Jump to content

OAM DMA hijacking: Difference between revisions

m
No edit summary
Line 52:
ld a,(FFD3) ; a=random "D-sum" byte 1 number.
ld (FFF8),a ; put a into FFF8, which controls what buttons are being pressed.
"ret" ; Don't execute any code after D350.
 
This example is a simulation of RNG Plays Pokémon, but the routine at D34A can be adjusted for different inputs into FFF8.
Cookies help us deliver our services. By using our services, you agree to our use of cookies.