Type 0xFF mail arbitrary code execution (Japanese Crystal): Difference between revisions
Type 0xFF mail arbitrary code execution (Japanese Crystal) (view source)
Revision as of 13:28, 9 September 2023
, 9 months ago→Requirements
Line 11:
*D9D9 must represent code which opens and writes to SRAM. D9D9 corresponds to Balls pocket item 135, so an overflow/underflow with [[duplicate key items glitch]] or [[????? map corruption]] is necessary (both can be set up with the [[bad clone glitch]], or key items can be traded over from Generation I (e.g. by modifying the catch rate/held item with Generation I arbitrary code execution)).
For example, the following
===Bytes===
|