Main Menu

Glitches

References/Resources

Affiliates

Technical

Search Wiki

Toolbox

Difference between revisions of "ItemDex/RB:100"
 Page | Discussion | View source | History

From Glitch City Laboratories

Jump to: navigation, search
[checked revision][checked revision]
Line 1: Line 1:
 +
([[ItemDex|↑ Back to the ItemDex index]].)
 +
{{ItemInfoGenI
 +
|1=v##t#m#<br>[[File:RB item 64 inventory.png]]
 +
|2=64
 +
|3=100
 +
|4=EAAF
 +
|5=No
 +
|6=Yes
 +
|7=858180 (7#8180)
 +
|8=429090}}
  
v##t#m#
+
[[File:RBItem64.png|link=]] (hex:64) is a [[glitch item]] in {{RB}}.
v##t#m#
 
Dec: 100
 
Hex: 64
 
Price: 858180
 
Sell Price: 429090
 
Effect Outside: Executes Echo RAM EAAF
 
Effect in Battle: Executes Echo RAM EAAF
 
  
 +
The name of this glitch item is taken from the unused Japanese string "おじぞうバッヂ" (JizoBadge), which was left in the English games untranslated, resulting in [[mojibake]]. おじぞうバッヂ is also the name of the hex:64 glitch item in Japanese versions.
  
Effect pointer EAAF
+
Using this glitch item will cause [[arbitrary code execution]] at EAAF (Echo RAM for CAAF).
  
 +
{{clr}}
 
[[Category:Glitch items]]
 
[[Category:Glitch items]]
 
[[Category:Pokémon Red and Blue glitch items]]
 
[[Category:Pokémon Red and Blue glitch items]]
 
[[Category:Arbitrary code execution glitch items]]
 
[[Category:Arbitrary code execution glitch items]]
 +
[[Category:ItemDex]]

Revision as of 13:14, 14 November 2017

(↑ Back to the ItemDex index.)

Name (transcribed): v##t#m#
RB item 64 inventory.png

Identifier (HEX): 64
Identifier (DEC): 100
Effect pointer: EAAF
Unterminated name glitch item?: No
Tossable/Sellable?: Yes
Buy Price: 858180 (7#8180)
Sell Price: 429090
Name bytes: {{{9}}}

RBItem64.png (hex:64) is a glitch item in Pokémon Red and Blue.

The name of this glitch item is taken from the unused Japanese string "おじぞうバッヂ" (JizoBadge), which was left in the English games untranslated, resulting in mojibake. おじぞうバッヂ is also the name of the hex:64 glitch item in Japanese versions.

Using this glitch item will cause arbitrary code execution at EAAF (Echo RAM for CAAF).