Technical

How Does BattlEye Detect Cheats?

BattlEye is a kernel-mode anti-cheat from BattlEye Innovations operating in PUBG, Rainbow Six Siege, Arma 3, ARC Raiders, and other titles. It loads BEDaisy.sys as a signed driver, performs signature scanning of process memory, hooks kernel callbacks for process and image-load events, sweeps PCI configuration space and physical memory for DMA cards, validates module integrity via remote-server hash queries, and exports behavioral telemetry to BattlEye's backend for delayed wave bans.

RawCheats Anti-Cheat Research Team — Anti-Cheat Research TeamUpdated May 12, 2026

BattlEye is among the most aggressive consumer kernel anti-cheats and has been the dominant solution for PUBG since 2017 and ARC Raiders since launch. The architecture is split between BEDaisy.sys (the kernel driver), BEService.exe (the user-mode service), and BEClient.dll (the in-process module). Each layer has a job, and BattlEye's bans rely on all three reporting consistent state to the backend.

BEDaisy.sys and the kernel surface

BEDaisy is what loads in ring 0. It registers the standard Windows kernel callbacks (PsSetCreateProcessNotifyRoutineEx, PsSetLoadImageNotifyRoutine, ObRegisterCallbacks) to see every process and module that touches the protected game. It also walks PiDDBCacheTable and MmUnloadedDrivers looking for fingerprints of recently loaded malicious drivers — this is why "manually mapped" cheat drivers still leave a trace if they were ever properly loaded once. BEDaisy strips dangerous handle access rights to the game process (VM_READ, VM_WRITE) before any third-party caller can use them.

Signature scanning and remote validation

BattlEye does conventional pattern-based signature scans against process memory and loaded modules. The signature database isn't static — it streams from BattlEye's servers and is updated weekly, sometimes daily during active ban waves. BattlEye also performs remote hash validation: BEClient sends hashes of selected memory regions to the backend, where they're checked against a server-side list. Anyone who has touched BattlEye reversing knows that "client-side bypass" only buys you time until the next server-side check comes back wrong.

PCI bus and DMA card detection

BattlEye actively sweeps PCI configuration space. It enumerates devices via HalGetBusData, reads vendor IDs, checks BAR (Base Address Register) sizes for anomalies that suggest a Xilinx FPGA pretending to be a real PCIe device, looks for AER (Advanced Error Reporting) capability flags consistent with real Intel/NVIDIA hardware, and checks IOMMU page-table state. This is the ground BattlEye pioneered the consumer-AC fight on, and it's the reason the cheap DMA market collapsed under cross-vendor IOMMU enforcement in 2026.

Behavioral telemetry and wave bans

BattlEye exports input deltas, hit registration patterns, weapon-pattern compliance, and view-angle smoothness to BattlEye's servers for ML analysis. The Feb 23 - Mar 1, 2026 PUBG no-recoil wave that hit 45,000 accounts in seven days came from BattlEye's pattern-recognition pipeline correlating recoil-vector consistency across thousands of sessions. The ACM MATE 2025 paper "BattlEye: Reverse Engineering a Modern Anti-Cheat" laid out the telemetry architecture publicly. See our PUBG Cheats Guide for the player-side timeline.

Where the protection ends

BattlEye protects the game-process boundary and watches the local hardware. It does not — and structurally cannot — see what runs on a second machine. Pure external DMA setups (where the secondary PC and FPGA are the entire cheat) sit outside BattlEye's visibility until IOMMU, AER, and TPM closures forced them on-box. For external software cheats, BattlEye's relevant detection is signature + handle-access + telemetry, which is what hardware spoofing and behavioral tuning address.

RawCheats and BattlEye

RawCheats sells external cheats for BattlEye-protected titles like ARC Raiders and PUBG with hardware-level spoofing to defeat HWID-based wave bans. Our HWID Spoofer pillar covers the SMBIOS, NIC, disk-serial, and TPM-related layers. The right model for staying clean isn't "beat BattlEye's driver" — it's "don't tie cheating sessions to your main account's hardware fingerprint and don't generate behavioral signal that hits its ML."

