As others said. Keep the hash, although you still need to use a strong password, or automatic guessing will find the one you are using.
But be careful:
If your attacker has access to the source code, he / she can change the saved password hash or just delete the password check.
Thus, this method is of little use if you cannot verify the integrity of the executable code, which is difficult.