An enhanced GSC script injector for Call of Duty: Black Ops III specifically optimized for the Microsoft Store version, with full support for Steam version as well.
- β Automatic detection of MS Store vs Steam versions
- β Updated memory offsets for latest game versions
- β Enhanced process detection with multiple process name variants
- β Intelligent script discovery with fallback options
- β Detailed debugging output for troubleshooting
- β Modern UI with English localization
- β Administrator privileges detection
| Version | Process Name | Status |
|---|---|---|
| MS Store | BlackOps3MS.exe/BlackOps3.exe |
β Primary Target |
| Steam | BlackOps3.exe |
β Fully Supported |
| Other | CallofDuty_BlackOps3_x64.exe |
β Auto-detected |
- Call of Duty: Black Ops III (MS Store or Steam version)
- Windows 10/11
- .NET Framework 4.7.2 or higher
- Administrator privileges (recommended)
- Download the latest release from the releases section
- Extract the files to your desired location
- Run as Administrator for best compatibility
- Start Call of Duty: Black Ops III and load into the main menu
- Run the injector and select your compiled GSC file
# Interactive mode (GUI file picker)
"Spet01 T7 MS Store Compiler.exe"
# Direct injection
"Spet01 T7 MS Store Compiler.exe" "path\to\your\script.gsc"| Version | Asset Pool Offset | Base Address |
|---|---|---|
| MS Store | 0xF3B1330 |
Dynamic |
| Steam | 0x9407AB0 |
Dynamic |
Offsets are based on the latest research from shiversoftdev/t7-compiler
The injector uses intelligent process detection:
- Primary targets:
BlackOps3MS.exe,BlackOps3.exe - Alternative targets:
CallofDuty_BlackOps3_x64.exe,t7_sp64_ship.exe - Fallback: Manual process discovery and listing
- Asset Pool Scanning: Searches for
scripts/shared/duplicaterender_mgr.gsc - Memory Allocation: Creates new memory space in target process
- Buffer Replacement: Replaces script buffer pointer
- Verification: Confirms successful injection
| Issue | Solution |
|---|---|
| Process not detected | Run as Administrator, ensure game is in main menu |
| "Unable to find Header" | Make sure you're in the main menu, not in-game |
| Access denied | Right-click β "Run as Administrator" |
| Wrong process name | Check process list in Task Manager |
The injector provides detailed output:
- Process detection results
- Base address information
- Asset pool scanning progress
- Available scripts listing
- Memory operation status
MS Store/
βββ Simple_PC_GSC_Injector/
β βββ Program.cs # Main injector logic
βββ Properties/
β βββ AssemblyInfo.cs # Assembly metadata
βββ bin/Release/net472/ # Compiled executable
βββ .gitignore # Git ignore rules
βββ README.md # This file
βββ Simple-PC-GSC.csproj # Project file
- Visual Studio 2019+ or Visual Studio Code
- .NET Framework 4.7.2 SDK
# Clone the repository
git clone <repository-url>
cd "MS Store"
# Build in Release mode
dotnet build "Simple-PC-GSC-Injector_-unknowncheats.me-_.csproj" --configuration Release
# Output location
# bin/Release/net472/Simple PC GSC Injector.exeThis project is based on a decompiled version of the GSC injector originally posted on: UnknownCheats Forum - BO3 GSC Injector Windows/Xbox App Version
- Original Author: UnknownCheats Forum Post
- Memory Offsets: shiversoftdev/t7-compiler
- Additional Research: LJW-Dev/Black-Ops-3-GSC-Compiler
- Enhanced by: Spet01 & GitHub Copilot
- β Updated memory offsets for current game versions
- β MS Store specific optimizations
- β Improved error handling and debugging
- β Modern UI with English localization
- β Enhanced process detection algorithms
- β Automatic version detection (Steam vs MS Store)
- This tool is for educational and research purposes only
- Use at your own risk and responsibility
- The authors are not responsible for any damages or consequences
- Respect the game's Terms of Service and End User License Agreement
- This project is not affiliated with Activision or Treyarch
- β Updated memory offsets for latest game versions
- β Added MS Store specific support
- β Improved process detection and error handling
- β Complete English localization
- β Enhanced debugging capabilities
- β‘ Basic GSC injection functionality
- π― Windows Store app support
- π File selection interface
Contributions are welcome! Please feel free to submit issues, suggestions, or pull requests.
- Follow existing code style
- Test with both Steam and MS Store versions
- Update documentation for any changes
- Verify memory offsets are current
For technical support or questions:
- π Create an issue in this repository
- π¬ Check existing issues for similar problems
- π Refer to troubleshooting section above
β If this project helped you, please consider giving it a star!
Made with β€οΈ for the Call of Duty: Black Ops III modding community