It's a very limited procedural language, so it's not really comparable to those languages. I'd say it's closest counterpart would be a DOS batch file.
See this thread for a thorough explanation, with examples: http://www.pokecommunity.com/showthread.php?t=332797
I'm comfortable C/C++, Java, Python, PHP, JS, but I've also used many other languages, like you. We call it compiling in the same sense that Java "compiles" to bytecode, I'd guess.What else would you call it? This is a source to source compiler. It translates the pseudo-Python source to pokescript. Essentially, you say msgbox("Hello world!") instead of
So, it faces the same restrictions as the target "language". What's interesting to note is that the current scripting utilities aren't actually 1:1. There are certain commands that are combined (XSE translates msgbox into a loadpointer and a callstd, and an if COND goto OFFSET to if1, but if COND call OFFSET to if2).
I think you're mistaking what I want to do with physically recompiling the ELF sections - no such thing is necessary.
Just wanted to say
It's nice to see someone making Gen II Tutorials
Don't worry it's not your fault about no comments etc...
It's because most people hack Gen III
About me i aleardy tried be Gen II Hacker
I tried with Gold
But i stopped
Because not enough tutorials etc...
But please keep posting Gen II tutorials
Maybe then i can come back Gen II Gold
But without enough tutorials i can't
Others also want hack Gen II
But it's all because not documentation enough
I really want see more tutorials
And of course more Gen II Hackers
Thanks for making Gen II Tutorials
I'm sure it will be usefull
For People want hack Gen II
I know exactly what happens to the strings in a binary file. My point is that we never declare them by hand. No one wants to do that. Source to source compilation is not "unsafe" as you put it. I don't know why you think that. I have similar credentials to you, so you don't have to treat me like an idiot. If the original programmers used something like that to write these scripts, then so can us hackers. Here is the example I was talking about.
Our discussion was getting off topic. I thought it might be better to continue it here. I just find the syntax clunky and obtrusive. It's not difficult or anything, it's just... Why should I have to declare all the strings I'm using beforehand? Look at the example in my thread and tell me which one looks better. Do you do any other programming?