One of the particular primary routes in order to hacking these earlier copy protections was to operate a program that simulates the particular normal CPU procedure. The CPU sim provides a number of more features in order to the hacker, like the ability to single-step through each processor instruction and to be able to examine the PROCESSOR registers and altered memory spaces since the simulation works any modern disassembler/debugger can do this. The Apple II provided a built-in opcode disassembler, allowing raw memory to be able to be decoded into CPU opcodes, and also this would be used to examine just what the copy-protection involved to do subsequent. Generally there was tiny to no security available to typically the copy protection system, since all its secrets are made visible from the ruse. However, since the simulation itself must operate on the authentic CPU, in inclusion to the software being hacked, the particular simulation would frequently run extremely gradually even at highest speed.