AntiLag(Slow)

Reduces how often event-pages-checks on the current map are called after receiving key-inputs or operating with switches, variables, items, party-actors or timers.

Originally made and first released by bugmenot.

RPG2000
1.00UNKNOWN2000-05-072000-06-192000-07-112000-11-132000-11-152000-12-27
1.07
2001-05-05
1.10
2003-03-27
1.50
2003-06-25
1.51/1.52
2015-07-05
1.60
2015-09-15
1.61
2017-09-14
1.62
RPG2003
1.00UNKNOWN1UNKNOWN21.0.2.1
1.0.2.1
1.0.3.0
1.0.4.0
1.0.5.0
1.0.5.0
1.0.6.0
1.0.6.0
1.0.7.0
1.0.7.0
1.0.8.0
1.0.8.0
1.0.9.1
1.0.9.1
1.101.111.12mp210414

Segment 1/9

Offsets

RPG2000
2000-12-27
1.07
00432CACh
000320ACh
RPG2003
1.0.8.0
1.0.8.0
00446D30h
00046130h

Sourcecode

PROC__00432CACh:
			RET
PROC__00432CADh:
			PUSHA
			MOV EAX, [EAX+04h]
			MOV EAX, [EAX+08h]
			MOV EAX, [EAX+04h]
			MOV EAX, [EAX]
			MOV EAX, [EAX+1Ch]
			XCHG EAX, ECX
			MOV EAX, [0049ABA4h]
			MOV EAX, [EAX]
			MOV [EAX+06h], CX
			MOV EDX, [EDX+1Ch]
			CMP ECX, EDX
			JE __00432CD5h
			2 NOPs
			MOV [EAX+4Eh], DX
__00432CD5h:
			POPA
			RET
PROC__00432CD7h:
			CALL PROC__00432CADh
			CALL PROC__00486060h
			RET
PROC__00432CE2h:
			CALL PROC__00432CADh
			CALL PROC__00486138h
			RET
PROC__00432CEDh:
			CALL PROC__00432CADh
			CALL PROC__004869F4h
			RET
PROC__00432CF8h:
			CALL PROC__00432CADh
			CALL PROC__00486B38h
			RET
PROC__00432D03h:
			CALL PROC__00432CADh
			CALL PROC__00486C0Ch
			RET
PROC__00432D0Eh:
			CALL PROC__00432CADh
			CALL PROC__00489184h
			RET
__00432D19h:
			CALL PROC__0045A8E4h
			XCHG EAX, EBX
			DEC EBX
			TEST EBX, EBX
			JL __00432D57h
			MOV EAX, [0049ABA4h]
			MOV EAX, [EAX]
			CMP BYTE PTR [EAX+05h], 1
			XOR EDX, EDX
			MOV DX, [EAX+06h]
			TEST EDX, EDX
			JE __00432D57h
			PUSH EAX
			ADD EAX, 6
			CALL PROC__00432D5Bh
			POP EAX
			2 NOPs
			XOR EDX, EDX
			MOV DX, [EAX+4Eh]
			TEST EDX, EDX
			JZ __00432D57h
			ADD EAX, 78
			CALL PROC__00432D5Bh
__00432D57h:
			POP EDI
			POP ESI
			POP EBX
			RET
PROC__00432D5Bh:
			MOV WORD PTR [EAX], 0
			MOV EAX, [0049AC98h]
			MOV EAX, [EAX]
			MOV EAX, [EAX+18h]
			CALL PROC__00485B4Ch
			CALL PROC__0048BD18h
			RET
PROC__00432D75h:
			MOV EBP, [0049AC98h]
			MOV EAX, [0049ABA4h]
			MOV EAX, [EAX]
			CMP BYTE PTR [EAX+05h], 1
			JE __00432D89h
			RET
__00432D89h:
			MOV BYTE PTR [EAX+05h], 0
			CALL PROC__00432D93h
			RET
PROC__00432D93h:
			PUSH EBX
			PUSH ESI
			PUSH EDI
