MetascriptDex/RB:D5F1 (Pallet Town): Difference between revisions

From Glitch City Wiki
Jump to navigation Jump to search
Content added Content deleted
>Torchickens
No edit summary
>SaltyBeescuit
(Added some more ACE locations within RAM (more coming soon))
Line 11: Line 11:
*'''0x1E''': Arbitrary code execution at region D5F1 in RAM
*'''0x1E''': Arbitrary code execution at region D5F1 in RAM
*'''0x1F''': Arbitrary code execution at region AFC9 in SRAM
*'''0x1F''': Arbitrary code execution at region AFC9 in SRAM
*'''0x23''': Arbitrary code execution at region CD8C in RAM

*'''0x35''': Arbitrary code execution at region D7CD in RAM. This data is right in the middle wEventFlags.
*'''0x36''': Arbitrary code execution at region D361 in RAM. This data represents the Player's current Y Co-ordinate within the map
{{stub}}
{{stub}}
[[Category:MetascriptDex]]
[[Category:MetascriptDex]]

Revision as of 22:48, 8 October 2018

(↑ Back to the MetascriptDex index)

Pallet Town

This article details various glitch meta-map scripts in Pallet Town in Pokémon Red and Blue.

The script is controlled by memory address D5F1.

Highlights

  • 0x15: Arbitrary code execution at region DB3E in RAM. This data is located within stored Pokémon data for the current box, specifically from Pokémon 6's level onward.
  • 0x16: Arbitrary code execution at region A1CD in SRAM
  • 0x1A: Arbitrary code execution at region FAE1 in Echo RAM. This data represents stored Pokémon's move 2 and onward.
  • 0x1E: Arbitrary code execution at region D5F1 in RAM
  • 0x1F: Arbitrary code execution at region AFC9 in SRAM
  • 0x23: Arbitrary code execution at region CD8C in RAM
  • 0x35: Arbitrary code execution at region D7CD in RAM. This data is right in the middle wEventFlags.
  • 0x36: Arbitrary code execution at region D361 in RAM. This data represents the Player's current Y Co-ordinate within the map
This article or section is a stub. You can help Glitch City Wiki by expanding it.