ReC98/th04
nmlgc 843905ecea [Reverse-engineering] [th04/th05] ZUN Soft logo explosions
Which seemed a nicer and more debuggable intro to how ZUN implements
sprites than starting with a random structure from MAIN.EXE.

Funded by -Tom-.
2018-03-21 23:20:04 +01:00
..
formats [Reverse-engineering] [th02/th04/th05] .map file loading 2018-03-16 08:02:14 +01:00
hud [Reduction] Hardware text colors and effects 2014-12-20 22:36:38 +01:00
math [Reverse-engineering] [th02/th03/th04/th05] Random number ring buffer 2018-03-16 18:12:21 +01:00
music [C decompilation] [th02/op] Music Room 2015-02-24 22:38:44 +01:00
snd [Maintenance] Rename snd_kaja_func() to snd_kaja_interrupt() 2015-03-15 23:51:11 +01:00
strings Identify and reduce gaiji strings across all executables 2014-09-13 12:26:33 +02:00
op_02.c [C decompilation] [th02/op] [th03/op] [th04/op] Frame delay #1 2015-03-04 02:47:16 +01:00
th04.asm [Reverse-engineering] [th02/th03/th04/th05] Random number ring buffer 2018-03-16 18:12:21 +01:00
zunsoft.asm [Reverse-engineering] [th04/th05] ZUN Soft logo explosions 2018-03-21 23:20:04 +01:00
zunsoft[bss].asm [Reverse-engineering] [th04/th05] ZUN Soft logo explosions 2018-03-21 23:20:04 +01:00