Call of Duty WWII Cheat Table Trainer +17

Call of Duty WWII Cheat Table Trainer +17 1

Hexui Undetected CSGO Cheats PUBG Accounts
Activision has been actively updating Call of Duty: WWII’s and it’s anticheat over the years and is quite good at detecting cheats, in part to compel players to purchase microtransactions Notwithstanding, some trainers have been updated to accommodate the patches that Sledgehammer rolled out for the World War II shooter.​

This free trainer contains the accompanying Call of Duty WWII cheat table:​
  • Infinite Health​
  • Infinite Ammo​
  • No Reload​
  • Infinite Grenades​
  • and more
If you want to play online, there are anti-cheat measures that will crash the game and probably get you banned, so don’t use this online. Activision and Sledgehammer Games have worked hard to prevent people from cheating in Call of Duty: WWII.

This cheat table may be a bit outdated but depending on what version of the game you use, it may still work.​

Developers are staying at work longer than required to keep gamers from cheating, in any event, during single-player campaign modes or while disconnected, because it means that if you aren't paying real money to bypass the artificial grind in the single-player portions, then you aren't generating revenue for them. So they go the additional mile in keeping gamers from cheating, regardless of what mode it is so they can sell you microtransactions.​

You can download the cheat table with the download button on the top right of the page.​

Call of Duty WWII Cheat Table Trainer +17
1595553222814.png


Cheat Trainer Features
  • God Mode
  • No Reload
  • Infinite Ammo
  • Infinite Grenades
  • Infinite Medi Kits
  • Player Size
  • Restore Palyer Size
  • Increase Player
  • Decrease Player Size
  • Teleporter
  • Save Position
  • Load Position
  • Undo teleport
  • Test/WIP
  • One Hit Kills
  • Infinite Health Vehicles
  • God Mode Hostages
  • Health
Cheat Engine Scripts
Main Script:
[ENABLE]
aobscanmodule(_Teleport,CoD_SP.exe,F3 0F 10 80 90 00 00 00 F3 0F 10) // should be unique
aobscanmodule(_GodMode,CoD_SP.exe,8B 87 2C 02 00 00)
aobscanmodule(_NoReload,CoD_SP.exe,42 83 BC B6 A4 06 00 00 00)
aobscanmodule(_Ammo,CoD_SP.exe,8B 47 10 48 8B 5C 24 50 48 8B)
aobscanmodule(_MediKits,CoD_SP.exe,8B 48 04 03 4F 14)
aobscanmodule(_Grenades,CoD_SP.exe,45 8B AE A4 06 00 00)
alloc(newmemTP,$1000,CoD_SP.exe)
alloc(newmemGM,$1000,CoD_SP.exe)
alloc(newmemNR,$1000,CoD_SP.exe)
alloc(newmemUA,$1000,CoD_SP.exe)
alloc(newmemMK,$1000,CoD_SP.exe)
alloc(newmemUG,$1000,CoD_SP.exe)
alloc(_SavePosition,8)
alloc(_LoadPosition,8)
alloc(_UndoPosition,8)
alloc(_X_Coord,8)
alloc(_Y_Coord,8)
alloc(_Z_Coord,8)
alloc(_X_Coord_Undo,8)
alloc(_Y_Coord_Undo,8)
alloc(_Z_Coord_Undo,8)
alloc(_enableGodMode,8)
alloc(_enableNoReload,8)
alloc(_enableUnlAmmo,8)
alloc(_enableUnlMediKits,8)
alloc(_enableUnlGrenades,8)
registersymbol(_Teleport)
registersymbol(_SavePosition)
registersymbol(_LoadPosition)
registersymbol(_UndoPosition)
registersymbol(_X_Coord)
registersymbol(_Y_Coord)
registersymbol(_Z_Coord)
registersymbol(_X_Coord_Undo)
registersymbol(_Y_Coord_Undo)
registersymbol(_Z_Coord_Undo)
registersymbol(_GodMode)
registersymbol(_enableGodMode)
registersymbol(_NoReload)
registersymbol(_enableNoReload)
registersymbol(_enableUnlAmmo)
registersymbol(_Ammo)
registersymbol(_enableUnlMediKits)
registersymbol(_MediKits)
registersymbol(_enableUnlGrenades)
registersymbol(_Grenades)
label(codeTP)
label(returnTP)
label(Save)
label(Load)
label(Undo)
label(codeGM)
label(returnGM)
label(codeNR)
label(returnNR)
label(codeUA)
label(returnUA)
label(codeMK)
label(returnMK)
label(codeUG)
label(returnUG)



newmemTP:
cmp byte ptr [_SavePosition],1
je Save
cmp byte ptr [_LoadPosition],1
je Load
cmp byte ptr [_UndoPosition],1
je Undo
jmp codeTP

Save:
mov [_SavePosition],0
push rdx
mov rdx,[rax+00000090]
mov [_X_Coord],rdx
mov rdx,[rax+00000094]
mov [_Y_Coord],rdx
mov rdx,[rax+00000098]
mov [_Z_Coord],rdx
pop rdx
jmp codeTP

Load:
mov [_LoadPosition],0
push rbx
mov rbx,[rax+00000090]
mov [_X_Coord_Undo],rbx
mov rbx,[rax+00000094]
mov [_Y_Coord_Undo],rbx
mov rbx,[rax+00000098]
mov [_Z_Coord_Undo],rbx
pop rbx

push rdx
mov rdx,[_X_Coord]
mov [rax+00000090],rdx
mov rdx,[_Y_Coord]
mov [rax+00000094],rdx
mov rdx,[_Z_Coord]
mov [rax+00000098],rdx
pop rdx
jmp codeTP

Undo:
mov [_UndoPosition],0
push rbx
mov rbx,[_X_Coord_Undo]
mov [rax+00000090],rbx
mov rbx,[_Y_Coord_Undo]
mov [rax+00000094],rbx
mov rbx,[_Z_Coord_Undo]
mov [rax+00000098],rbx
pop rbx
jmp codeTP


codeTP:
  movss xmm0,[rax+00000090]
  jmp returnTP

newmemGM:
cmp [_enableGodMode],1
jne codeGM
mov [rdi+0000022C],#999

codeGM:
  mov eax,[rdi+0000022C]
  jmp returnGM

newmemNR:
cmp [_enableNoReload],1
jne codeNR
mov [rsi+000006A4],#999
codeNR:
  cmp dword ptr [rsi+r14*4+000006A4],00
  jmp returnNR

newmemUA:
cmp [_enableUnlAmmo],1
jne codeUA
mov [rdi+10],#999
codeUA:
  mov eax,[rdi+10]
  mov rbx,[rsp+50]
  jmp returnUA

newmemMK:
cmp byte ptr [_enableUnlMediKits],1
jne codeMK
mov [rax+04],#100
codeMK:
  mov ecx,[rax+04]
  add ecx,[rdi+14]
  jmp returnMK

newmemUG:
cmp dword ptr [_enableUnlGrenades],1
jne codeUG
mov [r14+000006A4],#99
codeUG:
  mov r13d,[r14+000006A4]
  jmp returnUG

_Teleport:
  jmp newmemTP
  nop
  nop
  nop
returnTP:

_GodMode:
  jmp newmemGM
  nop
returnGM:

_NoReload:
  jmp newmemNR
  nop
  nop
  nop
  nop
returnNR:

_Ammo:
  jmp newmemUA
  nop
  nop
  nop
returnUA:

_MediKits:
  jmp newmemMK
  nop
returnMK:

_Grenades:
  jmp newmemUG
  nop
  nop
returnUG:

_SavePosition:
dd 0
_LoadPosition:
dd 0
_UndoPosition:
dd 0
_X_Coord:
dq 0
_Y_Coord:
dq 0
_Z_Coord:
dq 0
_X_Coord_Undo:
dq 0
_Y_Coord_Undo:
dq 0
_Z_Coord_Undo:
dq 0
_enableGodMode:
dd 0
_enableNoReload:
dd 0
_enableUnlAmmo:
dd 0
_enableUnlMediKits:
dd 0
_enableUnlGrenades:
dd 0




[DISABLE]
//code from here till the end of the code will be used to disable the cheat
_Teleport:
  db F3 0F 10 80 90 00 00 00
_GodMode:
  db 8B 87 2C 02 00 00
_NoReload:
  db 42 83 BC B6 A4 06 00 00 00
_Ammo:
  db 8B 47 10 48 8B 5C 24 50
_MediKits:
  db 8B 48 04 03 4F 14
_Grenades:
  db 45 8B AE A4 06 00 00



