I'm not sure there is nothing of value. In theory, the value of EMV card data should be almost useless (except for the rare CNP merchant that only wants PAN/expiration date - and they're subject to liability since they didn't request CVV2/CSC2).
In reality? If the issuing bank doesn't check things like the cryptogram, ATC, etc then a fake EMV transaction can be created (even from a magstripe card!) and it be approved. This, of course, requires control of a terminal, but that's not that hard to get.
See: http://krebsonsecurity.com/2014/10/replay-attacks-spoof-chip-card-charges/
Note, this is NOT an EMV weakness. This is a "banks not actually verifying the transaction data before approving it" - these fraudulent transactions would have failed basic security checks.
I'm talking apple pay. With Apple pay only the DAN and a one time use cryptogram are transmitted via the merchants system. Thus, nothing of intrinsic value is there for a memory scraper to get.