本文详解如何在 pymem 中安全、准确地解析多级指针链(pointer chain),解决 `could not read memory` 和 `typeerror: cannot be converted to pointer` 等常见错误,实现对目标进程浮点数值的稳定修改。
在使用 PyMem 进行内存修改(如游戏辅助开发)时,多级指针(Pointer Chain) 是最常见也最容易出错的场景。你提供的代码中抛出的两个关键错误:
原始 getPtrAdrr() 函数存在三处关键缺陷:
PyMem 提供了 RemotePointer 类,专为安全遍历指针链设计。它自动处理:
以下是修正后的完整实现:
from pymem import Pymem
from pymem.process import module_from_name
from pymem.memory import RemotePointer
# 初始化进程
pm = Pymem("xxx.exe")
game_module = module_from_name(pm.process_handle, "xxx").lpBaseOfDll
def get_pointer_address(base: int, offsets: list) -> int:
"""
安全解析多级指针链,返回最终目标地址(含最后一级偏移)
:param base: 起始基址(如模块基址 + 静态偏移)
:param offsets: 偏移列表,例如 [0x410, 0xC8, 0x3B0, 0x4C8, 0x158, 0xAF0]
:return: 目标内存地址(可用于 write_float/write_int 等)
"""
try:
ptr = RemotePointer(pm.process_handle, base)
# 遍历前 N-1 级:读取指针值,再加下一级偏移
for offset in offsets[:-1]:
if ptr.value == 0:
raise ValueError(f"Null pointer encountered at level before offset 0x{offset:X}")
ptr = RemotePointer(pm.process_handle, ptr.value + offset)
# 最后一级:返回 (末级指针值 + 最后偏移),即真实目标地址
if ptr.value == 0:
raise ValueError(f"Null pointer at final level before offset 0x{offsets[-1]:X}")
return ptr.value + offsets[-1]
except Exception as e:
raise RuntimeError(f"Failed to resolve pointer chain: {e}")
def unlimited_hunger():
base_addr = game_module + 0x08959C68
offsets = [0x410, 0xC8, 0x3B0, 0x4C8, 0x158, 0xAF0]
try:
target_addr = get_pointer_address(base_addr, offsets)
pm.write_float(target_addr, 100.0)
print(f"[✓] Hunger set to 100.0 at address: 0x{target_addr:X}")
except Exception as e:
print(f"[✗] Failed to write hunger: {e}")
避免无限循环阻塞主线程:原代码 while True: 会卡死 GUI(如 customtkinter)。正确做法是:RemotePointer 是 PyMem 中处理多级指针的推荐且最可靠方式,它将底层内存读取细节封装为高阶抽象,显著降低出错概率。与其手动拼接 read_long(),不如信任内置工具并辅以严谨的错误处理与地址校验。记住:内存修改不是“一次成功就永远有效”,而是需要持续验证、降级容错和用户友好反馈的工程实践。