unregistersymbol(_Teleport)
unregistersymbol(_SavePosition)
unregistersymbol(_LoadPosition)
unregistersymbol(_UndoPosition)
unregistersymbol(_X_Coord)
unregistersymbol(_Y_Coord)
unregistersymbol(_Z_Coord)
unregistersymbol(_X_Coord_Undo)
unregistersymbol(_Y_Coord_Undo)
unregistersymbol(_Z_Coord_Undo)
unregistersymbol(_GodMode)
unregistersymbol(_enableGodMode)
unregistersymbol(_NoReload)
unregistersymbol(_enableNoReload)
unregistersymbol(_Ammo)
unregistersymbol(_enableUnlAmmo)
unregistersymbol(_MediKits)
unregistersymbol(_enableUnlMediKits)
unregistersymbol(_Grenades)
unregistersymbol(_enableUnlGrenades)
dealloc(_SavePosition)
dealloc(_LoadPosition)
dealloc(_UndoPosition)
dealloc(_X_Coord)
dealloc(_Y_Coord)
dealloc(_Z_Coord)
dealloc(_X_Coord_Undo)
dealloc(_Y_Coord_Undo)
dealloc(_Z_Coord_Undo)
dealloc(newmemTP)
dealloc(newmemGM)
dealloc(_enableGodMode)
dealloc(_enableNoReload)
dealloc(newmemNR)
dealloc(newmemUA)
dealloc(_enableUnlAmmo)
dealloc(_enableUnlMediKits)
dealloc(newmemMK)
dealloc(newmemUG)
dealloc(_enableUnlGrenades)

{
// ORIGINAL CODE - INJECTION POINT: "CoD_SP.exe"+5D72C1

"CoD_SP.exe"+5D7294: 66 3B CA                 -  cmp cx,dx
"CoD_SP.exe"+5D7297: 74 28                    -  je CoD_SP.exe+5D72C1
"CoD_SP.exe"+5D7299: 48 0F BF C1              -  movsx rax,cx
"CoD_SP.exe"+5D729D: 48 8D 0D C4 54 CA 07     -  lea rcx,[CoD_SP.exe+827C768]
"CoD_SP.exe"+5D72A4: 48 C1 E0 0A              -  shl rax,0A
"CoD_SP.exe"+5D72A8: F3 0F 10 04 08           -  movss xmm0,[rax+rcx]
"CoD_SP.exe"+5D72AD: F3 0F 10 4C 08 04        -  movss xmm1,[rax+rcx+04]
"CoD_SP.exe"+5D72B3: F3 0F 11 44 24 20        -  movss [rsp+20],xmm0
"CoD_SP.exe"+5D72B9: F3 0F 10 44 08 08        -  movss xmm0,[rax+rcx+08]
"CoD_SP.exe"+5D72BF: EB 26                    -  jmp CoD_SP.exe+5D72E7
// ---------- INJECTING HERE ----------
"CoD_SP.exe"+5D72C1: F3 0F 10 80 90 00 00 00  -  movss xmm0,[rax+00000090]
// ---------- DONE INJECTING  ----------
"CoD_SP.exe"+5D72C9: F3 0F 10 88 94 00 00 00  -  movss xmm1,[rax+00000094]
"CoD_SP.exe"+5D72D1: F3 0F 11 44 24 20        -  movss [rsp+20],xmm0
"CoD_SP.exe"+5D72D7: F3 0F 10 80 98 00 00 00  -  movss xmm0,[rax+00000098]
"CoD_SP.exe"+5D72DF: F3 0F 58 80 C0 01 00 00  -  addss xmm0,[rax+000001C0]
"CoD_SP.exe"+5D72E7: F3 0F 11 44 24 28        -  movss [rsp+28],xmm0
"CoD_SP.exe"+5D72ED: BF 01 00 00 00           -  mov edi,00000001
"CoD_SP.exe"+5D72F2: F3 0F 11 4C 24 24        -  movss [rsp+24],xmm1
"CoD_SP.exe"+5D72F8: E8 F3 FD FF FF           -  call CoD_SP.exe+5D70F0
"CoD_SP.exe"+5D72FD: 8B F0                    -  mov esi,eax
"CoD_SP.exe"+5D72FF: 85 C0                    -  test eax,eax
}
Player Size:
[ENABLE]

aobscanmodule(_PlayerSize,CoD_SP.exe,F3 0F 10 83 C0 01 00 00 F3) // should be unique
aobscanmodule(_BypassPlayerSizeReset,CoD_SP.exe,F3 0F 11 83 C0 01 00 00 39)
alloc(newmemSize,$1000,CoD_SP.exe)

