Custom Code/Setting up Ghidra: Difference between revisions
Jump to navigation
Jump to search
Content added Content deleted
Jhmaster2000 (talk | contribs) (many fixes) |
Jhmaster2000 (talk | contribs) m (add category) |
||
Line 28: | Line 28: | ||
# It will ask you if you would like to analyze the file. Click '''Yes''' and in the menu that shows up, disable '''Non-Returning Functions - Discovered''', and click on the '''Demangle''' option and check the box on the right that says '''Only Demangle Known Mangled Symbols'''. |
# It will ask you if you would like to analyze the file. Click '''Yes''' and in the menu that shows up, disable '''Non-Returning Functions - Discovered''', and click on the '''Demangle''' option and check the box on the right that says '''Only Demangle Known Mangled Symbols'''. |
||
# Click '''Analyze''' and wait for it to finish. This may take a while. Once it finishes, you are done! You may now start reverse-engineering the code. |
# Click '''Analyze''' and wait for it to finish. This may take a while. Once it finishes, you are done! You may now start reverse-engineering the code. |
||
[[Category:Guides]] |
Latest revision as of 07:49, 5 May 2022
Ghidra is an open source reverse-engineering tool developed by the NSA. It is extremely useful for studying the code of New Super Mario Bros. U to help with creating custom code for it.
Installation[edit | edit source]
Requirements[edit | edit source]
- Java JDK 11+
- 64-bit operating system
Steps[edit | edit source]
- Download Ghidra v10.1-DEV Fork from here.
- Extract it to a new folder of your choice. The directory that contains ghidraRun.bat will now be called "GhidraDir" from now on.
- Download GhidraRPXLoader from here and extract the zip to GhidraDir/Ghidra/Extensions/.
Importing the RPX[edit | edit source]
Requirements[edit | edit source]
- New Super Mario Bros. U RPX (US v1.3.0 recommended)
Steps[edit | edit source]
- Run ghidraRun.bat and go to File -> New Project.
- Select Non-Shared and give your project a name and a directory.
- Go to File -> Import File and select your RPX. Make sure that the settings are as follows:
- Click Ok and wait for the file to finish importing. Double click on the RPX in the Ghidra project and it should open the CodeBrowser.
- It will ask you if you would like to analyze the file. Click Yes and in the menu that shows up, disable Non-Returning Functions - Discovered, and click on the Demangle option and check the box on the right that says Only Demangle Known Mangled Symbols.
- Click Analyze and wait for it to finish. This may take a while. Once it finishes, you are done! You may now start reverse-engineering the code.