Running a programme that simulates regular CPU function was one of the most common ways to get around these early copy safeguards. A hacker can use the CPU simulator to single-step through each processor instruction and analyse the CPU registers and modified memory regions while the simulation is running (this can be done with any modern disassembler/debugger).