alloc(_ValueToAdd,8)
alloc(_IncPlayerSize,8)
alloc(_DecPlayerSize,8)
alloc(_ResPlayerSize,8)
registersymbol(_PlayerSize)
registersymbol(_IncPlayerSize)
registersymbol(_DecPlayerSize)
registersymbol(_ResPlayerSize)
registersymbol(_ValueToAdd)
registersymbol(_BypassPlayerSizeReset)
label(codeSize)
label(returnSize)
label(IncPlayer)
label(DecPlayer)
label(ResPlayer)

newmemSize:
cmp byte ptr [_IncPlayerSize],1
je IncPlayer
cmp byte ptr [_DecPlayerSize],1
je DecPlayer
cmp byte ptr [_ResPlayerSize],1
je ResPlayer
jmp codeSize

IncPlayer:
mov [_IncPlayerSize],0
fld [rbx+000001C0]
fld [_ValueToAdd]
faddp
fstp [rbx+000001C0]
jmp codeSize

DecPlayer:
mov [_DecPlayerSize],0
fld [rbx+000001C0]
fld [_ValueToAdd]
fsubp
fstp [rbx+000001C0]
jmp codeSize

ResPlayer:
mov [_ResPlayerSize],0
mov [rbx+000001C0],(float)60
jmp codeSize

codeSize:
  movss xmm0,[rbx+000001C0]
  jmp returnSize

_BypassPlayerSizeReset:
  db 90 90 90 90 90 90 90 90

_PlayerSize:
  jmp newmemSize
  nop
  nop
  nop
returnSize:



_ValueToAdd:
dq (float)50
_IncPlayerSize:
dd 0
_DecPlayerSize:
dd 0
_ResPlayerSize:
dd 0
[DISABLE]

_PlayerSize:
  db F3 0F 10 83 C0 01 00 00
_BypassPlayerSizeReset:
  db F3 0F 11 83 C0 01 00 00
unregistersymbol(_PlayerSize)
unregistersymbol(_IncPlayerSize)
unregistersymbol(_DecPlayerSize)
unregistersymbol(_ResPlayerSize)
unregistersymbol(_ValueToAdd)
unregistersymbol(_BypassPlayerSizeReset)
dealloc(newmemSize)
dealloc(_ValueToAdd)
dealloc(_IncPlayerSize)
dealloc(_DecPlayerSize)
dealloc(_ResPlayerSize)


{
// ORIGINAL CODE - INJECTION POINT: "CoD_SP.exe"+36182D

"CoD_SP.exe"+3617FC: 8B 83 90 00 00 00        -  mov eax,[rbx+00000090]
"CoD_SP.exe"+361802: 4C 8D 83 7C 03 00 00     -  lea r8,[rbx+0000037C]
"CoD_SP.exe"+361809: 89 07                    -  mov [rdi],eax
"CoD_SP.exe"+36180B: 48 8B CF                 -  mov rcx,rdi
"CoD_SP.exe"+36180E: 8B 83 94 00 00 00        -  mov eax,[rbx+00000094]
"CoD_SP.exe"+361814: 89 47 04                 -  mov [rdi+04],eax
"CoD_SP.exe"+361817: 8B 83 98 00 00 00        -  mov eax,[rbx+00000098]
"CoD_SP.exe"+36181D: 89 47 08                 -  mov [rdi+08],eax
"CoD_SP.exe"+361820: F3 0F 10 8B 90 01 00 00  -  movss xmm1,[rbx+00000190]
"CoD_SP.exe"+361828: E8 33 CF 1B 00           -  call CoD_SP.exe+51E760
// ---------- INJECTING HERE ----------
"CoD_SP.exe"+36182D: F3 0F 10 83 C0 01 00 00  -  movss xmm0,[rbx+000001C0]
// ---------- DONE INJECTING  ----------
"CoD_SP.exe"+361835: F3 0F 58 47 08           -  addss xmm0,[rdi+08]
"CoD_SP.exe"+36183A: F3 0F 11 47 08           -  movss [rdi+08],xmm0
"CoD_SP.exe"+36183F: F3 0F 58 83 D4 01 00 00  -  addss xmm0,[rbx+000001D4]
"CoD_SP.exe"+361847: F3 0F 11 47 08           -  movss [rdi+08],xmm0
"CoD_SP.exe"+36184C: E9 5C FF FF FF           -  jmp CoD_SP.exe+3617AD
"CoD_SP.exe"+361851: 81 FA 54 B5 43 D1        -  cmp edx,D143B554
"CoD_SP.exe"+361857: E9 34 68 14 00           -  jmp CoD_SP.exe+4A8090
"CoD_SP.exe"+36185C: 90                       -  nop
"CoD_SP.exe"+36185D: 3E 5D                    -  pop rbp
"CoD_SP.exe"+36185F: 62 48 83                 -  bound ecx,[rax-7D]
}
One Hit Kills WIP:
{ Game   : CoD_SP.exe
  Version:
  Date   : 2017-11-05
  Author : Schr4nzi

