Tales of Zestiria Cheat Table - God Mode +16

Tales of Zestiria Cheat Table - God Mode +16 2020-07-22

Hexui Undetected CSGO Cheats PUBG Accounts
I basically like those games in from which we learn something. Similarly, Tales of Zestria is one of those games. It is a Japanese role-playing game released in 2014 in Japan. This game was developed on a fictional continent called Glenwoodwood. The main character of this game is Sorey. He is a charming guy who grew up among seraphim. You need one hundred and fifty hours to beat this game. The game is straightforward and very easy. Moreover, performing side quests can help you unlock new skills for your character. The gameplay is incredible, and you should try this game, but it can be a bit of a grind, which is why we recommend making Tales of Zestiria even easier with Cheat Engine.

The story of the game is marvelous, and the graphics are fabulous. The visuals are excellent, and the audio is clear. There are altogether eight characters in the game, including Mikleo, who was raised with Sorey since he was born but thought of Sorey as a rival. Alisha is the prettiest. The princess of the kingdom of Hyland. Four multiplayer option is also available, which is one of the pros of this game. You can buy and sell weapons and outfits at shops across the land. Exploration added entertainment in this game. I would recommend you to play this game as it the most fantastic game of the year 2015.

Tales of Zestiria Cheat Table

Tales of Zestria can be a little complicated, and as a player, you might burden it upon yourself, overwhelmed with anxiety on performing below par. Don’t let it affect your health. The passion of gaming requires every action to be placed well, and any shortfalls might be creating such an atmosphere where you feel cracking your head on the wall. Well, these feelings will detach you from now on as the Tales of Zestira cheat table will provide you the platform to win over your rivals. Various cheats on that list like “one-hit kills,” “attack points,” “gold hack,” etc., will create a lane for you that’ll bestow you with a satisfactory outcome. Just Download it and open it with Cheat Engine.

1595459395696.png


Cheat Features

  • God Mode
  • Infinite Magic
  • Experience cheat
  • Attribute Points
  • One Hit Kills
  • Fast Level Ups
  • Attack points
  • Armor Defense
  • Sorey Magic
  • Sorey Magic Defense
  • Focus points
  • One Hit Kills
  • Gold hack
Tales of Zestira Cheat Table Scripts
Hero Stats:
[ENABLE]

aobscanmodule(health1,Tales of Zestiria.exe,8B 43 0C 52 50 56) // should be unique
alloc(newmem,$1000)
alloc(newmem,$1000)
alloc(sorey_stat,2048)
registersymbol(sorey_stat)

label(code)
label(hero)
label(return)

sorey_stat:

newmem:
cmp [ebx+1C],0
je code
cmp [ebx+2CCC],0
je hero


hero:
push ecx
mov [sorey_stat],ebx
mov ecx,[ebx+2BFC]
mov [ebx+0C],ecx
pop ecx
mov eax,[ebx+0C]
  push edx
  push eax
  jmp return

code:
  mov eax,[ebx+0C]
  push edx
  push eax
  jmp return

health1:
  jmp newmem
return:
registersymbol(health1)

[DISABLE]

health1:
  db 8B 43 0C 52 50

unregistersymbol(health1)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "Tales of Zestiria.exe"+5C1D6

