Search Results
6/14/2025, 5:32:51 AM
>>105588056
hey so Im reverse engineering startfox and just found out there are hex representations of asm instructions.
Im trying to figure out the entire picture. Instruction pointer gets the machine code from ram, that machine code tells it what to do, what other memory addresses to access? I got to ESI+EDI being the memory address that holds the value changed.
Oh, liquid shit advertising, don't mind if i do.
hey so Im reverse engineering startfox and just found out there are hex representations of asm instructions.
Im trying to figure out the entire picture. Instruction pointer gets the machine code from ram, that machine code tells it what to do, what other memory addresses to access? I got to ESI+EDI being the memory address that holds the value changed.
Oh, liquid shit advertising, don't mind if i do.
Page 1