https://dl.dropboxusercontent.com/u/56043942/RandomPics/ProductionWiiUMemoryRange.png
From the Cafe SDK itself.
Chadderz said:The browser ends at something like 0x27800000
0xE0000000-0xE4000000 is shared memory space. Look for framebuffer here if you want to write stuff to the screen.Chadderz said:There is an area of the RAM (0xE0000000-0xE4000000) that is shared between all programs and appears to be used for communication with hardware devices such as the graphics card. I noticed that while the game is running, an RGBA32 copy of the screen buffer existed in this area (plus a separate copy for the gamepad). I also noticed that 16bit PCM audio data existed in this area, which when I decoded was the opening sound effects of MK8 (at 0xE2C00000). This is not the file format used on the disk, this is clearly the decoded data that is being sent to the audio interface and out to the speakers. I have no idea if this is always true, or if all the games sound is stored there, but I suspect so. If all you want to do is rip the audio, then this may be a good line of investigation.
So I've been exploring the VPAD library a bit today, and I had a question: the hex values for all the individual buttons are in the SDK, in "vpadbase.h" but can anyone tell me how to go about detecting multiple buttons being held at the same time, save for going and writing in the unique hex values for every possible button combination? Doing that would obviously be incredibly tedious and I'd like to avoid it if at all possible, haha.
i will update the site in the next coming days, im currently out of town XDSo, the http://wiiu-hb.com/ needs to be updated, right?
i will update the site in the next coming days, im currently out of town XD
i will update the site in the next coming days, im currently out of town XD
You guys have a crapton of undocumented stuff in rpc.py, plan on adding that to the documentation eventually?
All the .rpls are in the SDK along with their associated functions and parameters. The documentation there is very good.
Marionumber1 Relys You guys should put some sorta brief synopsis of the kernel exploit somewhere, even if it's just the pseudocode you guys are basing it off of with a few comments.
Kinda hard to follow for the completely uninformed.
Well, it was an attempt that sadly didn't go anywhere.
Well, it was an attempt that sadly didn't go anywhere.
As in your exploit doesn't work, or your implementation doesn't?
The exploit.
Ugh...that..sucks....damn... What happens now?