Disneyland Adventures is a fantastic adventure game from Frontier Developments, Asobo Studio. It allows fans of all ages to explore Disneyland park, enjoy adventures based on 18 popular attractions, engage in 100 challenging quests, and interact with 35 beloved characters. It is your ticket to the magical world of Disneyland right in your living room.
Disneyland Adventures Cheats
This is a smaller cheat table, but it allows you lookup your experience address and change it, along with a simple gold cheat.
Cheat Trainer Features
Take a journey where stories come to life and dreams come true, right in your living room. Explore Disneyland park from Main Street U.S.A. to Critter Country, join Peter Pan to battle Captain Hook, high-five Mickey Mouse or hug Snow White. Step into adventures based on attractions, engages in challenging quests and interact with beloved Disney characters.
Fly with Peter Pan and defeat Captain Hook in Peter Pan’s Flight and ski the exhilarating slopes of the Matterhorn. Share magical moments with your favorite Disney characters, hug your favorite princess, collect autographs, and accept quests. If you get stuck in the game, check out the video walkthrough and gameplay for the game.
Disneyland Adventures Cheats
This is a smaller cheat table, but it allows you lookup your experience address and change it, along with a simple gold cheat.
Cheat Trainer Features
- Gold cheat
- experience hack
XP lookup:
{ Game : Disney.exe
Version:
Date : 2018-09-15
Author : ChrisPC
This script does blah blah blah
}
[ENABLE]
aobscanmodule(xp_lookup,Disney.exe,49 8B 06 49 89 04 24) // should be unique
alloc(newmem,$1000,"Disney.exe"+58C176)
label(code)
label(return)
label(xp_flag)
label(xp_addr)
label(xp_addy)
registersymbol(xp_addy)
registersymbol(xp_flag)
newmem:
cmp [xp_flag],1
je xp_addr
jmp code
xp_addr:
mov [xp_flag],0
push rbx
mov rbx,["Disney.exe"+00AE0FA8]
cmp rbx,0
je code
mov rbx,[rbx+560]
cmp rbx,0
je code
mov rbx,[rbx+18]
cmp rbx,0
je code
mov rbx,[rbx+378]
cmp rbx,0
je code
mov rbx,[rbx+20]
cmp rbx,0
je code
lea rbx,[rbx+150]
cmp rbx,0
je code
mov qword ptr [xp_addy],rbx
pop rbx
code:
mov rax,[r14]
mov [r12],rax
jmp return
xp_flag:
dq 0
xp_addy:
dq 0
xp_lookup:
jmp newmem
nop
nop
return:
registersymbol(xp_lookup)
[DISABLE]
xp_lookup:
db 49 8B 06 49 89 04 24
unregistersymbol(xp_lookup)
unregistersymbol(xp_addy)
unregistersymbol(xp_flag)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "Disney.exe"+58C176
"Disney.exe"+58C154: 74 20 - je Disney.exe+58C176
"Disney.exe"+58C156: F6 41 0A 01 - test byte ptr [rcx+0A],01
"Disney.exe"+58C15A: 75 1A - jne Disney.exe+58C176
"Disney.exe"+58C15C: 4C 8B 45 20 - mov r8,[rbp+20]
"Disney.exe"+58C160: 33 D2 - xor edx,edx
"Disney.exe"+58C162: 4D 8B 80 18 02 00 00 - mov r8,[r8+00000218]
"Disney.exe"+58C169: E8 B2 86 FF FF - call Disney.exe+584820
"Disney.exe"+58C16E: 48 8B D8 - mov rbx,rax