			MOV EAX, [0049AC98h]
			MOV EAX, [EAX]
			MOV EAX, [EAX+18h]
			MOV EDI, EAX
			CALL PROC__0045A8E4h
			JMP __0048C654h
PROC__00446D30h:
			RET
PROC__00446D31h:
			PUSHA
			MOV EAX, [EAX+04h]
			MOV EAX, [EAX+08h]
			MOV EAX, [EAX+04h]
			MOV EAX, [EAX]
			MOV EAX, [EAX+1Ch]
			XCHG ECX, EAX
			MOV EAX, [004CDC7Ch]
			MOV EAX, [EAX]
			CMP ECX, 0
			JLE __00446D51h
			MOV [EAX+06h], CX
__00446D51h:
			MOV EDX, [EDX+1Ch]
			CMP EDX, 0
			JLE __00446D61h
			CMP ECX, EDX
			JE __00446D61h
			MOV [EAX+4Eh], DX
			POPA
			RET
PROC__00446D63h:
			CALL PROC__00446D31h
			CALL PROC__004ACA40h
			RET
PROC__00446D6Eh:
			CALL PROC__00446D31h
			CALL PROC__004ACB18h
			RET
PROC__00446D79h:
			CALL PROC__00446D31h
			CALL PROC__004AD3E8h
			RET
PROC__00446D84h:
			CALL PROC__00446D31h
			CALL PROC__004AD544h
			RET
PROC__00446D8Fh:
			CALL PROC__00446D31h
			CALL PROC__004AD618h
			RET
PROC__00446D9Ah:
			CALL PROC__00446D31h
			CALL PROC__004B0130h
			RET
__00446DA5h:
			CALL PROC__00475714h
			XCHG EAX, EBX
			DEC EBX
			TEST EBX, EBX
			JL __00446DE1h
			MOV EAX, [004CDC7Ch]
			MOV EAX, [EAX]
			MOV BYTE PTR [EAX+05h], 1
			XOR EDX, EDX
			MOV DX, [EAX+06h]
			TEST EDX, EDX
			JZ __00446DE1h
			PUSH EAX
			ADD EAX, 6
			CALL PROC__00446DE5h
			POP EAX
			XOR EDX, EDX
			MOV DX, [EAX+4Eh]
			TEST EDX, EDX
			JZ __00446DE1h
			ADD EAX, 78
			CALL PROC__00446DE5h
__00446DE1h:
			POP EDI
			POP ESI
			POP EBX
			RET
PROC__00446DE5h:
			MOV WORD PTR [EAX], 0
			MOV EAX, [004CDD74h]
			MOV EAX, [EAX]
			MOV EAX, [EAX+18h]
			CALL PROC__004AC270h
			CALL PROC__004AAF50h
			RET
PROC__00446DFFh:
			MOV EBP, [004CDD74h]
			MOV EAX, [004CDC7Ch]
			MOV EAX, [EAX]
			CMP BYTE PTR [EAX+05h], 1
			JE __00446E13h
			RET
__00446E13h:
			MOV BYTE PTR [EAX+05h], 0
			CALL PROC__00446E1Dh
			RET
PROC__00446E1Dh:
			PUSH EBX
			PUSH ESI
			PUSH EDI
			MOV EAX, [004CDD74h]
			MOV EAX, [EAX]
			MOV EAX, [EAX+18h]
			MOV EDI, EAX
			CALL PROC__00475714h
			JMP __004AB8C0h

Bytes

C3

60 8B4004 8B4008 8B4004 8B00 8B401C 91 A1A4AB4900 8B00 66894806 8B521C 39D1 7406
90 90 6689504E 61 C3

E8D1FFFFFF
E87F330500
C3

E8C6FFFFFF
E84C340500
C3

E8BBFFFFFF
E8FD3C0500
C3

E8B0FFFFFF
E8363E0500
C3

E8A5FFFFFF
E8FF3E0500
C3

E89AFFFFFF
E86C640500
C3

E8C67B0200
93 4B 85DB 7C33
A1A4AB4900 8B00 C6400501 33D2 668B5006 85D2 741E
50 83C006 E819000000
58 90 90 33D2 668B504E 85D2 7408 83C04E E804000000
5F 5E 5B C3

