Replaces the function of the row-command in battle with the command which is specified at ID #1. The command at ID #99 will function as row instead. The IDs can be changed in the sourcecode of segment 2/3 and nearly end of 3/3.
Originally made and first released by bugmenot.
RPG2003 | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1.00 | UNKNOWN1 | UNKNOWN2 | 1.0.2.1 1.0.2.1 | 1.0.3.0 1.0.4.0 | 1.0.5.0 1.0.5.0 | 1.0.6.0 1.0.6.0 | 1.0.7.0 1.0.7.0 | 1.0.8.0 1.0.8.0 | 1.0.9.1 1.0.9.1 | 1.10 | 1.11 | 1.12 | mp210414 |
✕ | ✕ | ✕ | ✕ | ✕ | ✕ | ✕ | ✕ | ✔ | ✔ | ✕ | ✕ | ✕ | ✕ |
RPG2003 | |
---|---|
1.0.8.0 1.0.8.0 | 1.0.9.1 1.0.9.1 |
00496055h 00095455h | 00495249h 00094649h |
MOV EAX, [004CDD60h] MOV EAX, [EAX] MOV EAX, [EAX+18h] CALL PROC__0049606Dh JMP __0049603Ah
MOV EAX, [004CDD60h] MOV EAX, [EAX] MOV EAX, [EAX+18h] CALL PROC__00495261h JMP __0049522Eh
A160DD4C00 8B00 8B4018 E809000000 EBD4
A160DD4C00 8B00 8B4018 E809000000 EBD4
RPG2003 | |
---|---|
1.0.8.0 1.0.8.0 | 1.0.9.1 1.0.9.1 |
0049606Dh 0009546Dh | 00495261h 00094661h |
PROC__0049606Dh: MOV EDX, 1 RET
PROC__00495261h: MOV EDX, 1 RET
BA01000000 C3
BA01000000 C3
RPG2003 | |
---|---|
1.0.8.0 1.0.8.0 | 1.0.9.1 1.0.9.1 |
00496175h 00095575h | 00495369h 00094769h |
JGE __00496205h CALL PROC__0049606Dh MOV DWORD PTR [ESP+0Ch], EDX JMP __00496205h __00496189h: XOR EAX, EAX MOV DWORD PTR [ESP+08h], EAX MOV EAX, [004CDB74h] MOV EAX, [EAX] MOV EAX, [EAX+04h] DEC EBX TEST EBX, EBX JL __004961BFh INC EBX XOR ESI, ESI __004961A1h: MOV EAX, [004CDB74h] MOV EAX, [EAX] MOV EDX, ESI CALL PROC__004A6014h MOV EDX, [EAX+74h] CMP EDX, [EAX+48h] JNE __004961BBh INC DWORD PTR [ESP+08h] __004961BBh: INC ESI DEC EBX JNE __04961A1h __004961BFh: CMP DWORD PTR [ESP+08h], 2 JGE __004961EFh MOV EAX, [EBP] MOV EAX, [EAX+4Ch] MOV EDX, [EAX+7Ch] CMP EDX, [EAX+48h] JNE __004961EFh MOV EAX, [004CDC7Ch] MOV EAX, [EAX] PUSH EAX CALL PROC__0048BAE4h POP EDX XCHG EDX, EAX CALL __0048B538h MOV BYTE PTR [ESP+10h], 0 JMP __00496247h __004961EFh: MOV EAX, [004CDC7Ch] MOV EAX, [EAX] PUSH EAX CALL PROC__0048B924h POP EDX XCHG EDX, EAX CALL PROC__0048B538h JMP __00496214h __00496205h: CMP BYTE PTR [ESP+0Ch], 99 JE __00496189h NOP NOP JMP __049624Ch __00496214h: (...)
JGE __004953F9h CALL PROC__00495261h MOV DWORD PTR [ESP+0Ch], EDX JMP __004953F9h __0049537Dh: XOR EAX, EAX MOV DWORD PTR [ESP+08h], EAX MOV EAX, [004CDB74h] MOV EAX, [EAX] MOV EAX, [EAX+04h] DEC EBX TEST EBX, EBX JL __004953B3h INC EBX XOR ESI, ESI __00495395h: MOV EAX, [004CDB74h] MOV EAX, [EAX] MOV EDX, ESI CALL PROC__004A439Ch MOV EDX, [EAX+74h] CMP EDX, [EAX+48h] JNE __004953AFh INC DWORD PTR [ESP+08h] __004953AFh: INC ESI DEC EBX JNE __0495395h __004953B3h: CMP DWORD PTR [ESP+08h], 2 JGE __004953E3h MOV EAX, [EBP] MOV EAX, [EAX+4Ch] MOV EDX, [EAX+7Ch] CMP EDX, [EAX+48h] JNE __004953E3h MOV EAX, [004CDC7Ch] MOV EAX, [EAX] PUSH EAX CALL PROC__0048BAA0h POP EDX XCHG EDX, EAX CALL __0048B4F4h MOV BYTE PTR [ESP+10h], 0 JMP __0049543Bh __004953E3h: MOV EAX, [004CDC7Ch] MOV EAX, [EAX] PUSH EAX CALL PROC__0048B8E0h POP EDX XCHG EDX, EAX CALL PROC__0048B4F4h JMP __00495408h __004953F9h: CMP BYTE PTR [ESP+0Ch], 99 JE __0049537Dh NOP NOP JMP __0495440h __00495408h: (...)
0F8D8A000000 E8EDFEFFFF 8954240C E97C000000 33C0 89442408 A174DB4C00 8B00 8B5804 4B 85DB 7C21 43 33F6 A174DB4C00 8B00 8BD6 E865FE0000 8B5074 3B5048 7504 FF442408 46 4B 75E2 837C240802 7D29 8B4500 8B404C 8B5074 3B5048 751B A17CDC4C00 8B00 50 E80359FFFF 5A 92 E85053FFFF C644241000 EB58 A17CDC4C00 8B00 50 E82857FFFF 5A 92 E83553FFFF EB0F 807C240C63 0F8479FFFFFF 90 90 EB38
0F8D8A000000 E8EDFEFFFF 8954240C E97C000000 33C0 89442408 A174DB4C00 8B00 8B5804 4B 85DB 7C21 43 33F6 A174DB4C00 8B00 8BD6 E8F9EF0000 8B5074 3B5048 7504 FF442408 46 4B 75E2 837C240802 7D29 8B4500 8B404C 8B5074 3B5048 751B A17CDC4C00 8B00 50 E8CB66FFFF 5A 92 E81861FFFF C644241000 EB58 A17CDC4C00 8B00 50 E8F064FFFF 5A 92 E8FD60FFFF EB0F 807C240C63 0F8479FFFFFF 90 90 EB38