"Disney.exe"+58C171: 48 85 C0 - test rax,rax
"Disney.exe"+58C174: 75 44 - jne Disney.exe+58C1BA
// ---------- INJECTING HERE ----------
"Disney.exe"+58C176: 49 8B 06 - mov rax,[r14]
"Disney.exe"+58C179: 49 89 04 24 - mov [r12],rax
// ---------- DONE INJECTING ----------
"Disney.exe"+58C17D: 49 8B 46 08 - mov rax,[r14+08]
"Disney.exe"+58C181: 49 89 44 24 08 - mov [r12+08],rax
"Disney.exe"+58C186: 41 8B 46 10 - mov eax,[r14+10]
"Disney.exe"+58C18A: 41 89 44 24 10 - mov [r12+10],eax
"Disney.exe"+58C18F: EB 64 - jmp Disney.exe+58C1F5
"Disney.exe"+58C191: 45 33 C0 - xor r8d,r8d
"Disney.exe"+58C194: 48 8B D7 - mov rdx,rdi
"Disney.exe"+58C197: 48 8B CD - mov rcx,rbp
"Disney.exe"+58C19A: E8 C1 86 FF FF - call Disney.exe+584860
"Disney.exe"+58C19F: 48 8B D8 - mov rbx,rax
}
gold lookup:
{ Game : Disney.exe
Version:
Date : 2018-09-15
Author : ChrisPC
This script does blah blah blah
}
[ENABLE]
aobscanmodule(gold1,Disney.exe,49 89 07 49 8B 44 24 08 49 89 47 08 41) // should be unique
alloc(newmem,$1000,"Disney.exe"+58C344)
label(code)
label(return)
label(gold)
registersymbol(gold)
newmem:
cmp [r15+2C],7FF6
jne code
cmp [r15+3C],00
jne code
cmp [r15+10],00
je code
cmp [r15+04],0
je code
cmp [r15+08],0
jne code
cmp [r15+58],0
je code
cmp [r15+0C],0
jne code
cmp [r15],(float)100
jle code
cmp [r15],(float)9999999
jg code
mov [gold],r15
code:
mov [r15],rax
mov rax,[r12+08]
jmp return
gold:
dq 0
gold1:
jmp newmem
nop
nop
nop
return:
registersymbol(gold1)
[DISABLE]
gold1:
db 49 89 07 49 8B 44 24 08
unregistersymbol(gold1)
unregistersymbol(gold)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "Disney.exe"+58C344
"Disney.exe"+58C31D: F6 41 0A 02 - test byte ptr [rcx+0A],02
"Disney.exe"+58C321: 75 1D - jne Disney.exe+58C340
"Disney.exe"+58C323: 4C 8B 46 20 - mov r8,[rsi+20]
"Disney.exe"+58C327: BA 01 00 00 00 - mov edx,00000001
"Disney.exe"+58C32C: 4D 8B 80 20 02 00 00 - mov r8,[r8+00000220]
"Disney.exe"+58C333: E8 E8 84 FF FF - call Disney.exe+584820
"Disney.exe"+58C338: 48 8B D8 - mov rbx,rax
"Disney.exe"+58C33B: 48 85 C0 - test rax,rax
"Disney.exe"+58C33E: 75 6B - jne Disney.exe+58C3AB
"Disney.exe"+58C340: 49 8B 04 24 - mov rax,[r12]
// ---------- INJECTING HERE ----------
"Disney.exe"+58C344: 49 89 07 - mov [r15],rax
"Disney.exe"+58C347: 49 8B 44 24 08 - mov rax,[r12+08]
// ---------- DONE INJECTING ----------
"Disney.exe"+58C34C: 49 89 47 08 - mov [r15+08],rax
"Disney.exe"+58C350: 41 8B 44 24 10 - mov eax,[r12+10]
"Disney.exe"+58C355: 41 89 47 10 - mov [r15+10],eax
"Disney.exe"+58C359: 41 83 7C 24 10 06 - cmp dword ptr [r12+10],06
"Disney.exe"+58C35F: 0F 8C 83 00 00 00 - jl Disney.exe+58C3E8
"Disney.exe"+58C365: 49 8B 04 24 - mov rax,[r12]
"Disney.exe"+58C369: F6 40 09 03 - test byte ptr [rax+09],03
"Disney.exe"+58C36D: 74 79 - je Disney.exe+58C3E8
"Disney.exe"+58C36F: F6 45 09 04 - test byte ptr [rbp+09],04
"Disney.exe"+58C373: 74 73 - je Disney.exe+58C3E8
}