I basically like those games in from which we learn something. Similarly, Tales of Zestria is one of those games. It is a Japanese role-playing game released in 2014 in Japan. This game was developed on a fictional continent called Glenwoodwood. The main character of this game is Sorey. He is a charming guy who grew up among seraphim. You need one hundred and fifty hours to beat this game. The game is straightforward and very easy. Moreover, performing side quests can help you unlock new skills for your character. The gameplay is incredible, and you should try this game, but it can be a bit of a grind, which is why we recommend making Tales of Zestiria even easier with Cheat Engine.
The story of the game is marvelous, and the graphics are fabulous. The visuals are excellent, and the audio is clear. There are altogether eight characters in the game, including Mikleo, who was raised with Sorey since he was born but thought of Sorey as a rival. Alisha is the prettiest. The princess of the kingdom of Hyland. Four multiplayer option is also available, which is one of the pros of this game. You can buy and sell weapons and outfits at shops across the land. Exploration added entertainment in this game. I would recommend you to play this game as it the most fantastic game of the year 2015.
Tales of Zestiria Cheat Table
Tales of Zestria can be a little complicated, and as a player, you might burden it upon yourself, overwhelmed with anxiety on performing below par. Don’t let it affect your health. The passion of gaming requires every action to be placed well, and any shortfalls might be creating such an atmosphere where you feel cracking your head on the wall. Well, these feelings will detach you from now on as the Tales of Zestira cheat table will provide you the platform to win over your rivals. Various cheats on that list like “one-hit kills,” “attack points,” “gold hack,” etc., will create a lane for you that’ll bestow you with a satisfactory outcome. Just Download it and open it with Cheat Engine.
Cheat Features
The story of the game is marvelous, and the graphics are fabulous. The visuals are excellent, and the audio is clear. There are altogether eight characters in the game, including Mikleo, who was raised with Sorey since he was born but thought of Sorey as a rival. Alisha is the prettiest. The princess of the kingdom of Hyland. Four multiplayer option is also available, which is one of the pros of this game. You can buy and sell weapons and outfits at shops across the land. Exploration added entertainment in this game. I would recommend you to play this game as it the most fantastic game of the year 2015.
Tales of Zestiria Cheat Table
Tales of Zestria can be a little complicated, and as a player, you might burden it upon yourself, overwhelmed with anxiety on performing below par. Don’t let it affect your health. The passion of gaming requires every action to be placed well, and any shortfalls might be creating such an atmosphere where you feel cracking your head on the wall. Well, these feelings will detach you from now on as the Tales of Zestira cheat table will provide you the platform to win over your rivals. Various cheats on that list like “one-hit kills,” “attack points,” “gold hack,” etc., will create a lane for you that’ll bestow you with a satisfactory outcome. Just Download it and open it with Cheat Engine.
Cheat Features
- God Mode
- Infinite Magic
- Experience cheat
- Attribute Points
