def load_base_info(filename): ba = btfile.load_file(filename) char = btchar.Character(id) fill_fields_from_buffer(char, base_fields, ba) char_info = btchar.CharPartyBase(char.char_party == 2) char_info.name = char.name char_info.filename = filename return char_info
def load_character(filename): info = load_base_info(filename) if info.is_party: return load_party(filename) ba = btfile.load_file(filename) char = btchar.Character() fill_fields_from_buffer(char, char_fields, ba) return char
phdo = lev1[0x0411] print phdo wstyle = lev1[0x0412] print wstyle entrypos = lev1[0x0413:0x0415] print list(entrypos) unknown = lev1[0x0415] print unknown dname = lev1[0x0416:0x0420] #print "".join(map(lambda c: chr(c-0xC1+ord("A")),dname)) data = btfile.load_file("MEMDUMP.BIN", msdos_bt1_path) start=0x000c4742 c64enc=data[start:start+256] c64enc[0]="\n" c64decode = lambda buf: "".join(chr(c64enc[c]) for c in buf) print c64decode(dname) spec_coord = lev1[0x0420:0x0430] print list(spec_coord) spec_prog = lev1[0x0430:0x0440] print list(spec_prog) anitimag_coord = lev1[0x0440:0x0460] print list(anitimag_coord) telefrom_coord = lev1[0x0460:0x0470]
def load_party(filename): ba = btfile.load_file(filename) party = btchar.Party() fill_fields_from_buffer(party, party_fields, ba) return party