"Tales of Zestiria.exe"+5C1B1: C6 44 24 1C 00           -  mov byte ptr [esp+1C],00
"Tales of Zestiria.exe"+5C1B6: 74 05                    -  je "Tales of Zestiria.exe"+5C1BD
"Tales of Zestiria.exe"+5C1B8: C6 44 24 1C 01           -  mov byte ptr [esp+1C],01
"Tales of Zestiria.exe"+5C1BD: 8B 19                    -  mov ebx,[ecx]
"Tales of Zestiria.exe"+5C1BF: D9 80 A0 05 00 00        -  fld dword ptr [eax+000005A0]
"Tales of Zestiria.exe"+5C1C5: 8B 4C 24 1C              -  mov ecx,[esp+1C]
"Tales of Zestiria.exe"+5C1C9: 51                       -  push ecx
"Tales of Zestiria.exe"+5C1CA: E8 71 60 7B 00           -  call "Tales of Zestiria.exe"+812240
"Tales of Zestiria.exe"+5C1CF: 8B 93 FC 2B 00 00        -  mov edx,[ebx+00002BFC]
"Tales of Zestiria.exe"+5C1D5: 50                       -  push eax
// ---------- INJECTING HERE ----------
"Tales of Zestiria.exe"+5C1D6: 8B 43 0C                 -  mov eax,[ebx+0C]
"Tales of Zestiria.exe"+5C1D9: 52                       -  push edx
"Tales of Zestiria.exe"+5C1DA: 50                       -  push eax
// ---------- DONE INJECTING  ----------
"Tales of Zestiria.exe"+5C1DB: 56                       -  push esi
"Tales of Zestiria.exe"+5C1DC: E8 7F 8F FF FF           -  call "Tales of Zestiria.exe"+55160
"Tales of Zestiria.exe"+5C1E1: 8B 5C 24 20              -  mov ebx,[esp+20]
"Tales of Zestiria.exe"+5C1E5: C6 46 34 00              -  mov byte ptr [esi+34],00
"Tales of Zestiria.exe"+5C1E9: 8B 47 0C                 -  mov eax,[edi+0C]
"Tales of Zestiria.exe"+5C1EC: 8B 48 2C                 -  mov ecx,[eax+2C]
"Tales of Zestiria.exe"+5C1EF: D9 40 28                 -  fld dword ptr [eax+28]
"Tales of Zestiria.exe"+5C1F2: D9 59 28                 -  fstp dword ptr [ecx+28]
"Tales of Zestiria.exe"+5C1F5: 8B 48 20                 -  mov ecx,[eax+20]
"Tales of Zestiria.exe"+5C1F8: 8B 50 24                 -  mov edx,[eax+24]
}
One Hit Kills:
[ENABLE]

aobscanmodule(att1,Tales of Zestiria.exe,8B 8E 08 2C 00 00)
alloc(newmem,$1000)
aobscanmodule(att2,Tales of Zestiria.exe,8B 80 08 2C 00 00)
alloc(newmema,$1000)

label(code)
label(return)
label(codea)
label(returna)

newmem:
cmp [esi+00002CCC],0 //EC 2/0
je code
mov [esi+00002C08],270F
mov [esi+00002C10],270F
mov ecx,[esi+00002C08]
  jmp return

code:
  mov ecx,[esi+00002C08]
  jmp return

att1:
  jmp newmem
  nop
return:
registersymbol(att1)

newmema:
cmp [eax+00002CCC],0 //EC 2/0
je codea
mov [eax+00002C08],270F
mov eax,[eax+00002C08]
  jmp returna

codea:
  mov eax,[eax+00002C08]
  jmp returna

att2:
  jmp newmema
  nop
returna:
registersymbol(att2)

[DISABLE]

att1:
  db 8B 8E 08 2C 00 00
att2:
  db 8B 80 08 2C 00 00

unregistersymbol(att2)
unregistersymbol(att1)
dealloc(newmem)
dealloc(newmema)

{
// ORIGINAL CODE - INJECTION POINT: "Tales of Zestiria.exe"+1202A3

"Tales of Zestiria.exe"+120298: CC                    -  int 3
"Tales of Zestiria.exe"+120299: CC                    -  int 3
"Tales of Zestiria.exe"+12029A: CC                    -  int 3
"Tales of Zestiria.exe"+12029B: CC                    -  int 3
"Tales of Zestiria.exe"+12029C: CC                    -  int 3
"Tales of Zestiria.exe"+12029D: CC                    -  int 3
"Tales of Zestiria.exe"+12029E: CC                    -  int 3
"Tales of Zestiria.exe"+12029F: CC                    -  int 3
"Tales of Zestiria.exe"+1202A0: 56                    -  push esi
"Tales of Zestiria.exe"+1202A1: 8B 30                 -  mov esi,[eax]
// ---------- INJECTING HERE ----------
"Tales of Zestiria.exe"+1202A3: 8B 8E 08 2C 00 00     -  mov ecx,[esi+00002C08]
// ---------- DONE INJECTING  ----------
"Tales of Zestiria.exe"+1202A9: B8 01 00 00 00        -  mov eax,00000001
"Tales of Zestiria.exe"+1202AE: 39 86 F8 42 00 00     -  cmp [esi+000042F8],eax
"Tales of Zestiria.exe"+1202B4: 75 1F                 -  jne "Tales of Zestiria.exe"+1202D5
"Tales of Zestiria.exe"+1202B6: 8B 15 E4 B2 12 02     -  mov edx,["Tales of Zestiria.exe"+1D2B2E4]
"Tales of Zestiria.exe"+1202BC: 8B 42 08              -  mov eax,[edx+08]
"Tales of Zestiria.exe"+1202BF: 8B 10                 -  mov edx,[eax]
"Tales of Zestiria.exe"+1202C1: 8B 14 95 B8 2C D5 00  -  mov edx,[edx*4+"Tales of Zestiria.exe"+952CB8]
"Tales of Zestiria.exe"+1202C8: 03 96 FC 42 00 00     -  add edx,[esi+000042FC]
"Tales of Zestiria.exe"+1202CE: B8 1F 85 EB 51        -  mov eax,51EB851F
"Tales of Zestiria.exe"+1202D3: EB 25                 -  jmp "Tales of Zestiria.exe"+1202FA
}
Fast Level Ups:
[ENABLE]

