GlitchDexES/RB:195: Difference between revisions

Jump to navigation Jump to search
Content added Content deleted
 
Line 71: Line 71:
The results will vary based on the emulator, with BGB version 1.5.9 giving Scyther (No. 123) (read 0x1A) and vba-v24-svn422 giving Charizard (No. 006) (read 0xFF; [[GlitchDexES/RB:255|0 'MÙ Ù (FF)]]). Behavior on an actual Game Boy and Virtual Console is unknown.
The results will vary based on the emulator, with BGB version 1.5.9 giving Scyther (No. 123) (read 0x1A) and vba-v24-svn422 giving Charizard (No. 006) (read 0xFF; [[GlitchDexES/RB:255|0 'MÙ Ù (FF)]]). Behavior on an actual Game Boy and Virtual Console is unknown.


There is a way to unlock the SRAM using [[OAM DMA hijacking]] to get the actual value of BBB0; with the following code:
There is a way to unlock the SRAM using [[OAM DMA hijacking]] to get the actual value of BBB0 (so e.g. 02 in BBB0 gives Kangaskhan's picture); with the following code:
<pre>
<pre>
ld a,xx (replace xx with desired bank)
ld a,xx (replace xx with desired bank)