Jump to content

Arbitrary sprites: Difference between revisions

>Torchickens
>Torchickens
Line 23:
Addresses D0C2 (sprite dimension) and D0C3-D0C4 (front sprite pointer) (D0C1 and D0C2-D0C3 in Yellow) may be locked using [[OAM DMA hijacking]] or a [[cheating device]] to load a custom front sprite for every opposing Pokémon.
 
D0C2-D0C3 reads pointer expressed in little-endian form, for example, $DA7F for Yellow would be represented by $7F at $D0C2 and $80 at $D0C3.
 
For a cheating device like the GameShark, the following codes will replicate the same effects as locking these values with OAM DMA hijacking (assuming the sprites were properly patched):
Line 34:
 
The first person to use this exploit is unknown, but it was popularized by pokeglitch and Torchickens.
 
 
===With 9ゥ (E6)'s backsprite (Yellow)===
Anonymous user
Cookies help us deliver our services. By using our services, you agree to our use of cookies.