I thought about "How to hack FFTWoTL". My idea is to use the function of decrypter.
Eulators can load ISO image of UMD Data. I thought this is because emulators have decrypter inside which transfer ".BIN" file to some readable Data. So by analyzing this function, I thought I could reach R3000 routines but what do you think?
If this works, I think we could use this method to FFT for PSP as well!
(Please feel free to reply or leave message!)
Eulators can load ISO image of UMD Data. I thought this is because emulators have decrypter inside which transfer ".BIN" file to some readable Data. So by analyzing this function, I thought I could reach R3000 routines but what do you think?
If this works, I think we could use this method to FFT for PSP as well!
(Please feel free to reply or leave message!)