Tools and code for understanding F-Zero GX internals. Includes tools for
preparing save files with the strcpy() exploit we found for SGDQ2018, and
also includes an example of a loader for booting DOL files from memory card.
You can import the py/fgx_format.py and py/fgx_encode.py scripts in order
to have some interfaces for manipulating F-Zero GX save files in Python.
Read some of the other scripts in py/ for example usage.
If you're interested in the mechanics of the strcpy() exploit, have a read
through py/prepare-ace.py.
You'll have to drop in a valid F-Zero GX garage data file into this directory
first, and then set the BASE_GCI variable in dol-loader/Makefile.
Then, you should just have to run make (note that you'll also have to have
devkitPPC installed -- the current Makefile assumes that the
powerpc-eabi-{objcopy,ld,gcc} binaries are already in your $PATH).