Resource icon

Disneyland Adventures Cheats 2020-07-23

Hexui Undetected CSGO Cheats PUBG Accounts
Disneyland Adventures is a fantastic adventure game from Frontier Developments, Asobo Studio. It allows fans of all ages to explore Disneyland park, enjoy adventures based on 18 popular attractions, engage in 100 challenging quests, and interact with 35 beloved characters. It is your ticket to the magical world of Disneyland right in your living room.

Take a journey where stories come to life and dreams come true, right in your living room. Explore Disneyland park from Main Street U.S.A. to Critter Country, join Peter Pan to battle Captain Hook, high-five Mickey Mouse or hug Snow White. Step into adventures based on attractions, engages in challenging quests and interact with beloved Disney characters.​

Fly with Peter Pan and defeat Captain Hook in Peter Pan’s Flight and ski the exhilarating slopes of the Matterhorn. Share magical moments with your favorite Disney characters, hug your favorite princess, collect autographs, and accept quests. If you get stuck in the game, check out the video walkthrough and gameplay for the game.​

Disneyland Adventures Cheats
This is a smaller cheat table, but it allows you lookup your experience address and change it, along with a simple gold cheat.

1595545462287.png


Cheat Trainer Features
  • Gold cheat
  • experience hack
Cheat Engine Scripts
XP lookup:
{ Game   : Disney.exe
  Version:
  Date   : 2018-09-15
  Author : ChrisPC

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(xp_lookup,Disney.exe,49 8B 06 49 89 04 24) // should be unique
alloc(newmem,$1000,"Disney.exe"+58C176)

label(code)
label(return)
label(xp_flag)
label(xp_addr)
label(xp_addy)
registersymbol(xp_addy)
registersymbol(xp_flag)

newmem:
cmp [xp_flag],1
je xp_addr
jmp code

xp_addr:
mov [xp_flag],0
push rbx
mov rbx,["Disney.exe"+00AE0FA8]
cmp rbx,0
je code
mov rbx,[rbx+560]
cmp rbx,0
je code
mov rbx,[rbx+18]
cmp rbx,0
je code
mov rbx,[rbx+378]
cmp rbx,0
je code
mov rbx,[rbx+20]
cmp rbx,0
je code
lea rbx,[rbx+150]
cmp rbx,0
je code
mov qword ptr [xp_addy],rbx
pop rbx

code:
  mov rax,[r14]
  mov [r12],rax
  jmp return



  xp_flag:
  dq 0

  xp_addy:
  dq 0



xp_lookup:
  jmp newmem
  nop
  nop
return:
registersymbol(xp_lookup)

[DISABLE]

xp_lookup:
  db 49 8B 06 49 89 04 24

unregistersymbol(xp_lookup)
unregistersymbol(xp_addy)
unregistersymbol(xp_flag)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "Disney.exe"+58C176

"Disney.exe"+58C154: 74 20                 -  je Disney.exe+58C176
"Disney.exe"+58C156: F6 41 0A 01           -  test byte ptr [rcx+0A],01
"Disney.exe"+58C15A: 75 1A                 -  jne Disney.exe+58C176
"Disney.exe"+58C15C: 4C 8B 45 20           -  mov r8,[rbp+20]
"Disney.exe"+58C160: 33 D2                 -  xor edx,edx
"Disney.exe"+58C162: 4D 8B 80 18 02 00 00  -  mov r8,[r8+00000218]
"Disney.exe"+58C169: E8 B2 86 FF FF        -  call Disney.exe+584820
"Disney.exe"+58C16E: 48 8B D8              -  mov rbx,rax
"Disney.exe"+58C171: 48 85 C0              -  test rax,rax
"Disney.exe"+58C174: 75 44                 -  jne Disney.exe+58C1BA
// ---------- INJECTING HERE ----------
"Disney.exe"+58C176: 49 8B 06              -  mov rax,[r14]
"Disney.exe"+58C179: 49 89 04 24           -  mov [r12],rax
// ---------- DONE INJECTING  ----------
"Disney.exe"+58C17D: 49 8B 46 08           -  mov rax,[r14+08]
"Disney.exe"+58C181: 49 89 44 24 08        -  mov [r12+08],rax
"Disney.exe"+58C186: 41 8B 46 10           -  mov eax,[r14+10]
"Disney.exe"+58C18A: 41 89 44 24 10        -  mov [r12+10],eax
"Disney.exe"+58C18F: EB 64                 -  jmp Disney.exe+58C1F5
"Disney.exe"+58C191: 45 33 C0              -  xor r8d,r8d
"Disney.exe"+58C194: 48 8B D7              -  mov rdx,rdi
"Disney.exe"+58C197: 48 8B CD              -  mov rcx,rbp
"Disney.exe"+58C19A: E8 C1 86 FF FF        -  call Disney.exe+584860
"Disney.exe"+58C19F: 48 8B D8              -  mov rbx,rax
}
gold lookup:
{ Game   : Disney.exe
  Version:
  Date   : 2018-09-15
  Author : ChrisPC

