Someone Told Me About Memory Chips That Track Pay Cycles — Is This Legal?
In 2024, an arcade operator in São Paulo, Brazil, sent me a photograph of a small circuit board he had found inside one of his fish table machines. It was a 12-pin DIP chip — looked like an EEPROM or a small microcontroller — soldered into a socket on the main board. The socket was not documented in the machine’s service manual. When I examined the chip, I found that it was monitoring the machine’s I2C bus and counting payout cycles. After every 50 payouts, the chip modified the next payout value — increasing it by 15 percent. The result: players who were “in on the scheme” received higher payouts than the machine’s firmware intended. The operator hadn’t noticed because the modification was subtle — 15 percent is within the normal variance of a fish table’s payout rate. But over six months, that 15 percent added up to approximately $8,000 in excess payouts.
Memory chips that track and manipulate pay cycles are among the most sophisticated arcade exploits because they operate at the hardware level, they are difficult to detect visually, and they can be programmed to activate only under specific conditions (after a certain number of plays, only on weekends, only when the machine’s internal audit log is full, etc.). This article explains how these chips work, how to detect them, and — because the question comes up repeatedly — what the legal status of these devices actually is.
How Memory Chip Exploits Work
The term “memory chip” in this context typically refers to one of three types of devices:
Type 1: EEPROM/Flash Modification Chips. These are small microcontrollers (often an ATtiny or ATmega series) programmed to sit on the machine’s I2C or SPI bus and modify the data being written to the machine’s EEPROM or flash memory. The machine’s firmware periodically writes payout data (how much was paid, to whom, when) to non-volatile memory. The modification chip intercepts these writes and alters the values — for example, changing a “100 credits paid” entry to “85 credits paid.” The machine’s internal audit log shows the lower number, but the actual payout was the higher number. The discrepancy is only detectable if you compare the machine’s audit log against an external record (such as a CCTV footage review or a separate revenue tracking system).
Type 2: Pay Cycle Counters. These chips count machine cycles (games played, payouts made, credits inserted) and modify the machine’s behavior after a threshold is reached. In the São Paulo case, the chip counted 50 payouts and then applied a 15 percent bonus to the next one. The chip could have been programmed to do anything: force a jackpot after 1000 plays, disable the coin acceptor after 50 credits were inserted (forcing the player to “win” credits instead of buying them), or reset the machine’s audit log after a certain number of entries (to prevent the operator from noticing the pattern).
Type 3: RNG Modification Chips. These are the most sophisticated. They sit on the bus between the machine’s main CPU and its random number generator (often a hardware RNG chip or a software RNG running on a coprocessor). The modification chip biases the RNG output — subtly, so as not to be obvious — in favor of outcomes that benefit the attacker’s confederate. The bias can be as small as 3 to 5 percent, which is enough to guarantee a profit over time without being detectable through casual observation.
How These Chips Get Installed
The installation requires physical access to the machine’s main circuit board. The attacker must open the cabinet, locate an available socket or a point on the bus where the chip can be spliced in, and install the device. The installation takes 5 to 15 minutes for someone who knows what they are doing.
The most common installation points are:
- Empty IC sockets: Many arcade main boards have empty sockets for optional features (networking, additional I/O, etc.). These sockets are connected to the I2C or SPI bus. The attacker installs their chip into the empty socket, and the machine’s firmware never knows it’s there because the chip passively listens — it doesn’t actively transmit unless triggered by a specific condition.
- Inline with the EEPROM: The attacker removes the machine’s EEPROM (which stores payout data, configuration, and audit logs), installs a small interposer board (the “memory chip”), and then plugs the EEPROM into the interposer. The interposer passes all normal traffic through but can modify specific writes.
- Spliced into the bus wiring: The attacker cuts the I2C or SPI clock or data line, splices in their chip, and reconnects the line. The modification is small enough to be hidden under the cable harness or inside the cable sheath.
Detection: How to Find These Chips
Detection is primarily visual and requires opening the machine cabinet. However, there are also electronic detection methods:
Visual Inspection: Open the cabinet. Photograph the main board. Compare the photograph against the manufacturer’s reference photo (which you have from your documentation, right?). Look for extra chips, extra sockets, or spliced wires. Pay particular attention to the area around the EEPROM, the main CPU, and any empty IC sockets. The modification chips are often small (8-pin to 20-pin DIP or SOIC packages) and may be disguised to look like passive components (resistor arrays, capacitor banks) to avoid suspicion.
