One of the primary routes in order to hacking these early on copy protections has been to any system that simulates typically the normal CPU functioning. The CPU simulator provides a quantity of extra features to the hacker, like the ability to single-step through each processor chip instruction and in order to examine the PROCESSOR registers and altered memory spaces because the simulation runs any modern disassembler/debugger can do this specific. The Apple II provided a built-in opcode disassembler, allowing raw memory to be decoded into CPU opcodes, and also this would be used to examine what the copy-protection involved to do following. Generally there was small to no defense available to typically the copy protection system, since all its secrets are manufactured visible through the simulation. However, since the simulation itself must work on the initial CPU, in inclusion to the application being hacked, typically the simulation would often run extremely gradually even at optimum speed.