aobscanmodule(lvl3,Tales of Zestiria.exe,8B 46 1C 03 C1) // should be unique
alloc(newmem,$1000)

label(code)
label(1vl19_inc)
label(lcl39_inc)
label(lvl60_inc)
//label(lvl_max)
label(return)

newmem:
//cmp [esi+2CCC],00 //enable for Sorey only
//je code
cmp [esi+1C],05F5E0FF
jge code
cmp [esi+08],13
jge 1vl19_inc
add [esi+1C],2525

code:
  mov eax,[esi+1C]
  add eax,ecx
  jmp return

1vl19_inc:
cmp [esi+08],27
jge lcl39_inc
add [esi+1C],4525
mov eax,[esi+1C]
  add eax,ecx
  jmp return

lcl39_inc:
cmp [esi+08],3C
jge lvl60_inc
add [esi+1C],6525
mov eax,[esi+1C]
  add eax,ecx
  jmp return

lvl60_inc:
{cmp [esi+08],6D
jge lvl_max}
add [esi+1C],1507C
mov eax,[esi+1C]
  add eax,ecx
  jmp return

{lvl_max:
cmp [esi+08],C8
jge code
add [esi+1C],17D783F
mov eax,[esi+1C]
  add eax,ecx
  jmp return}




lvl3:
  jmp newmem
return:
registersymbol(lvl3)

[DISABLE]

lvl3:
  db 8B 46 1C 03 C1

unregistersymbol(lvl3)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "Tales of Zestiria.exe"+11F1CE

"Tales of Zestiria.exe"+11F1BE: CC                    -  int 3
"Tales of Zestiria.exe"+11F1BF: CC                    -  int 3
"Tales of Zestiria.exe"+11F1C0: 55                    -  push ebp
"Tales of Zestiria.exe"+11F1C1: 8B EC                 -  mov ebp,esp
"Tales of Zestiria.exe"+11F1C3: 83 EC 34              -  sub esp,34
"Tales of Zestiria.exe"+11F1C6: 53                    -  push ebx
"Tales of Zestiria.exe"+11F1C7: 56                    -  push esi
"Tales of Zestiria.exe"+11F1C8: 57                    -  push edi
"Tales of Zestiria.exe"+11F1C9: 8B 7D 08              -  mov edi,[ebp+08]
"Tales of Zestiria.exe"+11F1CC: 8B 37                 -  mov esi,[edi]
// ---------- INJECTING HERE ----------
"Tales of Zestiria.exe"+11F1CE: 8B 46 1C              -  mov eax,[esi+1C]
"Tales of Zestiria.exe"+11F1D1: 03 C1                 -  add eax,ecx
// ---------- DONE INJECTING  ----------
"Tales of Zestiria.exe"+11F1D3: 89 45 CC              -  mov [ebp-34],eax
"Tales of Zestiria.exe"+11F1D6: 79 09                 -  jns "Tales of Zestiria.exe"+11F1E1
"Tales of Zestiria.exe"+11F1D8: C7 45 F0 00 00 00 00  -  mov [ebp-10],00000000
"Tales of Zestiria.exe"+11F1DF: EB 11                 -  jmp "Tales of Zestiria.exe"+11F1F2
"Tales of Zestiria.exe"+11F1E1: C7 45 F0 FF E0 F5 05  -  mov [ebp-10],05F5E0FF
"Tales of Zestiria.exe"+11F1E8: 3D FF E0 F5 05        -  cmp eax,05F5E0FF
"Tales of Zestiria.exe"+11F1ED: 7F 03                 -  jg "Tales of Zestiria.exe"+11F1F2
"Tales of Zestiria.exe"+11F1EF: 89 45 F0              -  mov [ebp-10],eax
"Tales of Zestiria.exe"+11F1F2: 8B 5E 08              -  mov ebx,[esi+08]
"Tales of Zestiria.exe"+11F1F5: 8B 15 AC D2 12 02     -  mov edx,["Tales of Zestiria.exe"+1D2D2AC]
}
  • Like
Reactions: Kleon742
Author
ChrisFayte
Downloads
2
Views
131
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from ChrisFayte

Community Mods