Check out this code project article, it's a little more in depth than the blog post you mentioned.
http://www.codeproject.com/KB/trace/minememoryreader.aspx
Edit
And this article, although not about minesweeper directly, gives you a good step by step guide on hunting through memory using WinDbg:
http://www.codingthewheel.com/archives/extracting-hidden-text-with-windbg
Edit 2
Again, this isn't about minesweeper, but it has definitely given me some food for thought for my memory debugging, there's a wealth of tutorials here:
http://memoryhacking.com/forums/index.php
Also, download CheatEngine (mentioned by Nick D.) and work through the tutorial it comes with.
http://rads.stackoverflow.com/amzn/click/0764574817
http://stackoverflow.com/questions/931257/how-can-i-find-the-data-structure-that-represents-mine-layout-of-minesweeper-in-memory#1160282
http://www.subversity.net/reversing/hacking-minesweeper
Code project
http://www.codeproject.com/KB/trace/minememoryreader.aspx
http://www.amazon.com/dp/0764574817/?tag=stackoverfl08-20
http://www.codingthewheel.com/archives/extracting-hidden-text-with-windbg
http://memoryhacking.com/forums/index.php
http://angusj.com/resourcehacker/
http://www.cheatengine.org/aboutce.php
相关推荐
getWhere() will return a SQL expression, a data structure that represents ANTIQUES.BUYERID = ANTIQUEOWNERS.OWNERID AND ANTIQUES.ITEM = 'Chair' in the example above (the expression evaluator that comes...
Range of address that can be paged in and out of physical memory. Typically used by drivers who need memory but do not need to access that memory from DPC/dispatch of above interrupt level. ...
In a nonclustered index, the leaf level contains each index key, plus a bookmark that tells SQL Server where to find the data row corresponding to the key in the index. A bookmark can take one of two ...
be seen as methods of the objects that represents me. So, now that you know what objects are and that they expose methods that you can run and properties that you can inspect, you're ready to start ...
The simple world program simulates a number of creatures running ...represents the width of the grid Each creature lives in one of the squares faces in one of the major compass directions north east ...
Although the first edition of IPS was a somewhat radical departure from the then-standard course, which emphasized probability and inference, this third edition now represents the current standard, in...
**The Concept of DataType**: A data type defines the values that a variable can take and the operations that can be performed on it. Understanding data types is crucial for effective programming. **...
The availability of drivers that support the features of the specification will simplify the process of developing Windows appli¬cation programs that in-corporate absolute coordinate input, and ...
Learn ways of sharing the data model through reporting and through exporting the model in a variety of formats Leverage ER/Studio's naming functionality to improve naming consistency, including the ...
Whether you are learning the algorithms for the first time or wish to have up-to-date reference material that incorporates new programming styles with classic and new algorithms, you will find a ...
It is unique in that it presents both hypothesis testing and a data mining approach to holistically dissecting the genetic structure of complex traits and to designing efficient strategies for ...
- **Decision Rules:** A type of model in machine learning that represents a set of conditions leading to specific outcomes. In the context of AMRules, each rule consists of an antecedent (a ...
In the conventional GMM-UBM framework the universal background model (UBM) is a Gaussian mixture model (GMM) that is trained on a pool of data (known as the background or development data) from a ...
If you're viewing this document online, you can click any of the topics below to link directly to that section. 1. Tutorial tips 2 2. Introducing the JavaMail API 3 3. Reviewing related ...
This, combined with the vast amount of dependencies in the kernel and that it is not easy to see all the consequences of a kernel change, demands developers with a relative full understanding of the ...
This document describes the general architecture of CAN in terms of hierarchical layers according to the ISO reference model for open systems interconnection (OSI) established in ISO/IEC 7498-1 and ...