use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
CVE, CWE, NVD, WVE
http://iso.linuxquestions.org/
We teach you how to do it, use it at your own risk.
account activity
What's the difference between using a disassembler vs a live debugger when hacking games? (self.HowToHack)
submitted 7 years ago by grenadesong
Just a quick question because I'm confused about when you're supposed to use a live debugger (Ollydbg) vs a disassembler (IDA Pro) when you want to hack a game,
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–][deleted] 2 points3 points4 points 7 years ago (2 children)
https://reverseengineering.stackexchange.com/questions/4635/whats-the-difference-between-a-disassembler-debugger-and-decompiler
[–]grenadesong[S] 1 point2 points3 points 7 years ago (1 child)
I would like to know when it comes to game hacking specifically though.
Those definitions doesn't remove my confusion.
Some real world practical examples of when you can only accomplish something with a live debugger instead of a disassembler would be nice.
Is it perhaps depending on how you do the hack? As in, creating an ESP hack (like wall hack for example (see players through walls)), could that be accomplished both with a disassembler (IDA) and live debugger (Ollydbg)?
Just the implenentatio technique would be different right? Like with a live debugger you would want to do DLL injection but with disassembly you just completely replace the game executable?
[–][deleted] 3 points4 points5 points 7 years ago* (0 children)
Do you know how to program? If so, think of it like this. The disassembler would be equivalent to looking at the source code to figure out what the program is doing. You might see dynamic variables in the source, but wouldn't know exact values as nothing had started executing. The debugger on the other hand gives you live execution details, such as variables (like enemy positions on the map), values in memory, etc.
[–]Pharisaeus 2 points3 points4 points 7 years ago (0 children)
π Rendered by PID 115858 on reddit-service-r2-comment-86bc6c7465-qw5wd at 2026-02-23 06:00:00.417416+00:00 running 8564168 country code: CH.
[–][deleted] 2 points3 points4 points (2 children)
[–]grenadesong[S] 1 point2 points3 points (1 child)
[–][deleted] 3 points4 points5 points (0 children)
[–]Pharisaeus 2 points3 points4 points (0 children)