mirror of
https://github.com/gbdev/awesome-gbdev.git
synced 2025-01-17 20:28:21 +01:00
Remove Glitches and Exploit category (#116), move demo video inside the article
This commit is contained in:
parent
d3033ffc36
commit
426efbda34
@ -273,11 +273,6 @@ A lot more of emulators, written in various languages/stacks, can be found in th
|
||||
- [GameBoy programming tutorial: Hello World!](http://peterwynroberts.com/?p=10) - Step by step tutorial.
|
||||
- [gb asm tutorial](https://eldred.fr/gb-asm-tutorial) - Step by step tutorial, building several ROMs to accompany its explanations.
|
||||
|
||||
#### Glitches and exploits
|
||||
|
||||
- [DMA hijacking](https://github.com/avivace/awesome-gbdev/blob/master/articles/dma_hijacking.md) - A simple technique that allows you to run custom code in most GB/SGB/CGB games, provided you have an ACE exploit. [Demo video](http://gbdev.gg8.se/forums/viewtopic.php?id=430).
|
||||
- [Pokémon Yellow ASM hack](http://pastebin.com/raw.php?i=WaFyrr21) - Debug menu. [Demo video](https://www.youtube.com/watch?v=BkIDPwkeGWs).
|
||||
|
||||
#### Timings
|
||||
|
||||
- [Game Boy DMA transfer routines](http://exez.in/gameboy-dma) - Understanding and using DMA routines.
|
||||
@ -400,6 +395,7 @@ A lot more of emulators, written in various languages/stacks, can be found in th
|
||||
- [Reverse Engineering a Gameboy ROM with radare2](https://www.megabeets.net/reverse-engineering-a-gameboy-rom-with-radare2) - A walkthrough to reverse engineer a Game Boy ROM challenge using radare2.
|
||||
- [Disassembling Link's Awakening](http://kemenaran.winosx.com/posts/category-disassembling-links-awakening/) - A series of blog posts about disassembling Link's Awakening DX.
|
||||
- [Reverse Engineering the GameBoy Tetris](https://github.com/h3nnn4n/Reverse-Engineering-the-GameBoy-Tetris)
|
||||
- [DMA hijacking](https://github.com/avivace/awesome-gbdev/blob/master/articles/dma_hijacking.md) - A simple technique that allows you to run custom code in most GB/SGB/CGB games, provided you have an ACE exploit.
|
||||
|
||||
## Related projects
|
||||
|
||||
|
@ -90,3 +90,5 @@ Then :
|
||||
DMA hijacking works similarly to the GameShark : it detected when the GB tried reading from the VBlank interrupt vector, and responded with instructions that applied the codes.
|
||||
|
||||
And yep, it is possible to use DMA hijacking to emulate GameShark codes. I have a PoC in Pokémon Red (a BGB save state), if anyone's interested.
|
||||
|
||||
[Demo video](http://gbdev.gg8.se/forums/viewtopic.php?id=430).
|
Loading…
x
Reference in New Issue
Block a user