[DiscordArchive] how can I find what function in the client an error code is tied to ?
[DiscordArchive] how can I find what function in the client an error code is tied to ?
Archived author: Aregorn • Posted: 2021-08-09T18:17:26.027000+00:00
Original source
https://model-changing.net/files/file/32...for-wotlk/ Using this patch and loving it, but I can't make any dbc changes without breaking some part of it. Some character's textures would disappear or get completely fucked up. To give an example, changed the name of one Rogue spell and it broke the textures for facial hair for male orcs. And stayed that way until i undid the change. Now i can understand all those extra files having their own entries somehow and mine overlapping, but i'm not editing any sort of section even related to textures or character models, i'm just confused. Regardless if i make a new entry for something or edit an already existing thing(and again it's area ids, factions, load screens, nothing texture related) it breaks part of the patch. Any insight on this would be great.
[Embed: HD Characters + NPCs for WotLK]
All the patches will be done as non-encrypted soon! This file contains HD characters and NPC models and textures for WotLK. The archive contains 4 patches: patch-w.mpq contains: NPC models Animations BakedNPCTextures patch-x.mpq contains: Character models Animations patch-enUS-w.mpq and patch-enU...
https://model-changing.net/files/file/32...for-wotlk/
![[Image: unknown.png?ex=690c3d8d&is=690aec0d&hm=0...98151fd24&]](https://cdn.discordapp.com/attachments/415944535718494208/874355810296275024/unknown.png?ex=690c3d8d&is=690aec0d&hm=03c1059b989262ebe79500d3fe5c0dbb09a0593abb5ac2c80b650e998151fd24&)
Archived author: Titi • Posted: 2021-08-09T18:17:50.555000+00:00
Original source
<@!137621762870345728> do u have this with the text ?
![[Image: unknown.png?ex=690c3d8d&is=690aec0d&hm=0...98151fd24&]](https://cdn.discordapp.com/attachments/415944535718494208/874355810296275024/unknown.png?ex=690c3d8d&is=690aec0d&hm=03c1059b989262ebe79500d3fe5c0dbb09a0593abb5ac2c80b650e998151fd24&)
Archived author: tester • Posted: 2021-08-09T18:18:20.780000+00:00
Original source
i think so? idk i closed IDA and went back to what i was working on
![[Image: unknown.png?ex=690c3e47&is=690aecc7&hm=9...c37f89899&]](https://cdn.discordapp.com/attachments/415944535718494208/874356589463736370/unknown.png?ex=690c3e47&is=690aecc7&hm=90cd42e24f2272330cffe9b9c7828e681b96ab023a1c5a8980885bec37f89899&)
Archived author: tester • Posted: 2021-08-09T18:20:56.085000+00:00
Original source
![[Image: unknown.png?ex=690c3e47&is=690aecc7&hm=9...c37f89899&]](https://cdn.discordapp.com/attachments/415944535718494208/874356589463736370/unknown.png?ex=690c3e47&is=690aecc7&hm=90cd42e24f2272330cffe9b9c7828e681b96ab023a1c5a8980885bec37f89899&)
Archived author: Titi • Posted: 2021-08-09T18:21:01.706000+00:00
Original source
ty
Archived author: <o> • Posted: 2021-08-09T18:21:33.898000+00:00
Original source
if you really want to know exactly what that instruction is doing, you can do the old trick of inspecting your files for values and offsets it might write there and try to see if they come up in the registers
Archived author: <o> • Posted: 2021-08-09T18:21:52.704000+00:00
Original source
that's potentially very time consuming though
Archived author: Titi • Posted: 2021-08-09T18:22:01.296000+00:00
Original source
like u think [55] is byte 55 ?
Archived author: tester • Posted: 2021-08-09T18:22:15.586000+00:00
Original source
probably easier just to run the exe through IDA and take the breakpoint at the line above it, read what all came up
Archived author: <o> • Posted: 2021-08-09T18:22:42.249000+00:00
Original source
it _is_ writing to its own byte 55, but that might not correspond (and likely doesn't) correspond to the actual wmo byte 55