Difference between revisions of "FF7/Attack data"
Jump to navigation
Jump to search
Qhimm>G |
Qhimm>Akari |
||
Line 1: | Line 1: | ||
== KERNEL.BIN - Section 2: Attack data format == | |||
This section contains the data for the different attacks. Each record is 28 bytes long. | |||
{| border="0" cellpadding="3" cellspacing="1" style="background: rgb(0,0,0)" align="center" | |||
! style="background:rgb(204,204,204); width=50px;" align="center" | Offset | |||
! style="background:rgb(204,204,204); width=50px;" | Length | |||
! style="background:rgb(204,204,204); width:275px;" colspan="2" | Description | |||
|- | |||
|style="background:rgb(255,255,204)" align="center" | 0x00 | |||
|style="background:rgb(255,255,204)" | 4 bytes | |||
|style="background:rgb(255,255,204)" colspan="2" | Unknown | |||
|- | |||
|style="background:rgb(255,255,255)" align="center" | 0x04 | |||
|style="background:rgb(255,255,255)" | 1 byte | |||
|style="background:rgb(255,255,255)" colspan="2" | Casting cost | |||
|- | |||
|style="background:rgb(255,255,204)" align="center" | 0x05 | |||
|style="background:rgb(255,255,204)" | 5 bytes | |||
|style="background:rgb(255,255,204)" colspan="2" | Unknown | |||
|- | |||
|style="background:rgb(255,255,255)" align="center" | 0x0A | |||
|style="background:rgb(255,255,255)" | 2 byte | |||
|style="background:rgb(255,255,255)" colspan="2" | Attack type | |||
|- | |||
|style="background:rgb(255,255,255)" align="center" | 0x0C | |||
|style="background:rgb(255,255,255)" | 1 bytes | |||
|style="background:rgb(255,255,255)" colspan="2" | Attack attribute | |||
|- | |||
|style="background:rgb(204,204,255)" align="center" colspan="2" rowspan="16" | | |||
|style="background:rgb(255,255,255); width:110px" | 0x00 | |||
|style="background:rgb(255,255,255); width:165px" | Escape/Exit-Type | |||
|- | |||
|style="background:rgb(255,255,255)" | 0x01 | |||
|style="background:rgb(255,255,255)" | Ribbon-Like | |||
|- | |||
|style="background:rgb(255,255,204)" | 0x03 | |||
|style="background:rgb(255,255,204)" | Enemy Skill (?) | |||
|- | |||
|style="background:rgb(255,255,204)" | 0x05 | |||
|style="background:rgb(255,255,204)" | Enemy Skill (?) | |||
|- | |||
|style="background:rgb(255,255,204)" | 0x07 | |||
|style="background:rgb(255,255,204)" | Enemy Skill (?) | |||
|- | |||
|style="background:rgb(255,255,255)" | 0x0D | |||
|style="background:rgb(255,255,255)" | Restorative/Protective | |||
|- | |||
|style="background:rgb(255,255,255)" | 0x0F | |||
|style="background:rgb(255,255,255)" | Status-giving/Elemental | |||
|- | |||
|style="background:rgb(255,255,255)" | 0x11 | |||
|style="background:rgb(255,255,255)" | Shield | |||
|- | |||
|style="background:rgb(255,255,255)" | 0x13 | |||
|style="background:rgb(255,255,255)" | Limit Break | |||
|- | |||
|style="background:rgb(255,255,255)" | 0x15 | |||
|style="background:rgb(255,255,255)" | Cait Sith Limit Break | |||
|- | |||
|style="background:rgb(255,255,255)" | 0x17 | |||
|style="background:rgb(255,255,255)" | Summon | |||
|- | |||
|style="background:rgb(255,255,255)" | 0xC7 | |||
|style="background:rgb(255,255,255)" | Roulette | |||
|- | |||
|style="background:rgb(255,255,255)" | 0x97 | |||
|style="background:rgb(255,255,255)" | Multiple Strike Limit Breaks | |||
|- | |||
|style="background:rgb(255,255,255)" | 0x01 | |||
|style="background:rgb(255,255,255)" | Phoenix Down | |||
|- | |||
|style="background:rgb(255,255,255)" | 0x03 | |||
|style="background:rgb(255,255,255)" | X-needles Attack | |||
|- | |||
|style="background:rgb(255,255,255)" | 0x17 | |||