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(gold1,Disney.exe,49 89 07 49 8B 44 24 08 49 89 47 08 41) // should be unique
alloc(newmem,$1000,"Disney.exe"+58C344)


label(code)
label(return)
label(gold)
registersymbol(gold)



newmem:
cmp [r15+2C],7FF6
jne code
cmp [r15+3C],00
jne code
cmp [r15+10],00
je code
cmp [r15+04],0
je code
cmp [r15+08],0
jne code
cmp [r15+58],0
je code
cmp [r15+0C],0
jne code
cmp [r15],(float)100
jle code
cmp [r15],(float)9999999
jg code
mov [gold],r15

code:
  mov [r15],rax
  mov rax,[r12+08]
  jmp return

gold:
  dq 0

gold1:
  jmp newmem
  nop
  nop
  nop
return:
registersymbol(gold1)

[DISABLE]

gold1:
  db 49 89 07 49 8B 44 24 08

unregistersymbol(gold1)
unregistersymbol(gold)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "Disney.exe"+58C344

"Disney.exe"+58C31D: F6 41 0A 02           -  test byte ptr [rcx+0A],02
"Disney.exe"+58C321: 75 1D                 -  jne Disney.exe+58C340
"Disney.exe"+58C323: 4C 8B 46 20           -  mov r8,[rsi+20]
"Disney.exe"+58C327: BA 01 00 00 00        -  mov edx,00000001
"Disney.exe"+58C32C: 4D 8B 80 20 02 00 00  -  mov r8,[r8+00000220]
"Disney.exe"+58C333: E8 E8 84 FF FF        -  call Disney.exe+584820
"Disney.exe"+58C338: 48 8B D8              -  mov rbx,rax
"Disney.exe"+58C33B: 48 85 C0              -  test rax,rax
"Disney.exe"+58C33E: 75 6B                 -  jne Disney.exe+58C3AB
"Disney.exe"+58C340: 49 8B 04 24           -  mov rax,[r12]
// ---------- INJECTING HERE ----------
"Disney.exe"+58C344: 49 89 07              -  mov [r15],rax
"Disney.exe"+58C347: 49 8B 44 24 08        -  mov rax,[r12+08]
// ---------- DONE INJECTING  ----------
"Disney.exe"+58C34C: 49 89 47 08           -  mov [r15+08],rax
"Disney.exe"+58C350: 41 8B 44 24 10        -  mov eax,[r12+10]
"Disney.exe"+58C355: 41 89 47 10           -  mov [r15+10],eax
"Disney.exe"+58C359: 41 83 7C 24 10 06     -  cmp dword ptr [r12+10],06
"Disney.exe"+58C35F: 0F 8C 83 00 00 00     -  jl Disney.exe+58C3E8
"Disney.exe"+58C365: 49 8B 04 24           -  mov rax,[r12]
"Disney.exe"+58C369: F6 40 09 03           -  test byte ptr [rax+09],03
"Disney.exe"+58C36D: 74 79                 -  je Disney.exe+58C3E8
"Disney.exe"+58C36F: F6 45 09 04           -  test byte ptr [rbp+09],04
"Disney.exe"+58C373: 74 73                 -  je Disney.exe+58C3E8
}
  • Like
Reactions: FalseP
Author
ChrisFayte
Downloads
3
Views
197
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from ChrisFayte

Community Mods