Skip to content

Latest commit

 

History

History
94 lines (60 loc) · 5.33 KB

README.md

File metadata and controls

94 lines (60 loc) · 5.33 KB

Links Awakening DX Disassembly

Disassembly of one of my favorite games. Taking it easy for now.

Theses sources reproduce a valid build of Legend of Zelda, The - Link's Awakening DX (U) (V1.0) [C][!].gbc MD5 - 07C211479386825042EFB4AD31BB525F

Usage

  1. Install rgbds (version >= 0.3.2 required) (version 3.6 doesn't work).
  2. make all

Overview

This repository produces a valid Zelda DX ROM from several different inputs:

  • Disassembled and labelled assembly code (in ./src),
  • Extracted PNG graphics (in ./src/gfx),
  • Binary banks not disassembled yet (in ./bin/banks, to be extracted from the original ROM by yourself).

How to label code

Disassembling the code is easy, and computers are very good at it. What is difficult is to label the original code, finding the meaning behind of function calls and memory manipulations.

Of course we can just read the disassembled sources in a text editor, understand what the assembly does, and label it accordingly. However this is a slow and difficult process–and, fortunately, there are tools to help us.

Using BGB (for dynamic analysis)

The BGB emulator is a really nice GameBoy emulator, with a nice and complete debugger. It can set breakpoints on code and on memory access, and help you track the execution of the code.

BGB is originally written for Windows, but it works also well on macOS and Linux using Wine.

Here is how to use BGB for reverse-engineering the game:

  1. Compile the game (make all).

    It produces game.gbc (a compiled rom identical to the original) and more importantly game.map, the debug symbols.

  2. Open game.gbc in the BGB emulator.

  3. Open the debugger, and jump to the 0000:0150 address. You'll see a function named Start. Notice how BGB knows the name of this function from the debug symbols.

  4. You can now trace the execution of the code, set breakpoints, watchers, edit the memory, etc.

From there the goal is to pick a function or a memory location, and understand what it does, so that we can label it in the disassembled code. For this the process usually goes like this:

  1. Pick a function instruction (for instance call label_0A43)
  2. Understand what is does. For this you can either:
  • read the assembly,
  • set a breakpoint, to see when this function is called,
  • see what memory location it reads or changes,
  • observe the values changing in the memory viewer while the game runs,
  • use the debugger to replace the function by a nop, and see what change occur in the game
  1. Open the assembly source (src/code/bank*.asm) or memory map (src/constants/*), and label the code or memory you identified the purpose of.
  2. Rince and repeat.

Using awake (for static analysis)

Awake is a static GameBoy assembly explorer, specially tuned for exploring ZeldaGB and ZeldaDX. It allows to identify functions, loops, and to jump easily from functions to function. It makes much easier to follow the flow of the code and data during the game.

The tool was initially developed by @devdri. @kemenaran is currently writing some improvement to this tools, so that it can read debug symbols (otherwise no functions are labelled), and label functions from within the explorer. But this is still very much a work in progress.

How to extract graphics

Graphics are stored in the ROM under the 2bpp binary format. It encodes images in 4 nuances of grey (a palette is then applied at runtime to color them). This repository contains a tool to convert from and to the 2bpp file format.

  1. First let’s find a bank that contains graphic data (for instance using this bank map, or by picking a bank randomly).
  2. Attempt to convert the whole binary bank to PNG, and see if we recognize sprites in the resulting picture. For this you can use the gfx.py tool provided in this repository.
  • Take a binary bank you want to look at from bin/banks (dumped from the original rom). For instance the bank 2F.

  • Copy it somewhere, and rename it with a .2bpp file extention

  • Run gfx.py to convert it to png: tools/gfx.py png bank_2F_BC000.bin.2bpp

  • Look at the resulting bank_2F_BC000.bin.png.

    If you recognize pictures and sprites in the resulting png picture, congratulation, you found a gfx data bank! On the opposite, if it all looks garbled, this is probably a code bank, or a bank that contains other data (like dungeon maps, or ennemies stats).

  1. Move the png file into the src/gfx directory.
  2. Edit the main.asm file, and edit the reference of the binary bank to point to bank compiled from the graphics instead.
section "bank47",romx,bank[$2F]
- incbin "../bin/banks/bank_2F_B8000.bin
+ incbin "gfx/bank_2F.2bpp"

At compile-time, the file src/gfx/bank_2F.png will be compiled back to a 2bpp file, and included into the ROM.

Once this is done, you can even start splitting this large PNG file into some smaller fragments, sprite-per-sprite (have a look at src/gfx to see some already extracted sprites).

Contributors

Thanks to these people for contributing: