forked from p4plus2/DKC2-disassembly
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathtodo.txt
58 lines (40 loc) · 1.35 KB
/
todo.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
bank_BB.asm:7379: CODE_BBC18A: JMP ($0002,x)
bank_B5.asm:9296: CODE_B5E2B8: JMP ($0034)
bank_B5.asm:9304: CODE_B5E2CC: JMP ($0034)
bank_B5.asm:11142: CODE_B5F1BB: JMP ($0036)
bank_B6.asm:7901: CODE_B6D549: JMP ($0052,x)
bank_80.asm:1355: CODE_808EE7: JMP ($0032)
bank_80.asm:386: CODE_808613: JMP ($0024)
bank_80.asm:11450: CODE_80F3E3: JMP ($0020)
bank_B4.asm:6670: CODE_B4BE60: JMP ($067D)
bank_B9.asm:2766: CODE_B9D14C: JMP ($0026)
bank_B9.asm:2806: CODE_B9D186: JMP ($0026)
bank_B9.asm:2835: CODE_B9D1B2: JMP ($0026)
bank_B9.asm:2886: CODE_B9D208: JMP ($0026)
bank_B9.asm:2912: CODE_B9D231: JMP ($0026)
CODE_BBC18A
DATA_BAB6A1
38/3A DMA source bank (from decompression?)
CODE_B582A9 ;possibly camera related
CODE_B3A306
CODE_B3CE38
DATA_B4C4B3
DATA_B4C25E ;check where the data it points to points
CODE_B4AA36 ;investigate all 079C instances
(CODE_BB8E59|CODE_80F326|CODE_80CC41|CODE_80A8CE)
DATA_80A866 investigate for pointers
DATA_B6AE73 very suspicious
DATA_B6E08F same
CODE_B38324 interesting sprite thing
CODE_80B89C find DMA trigger
CODE_B3D59F check for label
CODE_B5F742 really mean pointers to decode
CODE_BBBE01 Figure out how to represent this
CODE_B6D298 Still needs investigating
CODE_808FFC fixme, plus movement buffer probably
DATA_FD6044
DATA_FD61C2 <--animated
DATA_FD616E
DATA_FD6170
DATA_FD616E
DATA_FD470D consider offset macro?