<?xml version="1.0" encoding="utf-8"?>
<CheatTable CheatEngineTableVersion="18">
  <CheatEntries>
    <CheatEntry>
      <ID>4</ID>
      <Description>"power"</Description>
      <LastState Activated="0"/>
      <Color>80000008</Color>
      <VariableType>Auto Assembler Script</VariableType>
      <AssemblerScript>[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
alloc(newmem,8192)
label(returnhere)
label(originalcode)
label(exit)

newmem: //this is allocated memory, you have read,write,execute access
//place your code here
mov [esi+000002F8],0

originalcode:
//mov [esi+000002F8],eax

exit:
jmp returnhere

"StrongholdLegends.exe"+1430F9:
jmp newmem
nop

00565653:
jmp newmem
nop

00567220:
jmp newmem
nop

005679E9:
jmp newmem
nop

0056B869:
jmp newmem
nop

0056D509:
jmp newmem
nop

0057C383:
jmp newmem
nop

00584B03:
jmp newmem
nop

returnhere:


 
 
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
"StrongholdLegends.exe"+1430F9:
mov [esi+000002F8],eax
00565653:
mov [esi+000002F8],eax
00567220:
mov [esi+000002F8],eax
005679E9:
mov [esi+000002F8],eax
0056B869:
mov [esi+000002F8],eax
0056D509:
mov [esi+000002F8],eax
0057C383:
mov [esi+000002F8],eax
00584B03:
mov [esi+000002F8],eax
//Alt: db 89 86 F8 02 00 00
</AssemblerScript>
    </CheatEntry>
  </CheatEntries>
  <CheatCodes>
    <CodeEntry>
      <Description>Code :fld dword ptr [edi+000003C0]</Description>
      <Address>6B8419B2</Address>
      <ModuleName>StrongholdBase.dll</ModuleName>
      <ModuleNameOffset>819B2</ModuleNameOffset>
      <Before>
        <Byte>8A</Byte>
        <Byte>DA</Byte>
        <Byte>00</Byte>
        <Byte>00</Byte>
        <Byte>00</Byte>
      </Before>
      <Actual>
        <Byte>D9</Byte>
        <Byte>87</Byte>
        <Byte>C0</Byte>
        <Byte>03</Byte>
        <Byte>00</Byte>
        <Byte>00</Byte>
      </Actual>
      <After>
        <Byte>D9</Byte>
        <Byte>87</Byte>
        <Byte>C8</Byte>
        <Byte>03</Byte>
        <Byte>00</Byte>
      </After>
    </CodeEntry>
    <CodeEntry>
      <Description>Code :fld dword ptr [edi+000003C0]</Description>
      <Address>6B841605</Address>
      <ModuleName>StrongholdBase.dll</ModuleName>
      <ModuleNameOffset>81605</ModuleNameOffset>
      <Before>
        <Byte>F6</Byte>
        <Byte>C4</Byte>
        <Byte>41</Byte>
        <Byte>75</Byte>
        <Byte>0E</Byte>
      </Before>
      <Actual>
        <Byte>D9</Byte>
        <Byte>87</Byte>
        <Byte>C0</Byte>
        <Byte>03</Byte>
        <Byte>00</Byte>
        <Byte>00</Byte>
      </Actual>
      <After>
        <Byte>D8</Byte>
        <Byte>B7</Byte>
        <Byte>C8</Byte>
        <Byte>03</Byte>
        <Byte>00</Byte>
      </After>
    </CodeEntry>
    <CodeEntry>
      <Description>Code :mov [esi+000002F8],eax king power</Description>
      <Address>005430F9</Address>
      <ModuleName>StrongholdLegends.exe</ModuleName>
      <ModuleNameOffset>1430F9</ModuleNameOffset>
      <Before>
        <Byte>76</Byte>
        <Byte>09</Byte>
        <Byte>83</Byte>
        <Byte>C0</Byte>
        <Byte>FF</Byte>
      </Before>
      <Actual>
        <Byte>89</Byte>
        <Byte>86</Byte>
        <Byte>F8</Byte>
        <Byte>02</Byte>
        <Byte>00</Byte>
        <Byte>00</Byte>
      </Actual>
      <After>
        <Byte>8B</Byte>
        <Byte>46</Byte>
        <Byte>58</Byte>
        <Byte>83</Byte>
        <Byte>F8</Byte>
      </After>
    </CodeEntry>
    <CodeEntry>
      <Description>Code :cmp dword ptr [esi+000002F8],00 KP access</Description>
      <Address>00543230</Address>
      <ModuleName>StrongholdLegends.exe</ModuleName>
      <ModuleNameOffset>143230</ModuleNameOffset>
      <Before>
        <Byte>34</Byte>
        <Byte>05</Byte>
        <Byte>00</Byte>
        <Byte>00</Byte>
        <Byte>01</Byte>
      </Before>
      <Actual>
        <Byte>83</Byte>
        <Byte>BE</Byte>
        <Byte>F8</Byte>
        <Byte>02</Byte>
        <Byte>00</Byte>
        <Byte>00</Byte>
        <Byte>00</Byte>
      </Actual>
      <After>
        <Byte>0F</Byte>
        <Byte>85</Byte>
        <Byte>78</Byte>
        <Byte>02</Byte>
        <Byte>00</Byte>
      </After>
    </CodeEntry>
  </CheatCodes>
  <UserdefinedSymbols/>
</CheatTable>
