{"id":917,"date":"2010-08-30T12:12:44","date_gmt":"2010-08-30T06:42:44","guid":{"rendered":"http:\/\/JitendraZaa.com\/blog\/?p=917"},"modified":"2014-03-31T05:39:30","modified_gmt":"2014-03-31T05:39:30","slug":"how-to-change-sap-tables-without-coding-or-debugging","status":"publish","type":"post","link":"https:\/\/www.jitendrazaa.com\/blog\/others\/sap\/how-to-change-sap-tables-without-coding-or-debugging\/","title":{"rendered":"How to change SAP tables without coding or debugging"},"content":{"rendered":"<p>Generally, transactin code SM3o is used to edit any table in SAP. To use this trasnaction code, user needs to go thorough some authorizatios checks. No matter security on table editing, the SAP table contects can be directly edited by usign the trasnaction code SE16N as below:<\/p>\n<p>When in transaction SE16N use the command &amp;SAP_EDIT in the command field in SAP. However, this works if you have debug with changes access for object S_DEVELOP, but S_TABU_DIS is ignored as well as the system settings regarding changes. If you use this function for transaction, master data or other tables that cannot be changed with SM30, you can cause quiet some damage.\u00a0 So, use with caution.<\/p>\n<p>The step by step information is given below:<\/p>\n<p>1:\u00a0 Use transaction SE16N\u00a0 and enter a table of your choic<\/p>\n<p>2: In the command field enter &#8220;&amp;SAP_EDIT&#8221; and hit enter. The maintenance indicator in SE16N will be switched \u00a0on.<\/p>\n<p><a href=\"https:\/\/i0.wp.com\/jitendrazaa.com\/blog\/wp-content\/uploads\/2010\/08\/se16n.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-918\" src=\"https:\/\/i0.wp.com\/jitendrazaa.com\/blog\/wp-content\/uploads\/2010\/08\/se16n.png?resize=300%2C114&#038;ssl=1\" alt=\"\" width=\"300\" height=\"114\" \/><\/a><br \/>\n<!--more--><br \/>\n3)\u00a0Execute the table for requried values and the table entries can be edited:<\/p>\n<p><a href=\"https:\/\/i0.wp.com\/jitendrazaa.com\/blog\/wp-content\/uploads\/2010\/08\/se162.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-919\" src=\"https:\/\/i0.wp.com\/jitendrazaa.com\/blog\/wp-content\/uploads\/2010\/08\/se162.png?resize=300%2C179&#038;ssl=1\" alt=\"\" width=\"300\" height=\"179\" \/><\/a><\/p>\n<p>If you dont have access to S_DEVELOP with change activities for object type DEBUG, this function will not be possible.<\/p>\n<p>If you want to allow this function, you can audit who changed data via SE16N by browsing the following tables;<\/p>\n<p><strong>SE16N_CD_KEY<\/strong> : Change Documents \u2013 Header<br \/>\n<strong>SE16N_CD_DATA<\/strong> : Change Documents \u2013 Data<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Simple Tips to change SAP tables without coding or debugging. This article explains SE16N_CD_KEY, SE16N_CD_DATA, S_DEVELOP, AP_EDIT, SE16N, S_TABU_DIS of SAP System.<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"jz_research_post":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[10],"tags":[332],"class_list":["post-917","post","type-post","status-publish","format-standard","hentry","category-sap","tag-sap"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":2487,"url":"https:\/\/www.jitendrazaa.com\/blog\/others\/sap\/sap-security-interview-questions-tips-and-tricks\/","url_meta":{"origin":917,"position":0},"title":"SAP Security Interview Questions, Tips and Tricks","author":"Santosh Karemore","date":"November 20, 2011","format":false,"excerpt":"Important Must read Interview Questions of SAP Security, Tips and Tricks","rel":"","context":"In &quot;SAP&quot;","block_context":{"text":"SAP","link":"https:\/\/www.jitendrazaa.com\/blog\/category\/others\/sap\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2887,"url":"https:\/\/www.jitendrazaa.com\/blog\/others\/sap\/sap-r3-security-interview-questions\/","url_meta":{"origin":917,"position":1},"title":"SAP R\/3 Security &#8211; Interview Questions","author":"Santosh Karemore","date":"June 2, 2012","format":false,"excerpt":"Interview Questions for SAP R3 Security","rel":"","context":"In &quot;SAP&quot;","block_context":{"text":"SAP","link":"https:\/\/www.jitendrazaa.com\/blog\/category\/others\/sap\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2910,"url":"https:\/\/www.jitendrazaa.com\/blog\/others\/sap\/how-to-set-up-central-user-administration-cua-in-sap\/","url_meta":{"origin":917,"position":2},"title":"How to set up Central User Administration (CUA) in SAP","author":"Santosh Karemore","date":"June 8, 2012","format":false,"excerpt":"Step by step tutorial of setting up Central User Administration (CUA) in SAP","rel":"","context":"In &quot;SAP&quot;","block_context":{"text":"SAP","link":"https:\/\/www.jitendrazaa.com\/blog\/category\/others\/sap\/"},"img":{"alt_text":"SAP CUA System Name System User","src":"https:\/\/i0.wp.com\/jitendrazaa.com\/blog\/wp-content\/uploads\/2012\/06\/SAP-CUA-System-Name-System-User.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":301,"url":"https:\/\/www.jitendrazaa.com\/blog\/others\/sap\/applying-the-support-packs-in-sap-system\/","url_meta":{"origin":917,"position":3},"title":"Applying the Support Packs in SAP System","author":"Santosh Karemore","date":"June 25, 2010","format":false,"excerpt":"SUPPORT PACKS:- \u00a0Support Packs provides enhanced functionality, Bug fixes, changes to the existing Data Dictionary Elements, Repository objects like programs, reports, transactions etc.\u00a0 Support Packs are of various types. Few of them are: \u00a0Basis Support Packages (SAP KB 62050) ABAP Support Packages (SAP KA 62050) Application Support Packages (SAP KH\u2026","rel":"","context":"In &quot;SAP&quot;","block_context":{"text":"SAP","link":"https:\/\/www.jitendrazaa.com\/blog\/category\/others\/sap\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":509,"url":"https:\/\/www.jitendrazaa.com\/blog\/others\/sap\/sap-r3-audit-review-checklist\/","url_meta":{"origin":917,"position":4},"title":"SAP R\/3 Audit Review Checklist","author":"Santosh Karemore","date":"July 2, 2010","format":false,"excerpt":"It is always advisable to perform a check on SAP R\/3 system a couple of times a year to ensure the tight security of SAP System. Below are few useful Do's which can help to achieve the high degree of Security: Review the following:-\u00a0 \u00a0System security file parameters (TU02) (e.g.\u2026","rel":"","context":"In &quot;SAP&quot;","block_context":{"text":"SAP","link":"https:\/\/www.jitendrazaa.com\/blog\/category\/others\/sap\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/jitendrazaa.com\/blog\/wp-content\/uploads\/2010\/07\/SAP-291x300.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":429,"url":"https:\/\/www.jitendrazaa.com\/blog\/others\/sap\/source-code-for-display-all-objects-in-sap-abap\/","url_meta":{"origin":917,"position":5},"title":"Source code for &#8220;Display All Objects&#8221; in SAP ABAP","author":"Santosh Karemore","date":"June 29, 2010","format":false,"excerpt":"We can find the source code for some of the Display All objects from transaction code SE38, using Utilities --> Environment Analysis. We an also look at the object hierarchy by clicking on \"Display Object List\" , while looking at the source code. There are various tables that cross-reference components.\u2026","rel":"","context":"In &quot;SAP&quot;","block_context":{"text":"SAP","link":"https:\/\/www.jitendrazaa.com\/blog\/category\/others\/sap\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/posts\/917","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/comments?post=917"}],"version-history":[{"count":1,"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/posts\/917\/revisions"}],"predecessor-version":[{"id":3788,"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/posts\/917\/revisions\/3788"}],"wp:attachment":[{"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/media?parent=917"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/categories?post=917"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jitendrazaa.com\/blog\/wp-json\/wp\/v2\/tags?post=917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}