66C7000000 A198AC4900 8B00 8B4018 E8DD2D0500
E8A48F0500
C3

8B2D98AC4900 A1A4AB4900 8B00 80780501 7401
C3

C6400500 E801000000
C3

53 56 57 A198AC4900 8B00 8B4018 8BF8 E83D7B0200
E9A8980500
C3

60 8B4004 8B4008 8B4004 8B00 8B401C 91 A17CDC4C00 8B00 83F900 7E04
66894806 8B521C 83FA00 7E08
39D1 7404
6689504E 61 C3

E8C9FFFFFF
E8D35C0600
C3

E8BEFFFFFF
E8A05D0600
C3

E8B3FFFFFF
E865660600
C3

E8A8FFFFFF
E8B6670600
C3

E89DFFFFFF
E87F680600
C3

E892FFFFFF
E88C930600
C3

E86AE90200
93 4B 85DB 7C31
A17CDC4C00 8B00 C6400501 33D2 668B5006 85D2 741C
50 83C006 E817000000
58 33D2 668B504E 85D2 7408

83C04E E804000000
5F 5E 5B C3

66C7000000 A174DD4C00 8B00 8B4018 E877540600
E852410600
C3

8B2D74DD4C00 A17CDC4C00 8B00 80780501 7401
C3

C6400500 E801000000
C3

Segment 2/9

Offsets

RPG2000
2000-12-27
1.07
0047B73Ah
0007AB3Ah
RPG2003
1.0.8.0
1.0.8.0
004A35D6h
000A29D6h

Sourcecode

			NOP
			CALL PROC__00432D75h
			NOP
			CALL PROC__00446DFFh

Bytes

90 E83576FBFF
90 E82338FAFF

Segment 3/9

Offsets

RPG2000
2000-12-27
1.07
0048ACCEh
0008A0CEh
RPG2003
1.0.8.0
1.0.8.0
004B24EFh
000B18EFh

Sourcecode

			CALL PROC__00432CD7h
			CALL PROC__00446D63h

Bytes

E80480FAFF
E86F48F9FF

Segment 4/9

Offsets

RPG2000
2000-12-27
1.07
0048ACDEh
0008A0DEh
RPG2003
1.0.8.0
1.0.8.0
004B24FFh
000B18FFh

Sourcecode

			CALL PROC__00432CE2h
			CALL PROC__00446D6Eh

Bytes

E8FF7FFAFF
E86A48F9FF

Segment 5/9

Offsets

RPG2000
2000-12-27
1.07
0048ACEEh
0008A0EEh
RPG2003
1.0.8.0
1.0.8.0
004B250Fh
000B190Fh

Sourcecode

			CALL PROC__00432CEDh
			CALL PROC__00446D79h

Bytes

E8FA7FFAFF
E86548F9FF

Segment 6/9

Offsets

RPG2000
2000-12-27
1.07
0048AD0Eh
0008A10Eh
RPG2003
1.0.8.0
1.0.8.0
004B252Fh
000B192Fh

Sourcecode

			CALL PROC__00432CF8h
			CALL PROC__00446D84h

Bytes

E8E57FFAFF
E85048F9FF

Segment 7/9

Offsets

RPG2000
2000-12-27
1.07
0048AD1Eh
0008A11Eh
RPG2003
1.0.8.0
1.0.8.0
004B253Fh
000B193Fh

Sourcecode

			CALL PROC__00432D03h
			CALL PROC__00446D8Fh

Bytes

E8E07FFAFF
E84B48F9FF

Segment 8/9

Offsets

RPG2000
2000-12-27
1.07
0048B0FAh
0008A4FAh
RPG2003
1.0.8.0
1.0.8.0
004B291Bh
000B1D1Bh

Sourcecode

			CALL PROC__00432D0Eh
			CALL PROC__00446D9Ah

Bytes

E80F7CFAFF
E87A44F9FF

Segment 9/9

Offsets

RPG2000
2000-12-27
1.07
0048C64Fh
0008BA4Fh
RPG2003
1.0.8.0
1.0.8.0
004AB8BBh
000AACBBh

Sourcecode

			JMP __00432D19h
__0048C654h:
			(...)
			JMP __00446DA5h
__004AB8C0h:
			(...)

Bytes

E9C566FAFF
E9E5B4F9FF