I found a system the other day that despite having the regedit poodle remediation implemented, still failed vulnerability scans. In order for it to pass I had to delete and re-create both the SSL 2.0 and SSL 3.0 keys and sub keys\entries. Once deleted\re-created the system was verified with Poodle Scan. #annoying
Furthermore, if you' like to see SSLv3 disabled without an outside tool you can use Nmap. Below is an example.
DigiCert's poodle guide.