Jump to content

OAM DMA hijacking: Difference between revisions

No edit summary
 
(One intermediate revision by one other user not shown)
Line 3:
{{clr}}
 
'''OAM DMA hijacking''' ('''Object AllocationAttribute MapMemory Direct Memory Access hijacking''') is a means of changing the OAM DMA routine at FF80-FF89 (though the actual end can be extended e.g. FF89 could use two bytes for a relative jump, in which case FF8A is occupied) in Game Boy games by glitching or hacking. In this case, this article will describe how to do it with glitches in the Pokémon games.
 
This glitch works by hijacking the OAM DMA routine associated with sprites.{{elaborate}}
Line 52:
At the desired RAM address (e.g. D34A), write:
 
ld a,(FFD3) ; a=random "D-sumhRandomAdd" byte 1 number.
ld (FFF8),a ; put a into FFF8, which controls what buttons are being pressed.
ret ; Don't execute any code after D350.
Cookies help us deliver our services. By using our services, you agree to our use of cookies.