Arbitrary sprites: Difference between revisions

Jump to navigation Jump to search
Content added Content deleted
>Torchickens
>Torchickens
Line 44: Line 44:


===With Family 175 (Red/Blue)===
===With Family 175 (Red/Blue)===
The Family 175 glitch Pokémon in Red/Blue (specifically 0xE4, 0xE9, 0xEE) take their frontsprite from screen data at CDE5. Though it may not be possible to see a custom frontsprite from those glitch Pokémon with standard arbitrary code execution, it is possible with a special form of arbitrary code execution known as [[OAM DMA hijacking]], and this exploit can be set up with a tool such as [[TheZZAZZGlitch's memory editor]] and map script execution at D36E.
The Family 175 glitch Pokémon in Red/Blue (specifically {{gdex|RB:228|0xE4}}, {{gdex|RB:233|0xE9}}, {{gdex|RB:238|0xEE}}) take their frontsprite from screen data at CDE5. Though it may not be possible to see a custom frontsprite from those glitch Pokémon with standard arbitrary code execution, it is possible with a special form of arbitrary code execution known as [[OAM DMA hijacking]], and this exploit can be set up with a tool such as [[TheZZAZZGlitch's memory editor]] and map script execution at D36E.


This exploit was documented by Torchickens.
This exploit was documented by Torchickens.