- One Hit Kills
- Fast Level Ups
- Attack points
- Armor Defense
- Sorey Magic
- Sorey Magic Defense
- Focus points
- One Hit Kills
- Gold hack
Hero Stats:
[ENABLE]
aobscanmodule(health1,Tales of Zestiria.exe,8B 43 0C 52 50 56) // should be unique
alloc(newmem,$1000)
alloc(newmem,$1000)
alloc(sorey_stat,2048)
registersymbol(sorey_stat)
label(code)
label(hero)
label(return)
sorey_stat:
newmem:
cmp [ebx+1C],0
je code
cmp [ebx+2CCC],0
je hero
hero:
push ecx
mov [sorey_stat],ebx
mov ecx,[ebx+2BFC]
mov [ebx+0C],ecx
pop ecx
mov eax,[ebx+0C]
push edx
push eax
jmp return
code:
mov eax,[ebx+0C]
push edx
push eax
jmp return
health1:
jmp newmem
return:
registersymbol(health1)
[DISABLE]
health1:
db 8B 43 0C 52 50
unregistersymbol(health1)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "Tales of Zestiria.exe"+5C1D6
"Tales of Zestiria.exe"+5C1B1: C6 44 24 1C 00 - mov byte ptr [esp+1C],00
"Tales of Zestiria.exe"+5C1B6: 74 05 - je "Tales of Zestiria.exe"+5C1BD
"Tales of Zestiria.exe"+5C1B8: C6 44 24 1C 01 - mov byte ptr [esp+1C],01
"Tales of Zestiria.exe"+5C1BD: 8B 19 - mov ebx,[ecx]
"Tales of Zestiria.exe"+5C1BF: D9 80 A0 05 00 00 - fld dword ptr [eax+000005A0]
"Tales of Zestiria.exe"+5C1C5: 8B 4C 24 1C - mov ecx,[esp+1C]
"Tales of Zestiria.exe"+5C1C9: 51 - push ecx
"Tales of Zestiria.exe"+5C1CA: E8 71 60 7B 00 - call "Tales of Zestiria.exe"+812240
"Tales of Zestiria.exe"+5C1CF: 8B 93 FC 2B 00 00 - mov edx,[ebx+00002BFC]
"Tales of Zestiria.exe"+5C1D5: 50 - push eax
// ---------- INJECTING HERE ----------
"Tales of Zestiria.exe"+5C1D6: 8B 43 0C - mov eax,[ebx+0C]
"Tales of Zestiria.exe"+5C1D9: 52 - push edx
"Tales of Zestiria.exe"+5C1DA: 50 - push eax
// ---------- DONE INJECTING ----------
"Tales of Zestiria.exe"+5C1DB: 56 - push esi
"Tales of Zestiria.exe"+5C1DC: E8 7F 8F FF FF - call "Tales of Zestiria.exe"+55160
"Tales of Zestiria.exe"+5C1E1: 8B 5C 24 20 - mov ebx,[esp+20]
"Tales of Zestiria.exe"+5C1E5: C6 46 34 00 - mov byte ptr [esi+34],00
"Tales of Zestiria.exe"+5C1E9: 8B 47 0C - mov eax,[edi+0C]
"Tales of Zestiria.exe"+5C1EC: 8B 48 2C - mov ecx,[eax+2C]
"Tales of Zestiria.exe"+5C1EF: D9 40 28 - fld dword ptr [eax+28]
"Tales of Zestiria.exe"+5C1F2: D9 59 28 - fstp dword ptr [ecx+28]
"Tales of Zestiria.exe"+5C1F5: 8B 48 20 - mov ecx,[eax+20]
"Tales of Zestiria.exe"+5C1F8: 8B 50 24 - mov edx,[eax+24]
}
One Hit Kills:
[ENABLE]
aobscanmodule(att1,Tales of Zestiria.exe,8B 8E 08 2C 00 00)
alloc(newmem,$1000)
aobscanmodule(att2,Tales of Zestiria.exe,8B 80 08 2C 00 00)
alloc(newmema,$1000)
label(code)
label(return)
label(codea)
label(returna)
newmem:
cmp [esi+00002CCC],0 //EC 2/0
je code
mov [esi+00002C08],270F
mov [esi+00002C10],270F
mov ecx,[esi+00002C08]
jmp return
code:
mov ecx,[esi+00002C08]
jmp return
att1:
jmp newmem
nop
return:
registersymbol(att1)
newmema:
cmp [eax+00002CCC],0 //EC 2/0
je codea
mov [eax+00002C08],270F
mov eax,[eax+00002C08]
jmp returna
codea:
mov eax,[eax+00002C08]
jmp returna
att2:
jmp newmema
nop
returna:
registersymbol(att2)
[DISABLE]
att1:
db 8B 8E 08 2C 00 00
att2:
db 8B 80 08 2C 00 00
unregistersymbol(att2)
unregistersymbol(att1)
dealloc(newmem)
dealloc(newmema)
{
// ORIGINAL CODE - INJECTION POINT: "Tales of Zestiria.exe"+1202A3
"Tales of Zestiria.exe"+120298: CC - int 3
"Tales of Zestiria.exe"+120299: CC - int 3
"Tales of Zestiria.exe"+12029A: CC - int 3
"Tales of Zestiria.exe"+12029B: CC - int 3
"Tales of Zestiria.exe"+12029C: CC - int 3
"Tales of Zestiria.exe"+12029D: CC - int 3
"Tales of Zestiria.exe"+12029E: CC - int 3
"Tales of Zestiria.exe"+12029F: CC - int 3
"Tales of Zestiria.exe"+1202A0: 56 - push esi
"Tales of Zestiria.exe"+1202A1: 8B 30 - mov esi,[eax]
// ---------- INJECTING HERE ----------
"Tales of Zestiria.exe"+1202A3: 8B 8E 08 2C 00 00 - mov ecx,[esi+00002C08]
// ---------- DONE INJECTING ----------
"Tales of Zestiria.exe"+1202A9: B8 01 00 00 00 - mov eax,00000001
"Tales of Zestiria.exe"+1202AE: 39 86 F8 42 00 00 - cmp [esi+000042F8],eax
"Tales of Zestiria.exe"+1202B4: 75 1F - jne "Tales of Zestiria.exe"+1202D5
"Tales of Zestiria.exe"+1202B6: 8B 15 E4 B2 12 02 - mov edx,["Tales of Zestiria.exe"+1D2B2E4]
"Tales of Zestiria.exe"+1202BC: 8B 42 08 - mov eax,[edx+08]
"Tales of Zestiria.exe"+1202BF: 8B 10 - mov edx,[eax]
"Tales of Zestiria.exe"+1202C1: 8B 14 95 B8 2C D5 00 - mov edx,[edx*4+"Tales of Zestiria.exe"+952CB8]
"Tales of Zestiria.exe"+1202C8: 03 96 FC 42 00 00 - add edx,[esi+000042FC]
"Tales of Zestiria.exe"+1202CE: B8 1F 85 EB 51 - mov eax,51EB851F
"Tales of Zestiria.exe"+1202D3: EB 25 - jmp "Tales of Zestiria.exe"+1202FA
}
Fast Level Ups:
[ENABLE]
aobscanmodule(lvl3,Tales of Zestiria.exe,8B 46 1C 03 C1) // should be unique
alloc(newmem,$1000)
label(code)
label(1vl19_inc)
label(lcl39_inc)
label(lvl60_inc)
//label(lvl_max)
label(return)
newmem:
//cmp [esi+2CCC],00 //enable for Sorey only
//je code
cmp [esi+1C],05F5E0FF
jge code
cmp [esi+08],13
jge 1vl19_inc
add [esi+1C],2525
code:
mov eax,[esi+1C]
add eax,ecx
jmp return
1vl19_inc:
cmp [esi+08],27
jge lcl39_inc
add [esi+1C],4525
mov eax,[esi+1C]
add eax,ecx
jmp return
lcl39_inc:
cmp [esi+08],3C
jge lvl60_inc
add [esi+1C],6525
mov eax,[esi+1C]
add eax,ecx
jmp return
lvl60_inc:
{cmp [esi+08],6D
jge lvl_max}
add [esi+1C],1507C
mov eax,[esi+1C]
add eax,ecx
jmp return
{lvl_max:
cmp [esi+08],C8
jge code
add [esi+1C],17D783F
mov eax,[esi+1C]
add eax,ecx
jmp return}
lvl3:
jmp newmem
return:
registersymbol(lvl3)
[DISABLE]
lvl3:
db 8B 46 1C 03 C1
unregistersymbol(lvl3)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "Tales of Zestiria.exe"+11F1CE
"Tales of Zestiria.exe"+11F1BE: CC - int 3
"Tales of Zestiria.exe"+11F1BF: CC - int 3
"Tales of Zestiria.exe"+11F1C0: 55 - push ebp
"Tales of Zestiria.exe"+11F1C1: 8B EC - mov ebp,esp
"Tales of Zestiria.exe"+11F1C3: 83 EC 34 - sub esp,34
"Tales of Zestiria.exe"+11F1C6: 53 - push ebx
"Tales of Zestiria.exe"+11F1C7: 56 - push esi
"Tales of Zestiria.exe"+11F1C8: 57 - push edi
"Tales of Zestiria.exe"+11F1C9: 8B 7D 08 - mov edi,[ebp+08]
"Tales of Zestiria.exe"+11F1CC: 8B 37 - mov esi,[edi]
// ---------- INJECTING HERE ----------
"Tales of Zestiria.exe"+11F1CE: 8B 46 1C - mov eax,[esi+1C]
"Tales of Zestiria.exe"+11F1D1: 03 C1 - add eax,ecx
// ---------- DONE INJECTING ----------
"Tales of Zestiria.exe"+11F1D3: 89 45 CC - mov [ebp-34],eax
"Tales of Zestiria.exe"+11F1D6: 79 09 - jns "Tales of Zestiria.exe"+11F1E1
"Tales of Zestiria.exe"+11F1D8: C7 45 F0 00 00 00 00 - mov [ebp-10],00000000
"Tales of Zestiria.exe"+11F1DF: EB 11 - jmp "Tales of Zestiria.exe"+11F1F2
"Tales of Zestiria.exe"+11F1E1: C7 45 F0 FF E0 F5 05 - mov [ebp-10],05F5E0FF
"Tales of Zestiria.exe"+11F1E8: 3D FF E0 F5 05 - cmp eax,05F5E0FF
"Tales of Zestiria.exe"+11F1ED: 7F 03 - jg "Tales of Zestiria.exe"+11F1F2
"Tales of Zestiria.exe"+11F1EF: 89 45 F0 - mov [ebp-10],eax
"Tales of Zestiria.exe"+11F1F2: 8B 5E 08 - mov ebx,[esi+08]
"Tales of Zestiria.exe"+11F1F5: 8B 15 AC D2 12 02 - mov edx,["Tales of Zestiria.exe"+1D2D2AC]
}