• Our software update is now concluded. You will need to reset your password to log in. In order to do this, you will have to click "Log in" in the top right corner and then "Forgot your password?".
  • Forum moderator applications are now open! Click here for details.
  • Welcome to PokéCommunity! Register now and join one of the best fan communities on the 'net to talk Pokémon and more! We are not affiliated with The Pokémon Company or Nintendo.
N
Reaction score
4

Profile posts Latest activity Postings About

  • I'm comfortable C/C++, Java, Python, PHP, JS, but I've also used many other languages, like you. We call it compiling in the same sense that Java "compiles" to bytecode, I'd guess.What else would you call it? This is a source to source compiler. It translates the pseudo-Python source to pokescript. Essentially, you say msgbox("Hello world!") instead of
    msgbox OFFSET
    #org OFFSET
    =Hello World!

    So, it faces the same restrictions as the target "language". What's interesting to note is that the current scripting utilities aren't actually 1:1. There are certain commands that are combined (XSE translates msgbox into a loadpointer and a callstd, and an if COND goto OFFSET to if1, but if COND call OFFSET to if2).
    I think you're mistaking what I want to do with physically recompiling the ELF sections - no such thing is necessary.
    Yo
    Just wanted to say
    It's nice to see someone making Gen II Tutorials
    Don't worry it's not your fault about no comments etc...
    It's because most people hack Gen III
    About me i aleardy tried be Gen II Hacker
    I tried with Gold
    But i stopped
    Because not enough tutorials etc...
    But please keep posting Gen II tutorials
    Maybe then i can come back Gen II Gold
    But without enough tutorials i can't
    Others also want hack Gen II
    But it's all because not documentation enough
    I really want see more tutorials
    And of course more Gen II Hackers ;)
    Thanks for making Gen II Tutorials
    I'm sure it will be usefull
    For People want hack Gen II
    Thanks :)
    Mydrago
    I know exactly what happens to the strings in a binary file. My point is that we never declare them by hand. No one wants to do that. Source to source compilation is not "unsafe" as you put it. I don't know why you think that. I have similar credentials to you, so you don't have to treat me like an idiot. If the original programmers used something like that to write these scripts, then so can us hackers. Here is the example I was talking about.
    Our discussion was getting off topic. I thought it might be better to continue it here. I just find the syntax clunky and obtrusive. It's not difficult or anything, it's just... Why should I have to declare all the strings I'm using beforehand? Look at the example in my thread and tell me which one looks better. Do you do any other programming?
  • Loading…
  • Loading…
  • Loading…
Back
Top