![Stick Out Tongue :p](./images/smilies/imported_tongue.gif)
J'arrive à lancer le jeu normalement, à me logger, à choisir mon personnage mais lors du chargement j'obtiens ceci :
![](http://img288.imageshack.us/img288/6199/erreur6qa.th.jpg)
avec le message en entier (je sais c'est long):
Puis, après avoir cliqué sur "Debug" :Access Violation exception generated at 0x80BEFEF0, thread attempts to read at 0x80BEFEF0.
The thread attempted to read from or write to a virtual address for which it does not have the appropriate access.
-------------------------------
Log with no filter:
-------------------------------
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 udp_sock.cpp 174 : LNETL0: Socket 140 received 10 bytes from peer rsfe002.juk.shards.nevrax.com:47851 (213.208.119.192)
2006/07/03 17:43:45 client_ryzom_rd.exe INF e50 network_connection.cpp 2220 : CNET[01487518]: sent ACK_PROBE (140 probes)
2006/07/03 17:43:45 client_ryzom_rd.exe DBG e50 net_manager.cpp 3396 : CNetManager::update : Probe Received.
2006/07/03 17:43:45 client_ryzom_rd.exe INF e50 init_main_loop.cpp 388 : PROFILE: 0 seconds (59 total) for Initializing sound
2006/07/03 17:43:45 client_ryzom_rd.exe INF e50 init_main_loop.cpp 400 : PROFILE: 0 seconds (59 total) for Initializing Entities manager
-------------------------------
User Crash Callback:
-------------------------------
UserId: 275061
ShardId: 101
Application: ryzom_live
No user entity informations
ViewPosition: 0.00 0.00 0.00
Time in game: 2h 19min 24sec
LocalTime: 2006/07/03 17:43:50
ServerTick: 541434429
ConnectState: Probe
LocalAddress: :1099 (192.168.0.1)
Language: Français
ClientVersion: 1.2.0.800
PatchVersion: 500
Client is online
NumServerHOP: 1
NumFarTP: 0
NumReselectPerso: 0
Connection Events: HOP
Memory: 87MB/767MB
Process Virtual Memory: 571MB
NeL Memory: 0B
OS: Microsoft Windows XP Service Pack 2 (Build 2600) (5.1 2600)
Processor: AMD Athlon(tm) XP 2800+ / x86 Family 6 Model 10 Stepping 0 / AuthenticAMD / 2088MHz / 1 Processors found
CPUID: 383fbff
HT: NO
CpuMask: 1
NeL3D: Direct3d / ati2dvag.dll / RADEON 9200 SERIES / \\.\DISPLAY1 / driver version : 6.14.10.6517
3DCard: RADEON 9200 SERIES , version 6.5.1.7
Sound mixer:
Playing sources: 0
Available tracks: 32
Used tracks: 0
Muted sources: 0
Sources waiting for play: 0
HighestPri: 0 / 2
HighPri: 0 / 4
MidPri: 0 / 6
LowPri: 0 / 8
FreeTracks: 32 / 32
Average update time: 0.000002 msec
Average create time: 0.000000 msec
Estimated CPU: 0.000046%%
Sound driver:
FMod Driver
3d hw buffers: 32
2d hw buffers: 32
-------------------------------
![](http://img426.imageshack.us/img426/8154/erreur28xz.jpg)
Ce qui me ferme le programme.
J'ai déjà lancé un ryzom_recover mais le problème persiste ...
Merci d'avance de votre réponse.