Get the latest tech news
Using Ghidra and Python to reverse engineer Ecco the Dolphin
Re-routing the encryption
Ecco the Dolphin: Defender of the Future has some previously unrecognized cheat features that activate based on what you name your save file. By analyzing a memory snapshot from the flycast emulator, I found that the buffer at 8cfffb34 holds the visible portion of the initials you type in. I’ve got lots of other articles on finding previously unknown cheat codes — see my archive here.
Or read this on Hacker News