Bus Scan: Use an I2C or SPI bus scanner to enumerate all devices on the bus. The modification chip will appear as an additional device with an unexpected address. In the São Paulo case, the chip responded to I2C address 0x6F — not a standard address for any legitimate peripheral on that machine. The bus scan found it immediately.
Payout Statistical Analysis: If a machine’s payout rate shows a small but consistent bias (3 to 15 percent) above its configured target, and the bias survives firmware updates and configuration resets, that is a strong indicator of a hardware modification. Firmware updates cannot fix hardware-level payout manipulation because the modification sits outside the firmware’s control domain.
Audit Log Comparison: If your machine supports external audit log collection (sending logs to a central server or a USB drive), compare the machine’s internal log against the external copy. A modification chip that alters payout records will create a discrepancy between the two — the internal log shows the modified (lower) payout values, while the external log (if it is collected in real time, before the modification chip can alter it) shows the actual (higher) payout values.
Legal Status: Is This Actually Illegal?
The short answer: yes, in most jurisdictions. The longer answer requires distinguishing between possession, installation, and use.
Possession: In many countries, possessing a device that is designed to cheat or manipulate gaming machines is illegal, even if you haven’t used it yet. The US, the UK, Australia, and most EU countries have laws prohibiting the possession of “cheating devices” for gaming or gambling equipment. The legal definition of “cheating device” varies, but it generally includes any device that is designed to interfere with the normal operation of a gaming machine.
Installation: Installing a modification chip on a machine that you do not own is theft, fraud, and criminal damage in most jurisdictions. Even if you own the machine (for example, you are an arcade operator and you install the chip on your own machine to test its security), using it to defraud customers or to manipulate payouts is illegal.
Use: Using a modification chip to gain an unfair advantage is fraud, regardless of who installed the chip. In the São Paulo case, the police were able to charge the individuals who used the modified machines with fraud and criminal conspiracy. The fact that the chip was “just tracking pay cycles” (the original question) didn’t matter — the effect was to defraud the operator, which is illegal.
The legal variability comes in how aggressively these laws are enforced. In the Philippines and parts of Southeast Asia, arcade cheating is widespread and enforcement is inconsistent. In Dubai and much of the Middle East, the penalties are severe (imprisonment and deportation for expatriate workers). In Brazil and Mexico, enforcement is moderate — cases are prosecuted, but the legal process is slow and the penalties are often fines rather than imprisonment.
FAQ
Q: If I find one of these chips in my machine, can I remove it and not report it?
A: You can remove it, but not reporting it is a bad idea. If you don’t report it, you have no evidence trail if the same individuals target your arcade again. And if you discover that an employee installed the chip, handling it internally (firing them, not involving the police) means they can go to another arcade and do the same thing. The legal advice I have received (from lawyers in the Philippines and Brazil) is consistent: report it. The act of reporting creates a legal record that protects you if the matter escalates.
Q: Can these chips be detected remotely, without opening the machine?
A: Not directly. The chip is a passive listener until triggered, and it doesn’t transmit radio signals. However, you can detect the effects of the chip (payout bias, audit log discrepancies) without opening the machine. Think of it like a medical condition: you can detect the symptoms (high blood pressure) without seeing the cause (blocked artery). Detecting the symptoms tells you that you need to open the machine and look for the cause.
Q: Are all memory chip modifications illegal, or are some legitimate?
A: There is no legitimate use case for a modification chip that alters payout data or biases the RNG. Some technicians install additional memory chips for legitimate purposes (adding game features, expanding audit log capacity), but these chips don’t modify payout logic. If a chip modifies payout logic, it is not a legitimate modification.
Q: How much do these chips cost?
A: The hardware cost is trivial — an ATtiny microcontroller costs less than $2 in quantity. The value is in the programming: the firmware that knows how to interface with a specific arcade machine’s bus, how to identify payout data, and how to modify it without being detected. Pre-programmed chips are sold on various online platforms for $50 to $200, depending on the target machine model and the sophistication of the modification.
What to Do Next
If you have never opened your machines and inspected the main boards, do that this week. You don’t need to be an electronics expert — you just need to compare what you see against the manufacturer’s reference photo. If you see a chip or a socket that isn’t in the reference photo, photograph it and send the photo to your distributor or manufacturer. Ask them: “Is this factory-installed?” If the answer is no, you have found something that shouldn’t be there. Remove it, document the removal (photos of the chip, photos of the board before and after), and consider involving the police if the modification was clearly designed to manipulate payouts. The $200 cost of a visual inspection (paying a technician for 2 hours of time) is insignificant compared to the $8,000 that the São Paulo operator lost over six months.