Python 3 port of memorypy library using ctypes to search/edit windows programs memory.
pip install memorpy3
In this example open a notepad.exe and type in some text we will edit from memory !
>>> from memorpy3.MemWorker import MemWorker
>>> mw=MemWorker(pid=3856) #you can also select a process by its name with the kwarg name=
>>> l=[x for x in mw.umem_search("hello")]
>>> l
[('', <Addr: 0x003287B0>)]
>>> a=l[0][1]
>>> a
<Addr: 0x003287B0>
>>> a+4
<Addr: 0x003287B4>
>>> print a
<Addr: 0x003287B0 : "h\x00e\x00l\x00l\x00o\x00 \x00t\x00h\x00i\x00s\x00 \x00i\x00s\x00 \x00a\x00 \x00m\x00e\x00s\x00s\x00a\x00g\x00e\x00 \x00I\x00" (bytes)>
>>> a.dump()
00328790: 46 00 72 00 61 00 6E 00 63 00 65 00 29 00 00 00 F.r.a.n.c.e.)...
003287A0: 00 00 00 00 00 00 00 00 F3 8F 57 0C 7F 6A 00 10 ..........W..j..
003287B0: 63 00 6F 00 75 00 63 00 6F 00 75 00 20 00 74 00 c.o.u.c.o.u. .t.
003287C0: 68 00 69 00 73 00 20 00 69 00 73 00 20 00 61 00 h.i.s. .i.s. .a.
003287D0: 20 00 6D 00 65 00 73 00 73 00 61 00 67 00 65 00 .m.e.s.s.a.g.e.
003287E0: 20 00 49 00 20 00 74 00 79 00 70 00 65 00 64 00 .I. .t.y.p.e.d.
003287F0: 20 00 69 00 6E 00 20 00 6E 00 6F 00 74 00 65 00 .i.n. .n.o.t.e.
00328800: 70 00 61 00 64 00 2E 00 65 00 78 00 65 00 20 00 p.a.d...e.x.e. .
00328810: 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 !...............
00328820: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00328830: 00 00 00 00 04 00 27 00 F7 8F 74 2B 6A 6A 00 00 ......'...t+jj..
00328840: 30 7A 32 00 C0 8B 32 00 00 00 00 00 00 00 00 00 0z2...2.........
00328850: 01 00 01 00 01 01 00 00 00 00 00 00 00 00 00 00 ................
00328860: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00328870: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00328880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00328890: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
003288A0: 01 00 00 01 00 00 01 00 00 00 00 01 00 00 00 00 ................
003288B0: 07 00 00 07 59 6A 00 00 B8 79 32 00 E8 35 32 00 ....Yj...y2..52.
003288C0: 50 54 9D ED E6 EB 55 42 82 89 F8 A3 1E 68 72 28 PT....UB.....hr(
003288D0: 03 00 00 03 7F 6A 00 00 C0 8B 32 00 E8 35 32 00 .....j....2..52.
003288E0: AA BA 43 9F 5C 80 8F 67 E2 8F 75 3F 6E 6A 00 0C ..C.\..g..u?nj..
003288F0: F0 FE 30 00 70 FE 30 00 F0 FD 30 00 1D 17 ED 00 ..0.p.0...0.....
00328900: B6 8F 75 6B 7B 6A 00 08 00 00 00 00 00 00 00 00 ..uk{j..........
00328910: 11 10 0A 61 00 00 00 00 00 00 00 00 A0 00 00 00 ...a............
00328920: 0D 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00328930: 00 00 80 41 00 00 80 41 00 00 80 3D 00 00 80 3D ...A...A...=...=
00328940: 00 00 D0 00 00 00 30 00 1E FF 20 1F 00 00 00 00 ......0... .....
00328950: 71 80 0E 00 30 00 30 00 30 00 30 00 30 00 30 00 q...0.0.0.0.0.0.
00328960: 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 0.0.0.0.0.0.0.0.
00328970: 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 0.0.0.0.0.0.0.0.
00328980: 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 0.0.0.0.0.0.0.0.
>>> a.read(100).decode("utf-16-le")
u'hello this is a message I typed in notepad.exe !\x00\x00'
>>> a.write("pwned".encode("utf-16-le"))
1
>>> a.read(100).decode("utf-16-le")
u'pwned this is a message I typed in notepad.exe !\x00\x00'
Look back at your notepad and the text should be changed ! :) A quicker way to do this could be :
>>> mw.umem_replace("hello","pwned")
Some other interesting features like searching for different values types in memory and monitor their changes are also implemented through the Locator class. For example if you are looking to cheat in a game and you start with 200 ammo, you could do something like :
>>> lo=Locator(mw)
>>> lo.feed(200)
...
<Addr: 0x0018FDE2>,
<Addr: 0x0018FDE4>,
<Addr: 0x0018FDE6>,
...]}
Use some ammo and "refeed" the locator (do this a couple of times until there is one result left)
>>> lo.feed(199)
{'double': [],
'float': [],
'int': [<Addr: 0x0019FAF0>],
'long': [],
'short': [],
'uint': [],
'ulong': [],
'ushort': []}
>>> a=_["int"][0]
>>> a.read()
199
>>>a.write(999999)
1
$ pip install -r requirements-dev.txt
$ bumpversion major|minor|patch
$ python setup.py sdist
$ twine upload dist/*