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(_OneHitKills,CoD_SP.exe,8B 90 2C 02 00 00) // should be unique
alloc(newmem,$1000,CoD_SP.exe)

label(code)
label(return)

newmem:
{
1f0 00015794 = enemys, 00015988 (HEX) = Crowlie
1f4 00015794 = enemys, 00015988 (HEX) = Crowlie
230 , 100 Enemys, 1000 = Crwlie
3e8, 774 = Enemys, 787 = Crrowlie
1174, 0 enemyies, 1124073472 = crowlie
1178, 0 enemyies 1109393408 = crowlie
117c, 0 enemyies, 1126694912 = crowlie
1a00, 0 enemies, 63266 = Crowlie
1e00, 0enemies, 63272 = crowlie
348, 0 = Zassman, Turner, Pierson, 1 nazi
970,0 = Zassman, Turner, Pierson,
20c, 22 = Pierson, Zassman, turner, 2 = nazis
}
//cmp dword ptr [rax+3e8],(int)787 //Crowlie
//je code
//cmp dword ptr [rax+3e8],(int)718 // Fischer
//je code
cmp dword ptr [rax+230],(int)1000 // Max Health // Buddys
je code
cmp dword ptr [rax+20c],(int)22 // Pierson, Zassman, Turner
je code
cmp dword ptr [rax+20c],(int)26 // Ressouce fighter
je code
//cmp dword ptr [rax+20c],(int)0 // RCrowlie again
//je code
mov [rax+0000022C],0
code:

  mov edx,[rax+0000022C]
  jmp return

_OneHitKills:
  jmp newmem
  nop
return:
registersymbol(_OneHitKills)

[DISABLE]

_OneHitKills:
  db 8B 90 2C 02 00 00

unregistersymbol(_OneHitKills)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "CoD_SP.exe"+310114

"CoD_SP.exe"+3100FD: 51                             -  push rcx
"CoD_SP.exe"+3100FE: EE                             -  out dx,al
"CoD_SP.exe"+3100FF: 6D                             -  insd
"CoD_SP.exe"+310100: 48 89 5C 24 08                 -  mov [rsp+08],rbx
"CoD_SP.exe"+310105: 57                             -  push rdi
"CoD_SP.exe"+310106: 48 83 EC 20                    -  sub rsp,20
"CoD_SP.exe"+31010A: 48 8B 01                       -  mov rax,[rcx]
"CoD_SP.exe"+31010D: 8B FA                          -  mov edi,edx
"CoD_SP.exe"+31010F: 33 DB                          -  xor ebx,ebx
"CoD_SP.exe"+310111: 4C 8B C9                       -  mov r9,rcx
// ---------- INJECTING HERE ----------
"CoD_SP.exe"+310114: 8B 90 2C 02 00 00              -  mov edx,[rax+0000022C]
// ---------- DONE INJECTING  ----------
"CoD_SP.exe"+31011A: 3B FA                          -  cmp edi,edx
"CoD_SP.exe"+31011C: 7C 4D                          -  jl CoD_SP.exe+31016B
"CoD_SP.exe"+31011E: 44 0F B6 91 78 26 00 00        -  movzx r10d,byte ptr [rcx+00002678]
"CoD_SP.exe"+310126: 41 F6 C2 02                    -  test r10l,02
"CoD_SP.exe"+31012A: 75 3F                          -  jne CoD_SP.exe+31016B
"CoD_SP.exe"+31012C: 38 99 C0 28 00 00              -  cmp [rcx+000028C0],bl
"CoD_SP.exe"+310132: 75 37                          -  jne CoD_SP.exe+31016B
"CoD_SP.exe"+310134: 8B CB                          -  mov ecx,ebx
"CoD_SP.exe"+310136: 66 66 0F 1F 84 00 00 00 00 00  -  nop [rax+rax+00000000]
"CoD_SP.exe"+310140: 8B C1                          -  mov eax,ecx
}
Author
l0wb1t
Downloads
13
Views
468
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from l0wb1t

Similar resources
Community Mods