- 11
- Posts
- 4
- Years
- Seen Nov 8, 2022
Hi everyone,
I've played emerald kaizo in the past. (Some 50 attempts of a hard core nuzlocke, furthest attempt to Flannery.) One thing that bugged me was which pokemon the AI sends into battle after one is KOed. I won't go into much detail here, but often the AI sends in the pokemon with the weakest type against yours. In my opinion it should be the pokemon with the strongest type. Now that I'm making my own rom hack, I want to change that.
At first I tried to use binary hacking, but while that's fine for almost anything I want to do, this specific problem seems to be pretty much unsolvable. So I turned to disassemblies. However, I'm unable to find the subroutines I'm looking for. Sure there is something about battle_ai, but that's only about which moves the AI chooses.
If you can tell me in which file I can find the code I'm seaching for, that would be very helpful. (You don't need to explain how to change the code, I can figure that part out myself.) Even better (though much less likely) would be a solution for binary hacking.
I've played emerald kaizo in the past. (Some 50 attempts of a hard core nuzlocke, furthest attempt to Flannery.) One thing that bugged me was which pokemon the AI sends into battle after one is KOed. I won't go into much detail here, but often the AI sends in the pokemon with the weakest type against yours. In my opinion it should be the pokemon with the strongest type. Now that I'm making my own rom hack, I want to change that.
At first I tried to use binary hacking, but while that's fine for almost anything I want to do, this specific problem seems to be pretty much unsolvable. So I turned to disassemblies. However, I'm unable to find the subroutines I'm looking for. Sure there is something about battle_ai, but that's only about which moves the AI chooses.
If you can tell me in which file I can find the code I'm seaching for, that would be very helpful. (You don't need to explain how to change the code, I can figure that part out myself.) Even better (though much less likely) would be a solution for binary hacking.
Last edited: