Arbitrary sprites: Difference between revisions
Jump to navigation
Jump to search
Content added Content deleted
>Torchickens |
>Torchickens |
||
Line 44: | Line 44: | ||
===With Family 175 (Red/Blue)=== |
===With Family 175 (Red/Blue)=== |
||
The Family 175 glitch Pokémon in Red/Blue (specifically 0xE4, 0xE9, 0xEE) take their frontsprite from screen data at CDE5. Though it may not be possible to see a custom frontsprite from those glitch Pokémon with standard arbitrary code execution, it is possible with a special form of arbitrary code execution known as [[OAM DMA hijacking]], and this exploit can be set up with a tool such as [[TheZZAZZGlitch's memory editor]] and map script execution at D36E. |
The Family 175 glitch Pokémon in Red/Blue (specifically {{gdex|RB:228|0xE4}}, {{gdex|RB:233|0xE9}}, {{gdex|RB:238|0xEE}}) take their frontsprite from screen data at CDE5. Though it may not be possible to see a custom frontsprite from those glitch Pokémon with standard arbitrary code execution, it is possible with a special form of arbitrary code execution known as [[OAM DMA hijacking]], and this exploit can be set up with a tool such as [[TheZZAZZGlitch's memory editor]] and map script execution at D36E. |
||
This exploit was documented by Torchickens. |
This exploit was documented by Torchickens. |