- Joined
- Jul 7, 2010
- Messages
- 3,882
- Trophies
- 2
- Location
- /dev/random
- Website
- www.gudenau.net
- XP
- 5,379
- Country
I am interesting in reverse engineering the ROM of the Nintendo 64 Gameshark, I have managed to find a tool that allows decryption of the ROM images.
Now I am trying to figure out how I could load the ROM image into some sort of disassembler. When looking at the ROM in a hex editor I found what seems almost like a 0x39C0. The strings appear later in the ROM.
The main thing I want to accomplish is the ability to access the parallel port in custom code, from what I have seen this has been done just not publicly documented.
Hashes:
Now I am trying to figure out how I could load the ROM image into some sort of disassembler. When looking at the ROM in a hex editor I found what seems almost like a 0x39C0. The strings appear later in the ROM.
The main thing I want to accomplish is the ability to access the parallel port in custom code, from what I have seen this has been done just not publicly documented.
Hashes:
Code:
File: ar3.enc
CRC-32: 242eb6dd
MD4: e31885d797d73579b61a80ecbc4b7aea
MD5: e611755c131790cb79d961ca477de6d4
SHA-1: c935652989a3445fe770133da03da8f9a8e69b57
File: ar3.dec
CRC-32: c616a684
MD4: 70bb729e61220c5d26f0afe8dae19ccc
MD5: ea635ebc4f58481be60d6d532c232870
SHA-1: d7b7ddf211c93bf4d5fca959f7e850fd5cda373d