One of typically the primary routes to be able to hacking these earlier copy protections has been to operate a plan that simulates typically the normal CPU procedure. The CPU simulator provides a quantity of other stuff to be able to the hacker, like the ability to single-step through each processor chip instruction and to be able to examine the PROCESSOR registers and altered memory spaces because the simulation works any modern disassembler/debugger can do this particular. The Apple II provided a built-in opcode disassembler, permitting raw memory to be decoded directly into CPU opcodes, and this would be utilized to examine exactly what the copy-protection involved to do following. Generally there was little to no protection available to the particular copy protection program, since all its secrets are produced visible with the simulation. However, as the ruse itself must run on the authentic CPU, in add-on to the software being hacked, the particular simulation would often run extremely slowly and gradually even at optimum speed.