Post Reply 
Thread Rating:
  • 0 Votes - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Decrypted PRX'es of games to see their calls?
05-19-2013, 05:08 PM (This post was last modified: 05-19-2013 06:21 PM by Afinda.)
Post: #1
Decrypted PRX'es of games to see their calls?
Would something like that be needed for futher improvements to the emulator?

Since Metal Gear Solid Portable Ops (The one i have in original(selfdump)) allows access the the games PRX'es i searched the net for some way to decrypt and display it, which actually is possible.

That way it's possible to see what functions/routines the game calls and shows what kind of arguments it needs along that.

Would something like that help with developement?
(Basicly so you have an idea what kind of calls a sub_routine requires for example.)

*EDIT* apparantly this is only possible with sound2.prx and zlib.prx, basicly anything that's already an ELF (Header). Whereas anything with an ~SCE header fails to be decrypted/decompressed so my guess is that sony uses their own Compression/Decryption method on these files which doesn't seem to be cracked yet...?

Gonna try to dump a Firmware and see if there's a way to get a look at the firmware prx'es ...

Example screen attached.

Attached File(s) Thumbnail(s)
Find all posts by this user
Quote this message in a reply
Post Reply 

Forum Jump: