Created
August 3, 2018 03:42
-
-
Save jam1garner/5512020397f2dfc5dc9f321714048179 to your computer and use it in GitHub Desktop.
Script to find all msc syscalls using an extracted Sm4shExplorer instance
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import glob | |
from msc import * | |
usedSyscalls = [] | |
files = glob.iglob("D:\\Smash\\Sm4shExplorer\\extract\\data\\fighter\\**\\*.mscsb", recursive=True) | |
for filePath in files: | |
msc = MscFile() | |
with open(filePath, 'rb') as f: | |
msc.readFromFile(f) | |
for script in msc: | |
for cmd in script: | |
if cmd.command == 0x2d and not cmd.parameters[1] in usedSyscalls: | |
usedSyscalls.append(cmd.parameters[1]) | |
print(usedSyscalls) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment