Anonymous user
Pokémon Yellow C109 ID 0x0F arbitrary code execution: Difference between revisions
Pokémon Yellow C109 ID 0x0F arbitrary code execution (view source)
Revision as of 23:41, 24 May 2022
, 2 years ago→Expanded party method
(2 intermediate revisions by the same user not shown) | |||
Line 20:
==Expanded party method==
The exploit can also be done by swapping a Pokémon into Pokémon 91 in the [[expanded
Typically, the swapped Pokémon's lower Defense byte would determine E109 (Echo RAM of C109), but in actuality there are complications such as the lower Defense being overwritten before the swap occurs. Practically, the following setup should work:
Line 32:
==Attribution==
*Torchickens/ChickasaurusGL (
*[https://archives.glitchcity.info/forums/board-115/thread-7930/page-1.html jfb1337 - Searches for jp hl in the disassembly projects, which lead to C109 arbitrary code execution as a concept, and its discovery]
==YouTube video==
|