mirror of
https://github.com/pret/pokemon-reverse-engineering-tools.git
synced 2026-04-21 16:07:13 -05:00
debugging to figure out the TextScript at 0x5daf1
original-commit-id: 7dd429fdf461082d04a518f3186d7b20d38c035b
This commit is contained in:
parent
0c489f274f
commit
8bb4e10856
|
|
@ -490,6 +490,11 @@ class TextScript:
|
|||
# (actually i think this might be the next byte after??)
|
||||
self.last_address = current_address
|
||||
|
||||
# just some debugging..
|
||||
last_address = self.last_address
|
||||
print "TextScript last_address == " + hex(last_address)
|
||||
#assert last_address != 0x5db06, "TextScript.parse somehow has a text with a last_address of 0x5db06 instead of 0x5db07"
|
||||
|
||||
# store the script in the global table/map thing
|
||||
script_parse_table[start_address:current_address] = self
|
||||
all_texts.append(self)
|
||||
|
|
|
|||
Loading…
Reference in New Issue
Block a user