4
    00003000 00000000 00000000
    00003000 00000000 000004B4
    00001000 00000000 0000270F
    00003000 00F40424 000003B4
    00003000 00000000 00000000
    00003000 00000000 000004B8
    00001000 00000000 0000270F
    00003000 00F40424 000003BC
    00003000 00000000 00000000
    00003000 00000000 000004B4
    00001000 00000000 0000270F
    00003000 00F40424 000003BC
    00003000 00000000 00000000
    00003000 00000000 000004B8
    00001000 00000000 0000270F


    from these codes how do i find the offset
    i try 00F30424 but does not exist
    why the code starts with 00003000 and 00001000 instead of 00002000?
    in eboot.elf it's possible insert jocker command?
    help me
    thanks

  39. #39
    Join Date
    Nov 2005
    Posts
    7,184

    Default

    if you even read couple posts above.
    its pointer code not RAM code
    its can not be convert for eboot use

  40. #40
    Join Date
    Oct 2013
    Posts
    6

    Default

    i have a question
    can c code(joker code) be used in eboot?

+ Reply to Thread
Page 1 of 2 1 2 LastLast

Similar Threads

  1. Disgaea D2 Code pattern problem
    By zodiacos89 in forum Hacking Discussion and Help (PS3 Only)
    Replies: 3
    Last Post: 04-28-2014, 08:10 PM
  2. Danny G & Dron_3 Code Pattern conversions
    By allgood8682 in forum Hacking Discussion and Help (PS3 Only)
    Replies: 12
    Last Post: 02-04-2014, 11:24 AM
  3. Return Old PKG/Pattern codes in Usercheat codes
    By JorgeFFC in forum Hacking Discussion and Help (PS3 Only)
    Replies: 2
    Last Post: 09-10-2012, 08:55 AM
  4. someone convert codes into ps3usercheat code tutorial?
    By thugstone in forum Hacking Discussion and Help (PS3 Only)
    Replies: 8
    Last Post: 08-31-2012, 03:28 PM
  5. Nude Codes(not request, a discussion)
    By Vercalos in forum General Hacking Discussion and Help
    Replies: 30
    Last Post: 12-14-2010, 12:24 AM

Tags for this Thread

Posting Rules

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may edit your posts