I literally just use hexdump and okteta; for SHIFT-JIS as in that example I just copied and pasted into iconv. Nothing particularly fancy.
-
-
This Tweet is unavailable.
-
- Show replies
-
-
-
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Consider recording yourself doing this sometime and streaming this. For people who are used to it, it's second nature ("ok, probably an offset... probably an int32...") but if you mumble during the process, people can follow along and pick up on the intuitiveness of it.
-
OMG. I was just about to link to a video of someone doing this... AND IT WAS YOU HACKING THE KEYTAR. Never mind, I'm an idiot. Carry on :)
End of conversation
New conversation -
-
-
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Good explanation there but.. What about how to read from the cartridge itself? What kind of hardware/software tools are used? Or do you also tear it into pieces to check the guts and chipset? Gracias!
-
It's basically the same idea, except instead of a file in a hex editor you hook up a logic analyzer to the cartridge port and look at the trace and try to figure out how it works. Eventually you build your own hardware to attempt to read the carts, e.g. with a microcontroller.
End of conversation
New conversation -
-
-
This was a fascinating read. Thanks for sharing!
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Oh neat. I love doing this kind of reversing, but it's always hard to find info about it because most everyone thinks "executables" when they hear reverse-engineering.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.