0x02 = backward
0x04 = left
0x08 = right
0x16 = variable
Turns out the first int32 is the memory offset of the attack name string. PRG's are always loaded into exactly the same location so they can reference exactly memory locations.
Keep Current with Alex Darby
This Thread may be Removed Anytime!
Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!
Support us! We are indie developers!
This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.
Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!
Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)Donate via Paypal Become our Patreon
Thank you for your support!