Forward look

BattlEye has been the most public AC about adopting hardware attestation. Their 2026 roadmap includes deeper Pluton integration on Windows 11 24H2+ and tighter EK-cert-based device attestation. The endgame is making "clean hardware" non-spoofable at the chipset level — meaning that for the games that adopt it, the cheating future is private + premium + carefully tuned, not free + public + brute-forced.

BattlEye''s 2026 game roster and detection cadence

BattlEye protects PUBG, Rainbow Six Siege, ARC Raiders, DayZ, Escape from Tarkov, H1Z1, and 50+ other titles as of 2026. The detection cadence is consistent: weekly signature updates, ongoing kernel-pool sweeps, monthly-to-quarterly behavioral wave bans coordinated with the licensee publisher. The MATE 2025 ACM paper "BattlEye: Reverse Engineering a Modern Anti-Cheat" gave the first peer-reviewed analysis of BattlEye''s architecture and confirmed many of the techniques the cheat-development community had inferred for years — kernel callbacks, PCI sweeps, AER state validation, IOMMU page-table checks, and a server-side hash-validation flow that catches client-side bypasses on the next sync.

Why BattlEye is harder than EAC on hardware-side cheating

BattlEye has historically been more aggressive than EAC on the hardware/DMA front. BattlEye published research and tooling specifically targeting FPGA-based DMA setups before consumer-AC competitors did. The Feb 23 - Mar 1, 2026 PUBG no-recoil wave coordinated BattlEye client-side signals with Zakynthos server-side analysis, producing a multi-signal-correlated ban set rather than pure single-vector detection. For DMA users specifically, BattlEye-protected titles have been the hardest mainstream targets for years and remain so in 2026.

Related Questions

How Do Anti-Cheats Detect Aimbots?

Anti-cheats detect aimbots through three layered techniques: signature scanning (matching cheat binaries and known code patterns in memory), input/behavioral analysis (statistically anomalous mouse movement and reaction time distributions), and server-side validation (replay re-simulation comparing the player's reported view angles against what the demo file shows). Aimbot detection has shifted heavily toward behavioral ML in 2025-2026 — Anybrain, VACnet, Zakynthos, and Riot's ML pipeline are the new battleground.

How Do Anti-Cheats Fingerprint Hardware?

Anti-cheats fingerprint hardware by collecting and hashing identifiers across multiple sources: SMBIOS (motherboard, BIOS, system UUID), NIC MAC addresses, disk serial numbers, GPU device IDs, CPU identifiers (CPUID brand string, microcode revision), TPM 2.0 endorsement key certificate, USB peripheral descriptors, and monitor EDID data. The combined fingerprint becomes the HWID — and the EK certificate plus motherboard SMBIOS are the most durable elements. Riot logged 2.3M+ HWID bans in 2025 alone.

How Does Easy Anti-Cheat (EAC) Work?

Easy Anti-Cheat (EAC) is a kernel-mode anti-cheat owned by Epic Games. It loads a signed Windows driver at game launch, runs in ring 0 alongside the kernel, registers process and image-load callbacks via PsSetCreateProcessNotifyRoutine and PsSetLoadImageNotifyRoutine, scans process memory and loaded drivers against signature databases streamed from Epic servers, and exports behavioral telemetry for server-side review. EAC protects Fortnite, Apex Legends, Rust, Dead by Daylight, and roughly 130 other titles.

What Is a Kernel-Level Anti-Cheat?

A kernel-level anti-cheat is anti-cheat software that runs in ring 0 — the same privilege level as the Windows kernel — via a signed driver loaded into the OS. This gives it visibility into all processes, threads, drivers, kernel callbacks, and physical memory on the system. Examples: Easy Anti-Cheat (EAC), BattlEye (BEDaisy.sys), Riot Vanguard (vgk.sys), Activision Ricochet, NeacSafe, Zakynthos. Defense Matrix and VAC are NOT kernel-level — they run in user mode.

Raw Fortnite
Live purchase·5m ago
dezz from US bought Raw Fortnite