Anonymous user
Breakpoint: Difference between revisions
no edit summary
>Torchickens No edit summary |
>Torchickens No edit summary |
||
Line 9:
In the context of [[arbitrary code execution]], this method may allow new instances of arbitrary code execution to be discovered if the address range is specified within RAM (e.g. 8000-FEFF).
In the below image, the debugger has automatically highlighted WRA1:D163 following the use of [[glitch item]] [[ItemDex/RB:093|8F (0x5D)]]. This means (because "on execute" was checked), the game is running D163, which classes as arbitrary code execution as D163 is a RAM address; specifically
[[File:Breakpoints2.png|500px]]
|