QuickRow

Make the row-command in the engine's default battle-system not waste a turn anymore. Instead, the actor can perform another action instantly.

Originally made and first released by bugmenot.

RPG2003
1.00UNKNOWN1UNKNOWN21.0.2.1
1.0.2.1
1.0.3.0
1.0.4.0
1.0.5.0
1.0.5.0
1.0.6.0
1.0.6.0
1.0.7.0
1.0.7.0
1.0.8.0
1.0.8.0
1.0.9.1
1.0.9.1
1.101.111.12mp210414

Segment 1/3

Offsets

RPG2003
1.0.8.0
1.0.8.0
1.0.9.1
1.0.9.1
1.101.111.12mp210414
00496242h
00095642h
00495436h
00094836h

Sourcecode

			CALL PROC__004BBE58h
			CALL PROC__004B2E0Ch

Bytes

E8115C0200
E8D1D90100

Segment 2/3

Offsets

RPG2003
1.0.8.0
1.0.8.0
1.0.9.1
1.0.9.1
1.101.111.12mp210414
0049B2AAh
0009A6AAh
0049A4A6h
000998A6h

Sourcecode

			MOV ECX, 3647
			MOV ECX, 3647

Bytes

B93F0E0000
B93F0E0000

Segment 3/3

Offsets

RPG2003
1.0.8.0
1.0.8.0
1.0.9.1
1.0.9.1
1.101.111.12mp210414
004BBDF8h
000BB1F8h
004B2DACh
000B21ACh

Sourcecode

			CALL PROC__004BBDFFh
			JMP __004BBE76h
PROC__004BBDFFh:
			TEST EAX, EAX
			JNE __004BBE2Eh
			MOV EAX, [004CDD38h]
			MOV EAX, [EAX]
			MOV EAX, [EAX+94h]
			CMP EAX, 4
			JNE __004BBE1Bh
__004BBE15h:
			SUB DWORD PTR [EBX+54h], 12
			JMP __004BBE51h
__004BBE1Bh:
			CMP DWORD PTR [EBX+48h], 0
			JNE __004BBE23h
			JMP __004BBE15h
__004BBE23h:
			CMP EAX, 2
			JE __004BBE15h
__004BBE28h:
			ADD DWORD PTR [EBX+54h], 12
			JMP __004BBE51h
__004BBE2Eh:
			MOV EAX, [004CDD38h]
			MOV EAX, [EAX]
			MOV EAX, [EAX+94h]
			CMP EAX, 4
			JNE __004BBE42h
			JMP __004BBE28h
__004BBE42h:
			CMP DWORD PTR [EBX+48], 0
			JNE __004BBE4Ah
			JMP __004BBE28h
__004BBE4Ah:
			CMP EAX, 2
			JE __004BBE28h
			JMP __004BBE15h
__004BBE51h:
			MOV EAX, [EBX+54h]
			MOV DWORD PTR [EBX+5Ch], EAX
			RET
PROC__004BBE58h:
			MOV EAX, [EBP]
			MOV EAX, [EAX+4Ch]
			PUSH EBX
			XCHG EBX, EAX
			MOV EAX, [EBX+74h]
			XOR AL, 1
			CALL PROC__004BBDFFh
			MOV EAX, [EBX+74h]
			XOR AL, 1
			MOV DWORD PTR [EBX+70h], EAX
			POP EBX
			NOP
			NOP
			RET
__004BBE76h:
			(...)
			CALL PROC__004B2DB3h
			JMP __004B2E2Ah
PROC__004B2DB3h:
			TEST EAX, EAX
			JNE __004B2DE2h
			MOV EAX, [004CDD38h]
			MOV EAX, [EAX]
			MOV EAX, [EAX+94h]
			CMP EAX, 4
			JNE __004B2DCFh
__004B2DC9h:
			SUB DWORD PTR [EBX+54h], 12
			JMP __004B2E05h
__004B2DCFh:
			CMP DWORD PTR [EBX+48h], 0
			JNE __004B2DD7h
			JMP __004B2DC9h
__004B2DD7h:
			CMP EAX, 2
			JE __004B2DC9h
__004B2DDCh:
			ADD DWORD PTR [EBX+54h], 12
			JMP __004B2E05h
__004B2DE2h:
			MOV EAX, [004CDD38h]
			MOV EAX, [EAX]
			MOV EAX, [EAX+94h]
			CMP EAX, 4
			JNE __004B2DF6h
			JMP __004B2DDCh
__004B2DF6h:
			CMP DWORD PTR [EBX+48], 0
			JNE __004B2DFEh
			JMP __004B2DDCh
__004B2DFEh:
			CMP EAX, 2
			JE __004B2DDCh
			JMP __004B2DC9h
__004B2E05h:
			MOV EAX, [EBX+54h]
			MOV DWORD PTR [EBX+5Ch], EAX
			RET
PROC__004B2E0Ch:
			MOV EAX, [EBP]
			MOV EAX, [EAX+4Ch]
			PUSH EBX
			XCHG EBX, EAX
			MOV EAX, [EBX+74h]
			XOR AL, 1
			CALL PROC__004B2DB3h
			MOV EAX, [EBX+74h]
			XOR AL, 1
			MOV DWORD PTR [EBX+70h], EAX
			POP EBX
			NOP
			NOP
			RET
__004B2E2Ah:
			(...)

Bytes

E802000000
EB77
85C0 752B
A138DD4C00 8B00 8B8094000000 83F804 7506
836B540C EB36
837B4800 7502
EBF2
83F802 74ED
8343540C EB23
A138DD4C00 8B00 8B8094000000 83F804 7502
EBE6
837B4800 7502
EBDE
83F802 74D9
EBC4
8B4354 89435C C3
8B4500 8B404C 53 93 8B4374 3401 E895FFFFFF
8B4374 3401 894370 5B 90 90 C3
E802000000
EB77
85C0 752B
A138DD4C00 8B00 8B8094000000 83F804 7506
836B540C EB36
837B4800 7502
EBF2
83F802 74ED
8343540C EB23
A138DD4C00 8B00 8B8094000000 83F804 7502
EBE6
837B4800 7502
EBDE
83F802 74D9
EBC4
8B4354 89435C C3
8B4500 8B404C 53 93 8B4374 3401 E895FFFFFF
8B4374 3401 894370 5B 90 90 C3