|style="background:rgb(255,255,255)" | Final Limit Break | |||
|- | |||
|style="background:rgb(255,255,255)" align="center" | 0x0D | |||
|style="background:rgb(255,255,255)" | 1 byte | |||
|style="background:rgb(255,255,255)" colspan="2" | ID Number | |||
|- | |||
|style="background:rgb(255,255,255)" align="center" | 0x0E | |||
|style="background:rgb(255,255,255)" | 1 byte | |||
|style="background:rgb(255,255,255)" colspan="2" | Restore Apply | |||
|- | |||
|style="background:rgb(255,255,255)" align="center" | 0x0F | |||
|style="background:rgb(255,255,255)" | 1 byte | |||
|style="background:rgb(255,255,255)" colspan="2" | Strength | |||
|- | |||
|style="background:rgb(255,255,255)" align="center" | 0x10 | |||
|style="background:rgb(255,255,255)" | 1 byte | |||
|style="background:rgb(255,255,255)" colspan="2" | Restore type | |||
|- | |||
|style="background:rgb(204,204,255)" align="center" colspan="2" rowspan="4" | | |||
|style="background:rgb(255,255,255)" | 0x00 | |||
|style="background:rgb(255,255,255)" | Restore HP | |||
|- | |||
|style="background:rgb(255,255,255)" | 0x01 | |||
|style="background:rgb(255,255,255)" | Restore MP | |||
|- | |||
|style="background:rgb(255,255,255)" | 0x02 | |||
|style="background:rgb(255,255,255)" | Restore Ailment | |||
|- | |||
|style="background:rgb(255,255,255)" | 0xFF | |||
|style="background:rgb(255,255,255)" | None | |||
|- | |||
|style="background:rgb(255,255,204)" align="center" | 0x11 | |||
|style="background:rgb(255,255,204)" | 2 bytes | |||
|style="background:rgb(255,255,204)" colspan="2" | Unknown | |||
|- | |||
|style="background:rgb(255,255,255)" align="center" | 0x13 | |||
|style="background:rgb(255,255,255)" | 1 byte | |||
|style="background:rgb(255,255,255)" colspan="2" | Times attacking | |||
|- | |||
|style="background:rgb(255,255,255)" align="center" | 0x14 | |||
|style="background:rgb(255,255,255)" | 4 bytes | |||
( | |style="background:rgb(255,255,255)" colspan="2" | Status | ||
|- | |||
|style="background:rgb(255,255,255)" align="center" | 0x18 | |||
|style="background:rgb(255,255,255)" | 2 bytes | |||
|style="background:rgb(255,255,255)" colspan="2" | Element | |||
|- | |||
|style="background:rgb(255,255,204)" align="center" | 0x20 | |||
|style="background:rgb(255,255,204)" | 2 bytes | |||
|style="background:rgb(255,255,204)" colspan="2" | Unknown | |||
|} |
Revision as of 08:30, 19 October 2008
KERNEL.BIN - Section 2: Attack data format
This section contains the data for the different attacks. Each record is 28 bytes long.
Offset | Length | Description | |
---|---|---|---|
0x00 | 4 bytes | Unknown | |
0x04 | 1 byte | Casting cost | |
0x05 | 5 bytes | Unknown | |
0x0A | 2 byte | Attack type | |
0x0C | 1 bytes | Attack attribute | |
0x00 | Escape/Exit-Type | ||
0x01 | Ribbon-Like | ||
0x03 | Enemy Skill (?) | ||
0x05 | Enemy Skill (?) | ||
0x07 | Enemy Skill (?) | ||
0x0D | Restorative/Protective | ||
0x0F | Status-giving/Elemental | ||
0x11 | Shield | ||
0x13 | Limit Break | ||
0x15 | Cait Sith Limit Break | ||
0x17 | Summon | ||
0xC7 | Roulette | ||
0x97 | Multiple Strike Limit Breaks | ||
0x01 | Phoenix Down | ||
0x03 | X-needles Attack | ||
0x17 | Final Limit Break | ||
0x0D | 1 byte | ID Number | |
0x0E | 1 byte | Restore Apply | |
0x0F | 1 byte | Strength | |
0x10 | 1 byte | Restore type | |
0x00 | Restore HP | ||
0x01 | Restore MP | ||
0x02 | Restore Ailment | ||
0xFF | None | ||
0x11 | 2 bytes | Unknown | |
0x13 | 1 byte | Times attacking | |
0x14 | 4 bytes | Status | |
0x18 | 2 bytes | Element | |
0x20 | 2 bytes | Unknown |