Jump to content

Vanessa and Moulder


19thsword
 Share

Recommended Posts

I'm trying to find the event where Vanessa and Moulder join your party, I'm trying to modify their starting class, could someone point me in the right direction?

Ch1.txt

Edited by 19thsword
This problem is solved now, move along now
Link to comment
Share on other sites

I have tried a new game, and the change still didn't apply.....

So, i tried to disassemble the Ch1 events, and I could'nt find data pertaining to their starting classes, so could you a bit more specific?

(BTW i added event assembler to the tags, guess i forgot about that)

Edited by 19thsword
Added a detail, and spelling :D
Link to comment
Share on other sites

Spoiler

ORG $8B40A0
AllyUnitsENM:
UNIT 0x1 0x2 0x1 0x8 [78,2] [0,1] [0x8,0x40,0x8B,0x8] [0x9,0x6C,0x0,0x0]
UNIT 0x0 0x0 0x0 0x0 [2,7] [1,8] [0x4E,0x2,0x0,0x1] [0x10,0x40,0x8B,0x8]
UNIT 0x3 0x17 0x6C 0x0 [0,0] [0,0] [0x0,0x0,0x0,0x0] [0x0,0x0,0x0,0x0]
UNIT 0x0 0x0 0x0 0x0 [0,0] [0,0] [0x0,0x0,0x0,0x0] [0x46,0x9,0x46,0x24]
UNIT 0x42 0x2 0x0 0x1 [24,64] [139,8] [0x14,0x0,0x0,0x0] [0x3,0x3,0x9,0x20]
UNIT 0x80 0x4E 0x46 0x15 [65,2] [0,1] [0x20,0x40,0x8B,0x8] [0x14,0x0,0x0,0x0]
UNIT 0x0 0x3 0x9 0x0 [128,78] [70,21] [0x42,0x2,0x0,0x2] [0x28,0x40,0x8B,0x8]
UNIT 0x14 0x0 0x0 0x0 [0,3] [9,0] [0x80,0x4E,0x46,0x1D] [0x42,0x2,0x0,0x1]
UNIT 0x38 0x40 0x8B 0x8 [20,0] [0,0] [0x3,0x12,0x1,0x0] [0x80,0x3F,0x46,0x15]
UNIT 0x41 0x2 0x0 0x1 [64,64] [139,8] [0x1F,0x0,0x0,0x0] [0x0,0x0,0x1,0x0]
UNIT 0x80 0x3F 0x46 0x15 [66,2] [0,1] [0x48,0x40,0x8B,0x8] [0x1F,0x0,0x0,0x0]
UNIT 0x0 0x0 0x1 0x0 [128,63] [70,21] [0x42,0x2,0x0,0x1] [0x50,0x40,0x8B,0x8]
UNIT 0x1F 0x0 0x0 0x0 [0,18] [1,0] [0x0,0x0,0x0,0x0] [0x0,0x0,0x0,0x0]
UNIT 0x0 0x0 0x0 0x0 [0,0] [0,0] [0x0,0x0,0x0,0x0] [0x4,0x5,0x1,0x8]
UNIT 0x5 0x0 0x0 0x1 [88,64] [139,8] [0x1,0x14,0x6C,0x6C] [0x0,0x0,0x0,0x0]
UNIT 0x3 0x9 0x0 0x20 [6,0] [0,1] [0x60,0x40,0x8B,0x8] [0x14,0x0,0x0,0x0]
UNIT

This code at line 19 probably has their data within it if you know what the bytes are.

 

(I'm still a noob myself and I'm hacking 7 so I don't know them, however I can easily find them with nightmare for you.)

Link to comment
Share on other sites

On 5/6/2017 at 6:14 AM, Sephiran59 said:
  Reveal hidden contents

ORG $8B40A0
AllyUnitsENM:
UNIT 0x1 0x2 0x1 0x8 [78,2] [0,1] [0x8,0x40,0x8B,0x8] [0x9,0x6C,0x0,0x0]
UNIT 0x0 0x0 0x0 0x0 [2,7] [1,8] [0x4E,0x2,0x0,0x1] [0x10,0x40,0x8B,0x8]
UNIT 0x3 0x17 0x6C 0x0 [0,0] [0,0] [0x0,0x0,0x0,0x0] [0x0,0x0,0x0,0x0]
UNIT 0x0 0x0 0x0 0x0 [0,0] [0,0] [0x0,0x0,0x0,0x0] [0x46,0x9,0x46,0x24]
UNIT 0x42 0x2 0x0 0x1 [24,64] [139,8] [0x14,0x0,0x0,0x0] [0x3,0x3,0x9,0x20]
UNIT 0x80 0x4E 0x46 0x15 [65,2] [0,1] [0x20,0x40,0x8B,0x8] [0x14,0x0,0x0,0x0]
UNIT 0x0 0x3 0x9 0x0 [128,78] [70,21] [0x42,0x2,0x0,0x2] [0x28,0x40,0x8B,0x8]
UNIT 0x14 0x0 0x0 0x0 [0,3] [9,0] [0x80,0x4E,0x46,0x1D] [0x42,0x2,0x0,0x1]
UNIT 0x38 0x40 0x8B 0x8 [20,0] [0,0] [0x3,0x12,0x1,0x0] [0x80,0x3F,0x46,0x15]
UNIT 0x41 0x2 0x0 0x1 [64,64] [139,8] [0x1F,0x0,0x0,0x0] [0x0,0x0,0x1,0x0]
UNIT 0x80 0x3F 0x46 0x15 [66,2] [0,1] [0x48,0x40,0x8B,0x8] [0x1F,0x0,0x0,0x0]
UNIT 0x0 0x0 0x1 0x0 [128,63] [70,21] [0x42,0x2,0x0,0x1] [0x50,0x40,0x8B,0x8]
UNIT 0x1F 0x0 0x0 0x0 [0,18] [1,0] [0x0,0x0,0x0,0x0] [0x0,0x0,0x0,0x0]
UNIT 0x0 0x0 0x0 0x0 [0,0] [0,0] [0x0,0x0,0x0,0x0] [0x4,0x5,0x1,0x8]
UNIT 0x5 0x0 0x0 0x1 [88,64] [139,8] [0x1,0x14,0x6C,0x6C] [0x0,0x0,0x0,0x0]
UNIT 0x3 0x9 0x0 0x20 [6,0] [0,1] [0x60,0x40,0x8B,0x8] [0x14,0x0,0x0,0x0]
UNIT

This code at line 19 probably has their data within it if you know what the bytes are.

 

(I'm still a noob myself and I'm hacking 7 so I don't know them, however I can easily find them with nightmare for you.)

Sorry for late reply.... went on a vacation

So, I have three  things to say.

1. Is this Fe7 data? Looks like it, if it is, this wont do

2.Nightmare ain't helping, i tried that one before making this thread

3. I decided to put up the Ch1 data at my first post for analysis

 

Link to comment
Share on other sites

8 hours ago, Primefusion said:

This topic might help. It at least gives you the addresses of their data if there's no module for them.

Nice! Got the edits to work, but i still have one final issue,

This needs to be automated by the MAKEHACK.cmd method, as I use it to create the hack I'm working on.Is there a way to apply hex edits using EA? Sorry still trying to learn :(

Link to comment
Share on other sites

6 hours ago, Primefusion said:

You should just be able to ORG to the offsets in question, and then use BYTE or WORD to write the hex you need.

Well that solves that, so I guess that marks the problem as solved then.

Thanks to everyone that participated, have a great day!

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...