Aeonitis / Reverse-Engineer-Azel

My adventure in Reverse Engineering from Bytecode, on a forgotten digital relic.
GNU General Public License v3.0
12 stars 1 forks source link

*.MCB #11

Open Aeonitis opened 1 year ago

Aeonitis commented 1 year ago

All info about MCBs will be archived here:

PD Saga Reverse engineering tweet.

"MCB's are kept in memory, the data in them is just manipulated to make sense in memory (e.g. file offsets transformed into memory addresses) which is why it's been difficult to find them. FLD_A3.MCB lives at 0x00029c6a0. I'm getting somewhere!" Source

"I had used Yabause's debug tools extensively to poke around the texture data both to help figure things our and to confirm my thoughts, particularly about palette locations in the files. No MCB files in memory must mean the files are loaded & processed then deleted from memory." Source

I have yet to check if that address is within whole cd or what most likely is a runtime RAM offset within an emulator, need to cross-check.