Action Replay decoder - pseudocode

Game Hacks, Trainers, Cheats

Moderator: Ralf@gc-forever

Post Reply
Borg Number One
Posts: 28
Joined: Sat Jan 30, 2021 8:02 pm

Action Replay decoder - pseudocode

Post by Borg Number One » Wed Dec 08, 2021 8:44 pm

Hi.

With the help of GCNcrypt you can decrypt GameCube Action Replay Codes.
However, is there any way / any tool to convert the decrypted code to a pseudo code?

Something like this (for DS AR codes) https://eldred.fr/nds-ar-encoder/
...for GameCube AR codes would be cool
User avatar
Andross89
Posts: 325
Joined: Sun May 25, 2014 10:02 pm

Re: Action Replay decoder - pseudocode

Post by Andross89 » Thu Dec 09, 2021 9:41 am

Borg Number One wrote:
Wed Dec 08, 2021 8:44 pm
Hi.

With the help of GCNcrypt you can decrypt GameCube Action Replay Codes.
However, is there any way / any tool to convert the decrypted code to a pseudo code?

Something like this (for DS AR codes) https://eldred.fr/nds-ar-encoder/
...for GameCube AR codes would be cool
I don't think I understood your question. The GCNcrypt can create any encrypted code sequence. You just need the game ID, or just create, and respect the standard format.
Borg Number One
Posts: 28
Joined: Sat Jan 30, 2021 8:02 pm

Re: Action Replay decoder - pseudocode

Post by Borg Number One » Tue Dec 28, 2021 10:01 pm

Hi,

on http://www.gc-linux.org/wiki/SDload you can see (encrypted) AR codes for starting SDLoad with the help of action replay.
So, with the help of GCNCrypt these codes can be decrypted to unencrypted Action Replay Codes / " instructions"

For example:

7YPR-RKZZ-MH6W5
D26A-PE4J-1XX2W
ZJHY-B1ZH-6P00G

will be decrypted to:

0F420000 88000000
04001DD8 4BFFFB50
01100000 1FFFFF00


And:

AF4H-JPF5-H1B5J
MVAB-7TQE-ABZPB
V2CK-QQ1A-Y6P72
M5N6-CMMH-9EURT
0JFM-3A6C-VZ6VK
KYV8-0JGV-0GR1N
2EGU-HVKF-NDMCN
7AH0-J9JZ-HHGNJ
4MHU-G8XT-ZRYCJ
9474-KF41-8KG34
QMEV-G90N-A8RV0
KD4G-5QHV-74D46
V97K-652Q-Y4TEY
6M4W-9GPT-E99NG
QPFY-DJAF-E01FV
2Z6E-P2WY-24WV4
6NHW-G3NH-HP31Y
A2KF-MCKN-D645J
K5V8-EF9W-7GFQC
XTU3-269T-VH5NE
H9GP-C4PP-6FGF9
HF77-R45C-ZXPDV
22Y3-D98C-50AJM
WTWZ-EC88-U5ZTV
36G1-UGDG-J2G84
DUMT-15KR-DXJ8K
JV55-6VF5-2Z02T
D4R8-MVJ5-QGR21
1G3C-APD7-1CUVD

will be decrypted to:

0F420001 08000000
7C6000A6 5463045E
7C600124 3C60CC00
38A004C9 3FA0FF00
7CA903A6 48000071
4200FFFC 38C00000
38E00000 48000079
3CC00100 48000071
48000055 77FFFF00
4082FFF0 90636800
3D208100 7CA903A6
3CC01100 48000051
48000035 3C9F0200
7484FF00 4082FFF4
48000025 57FF463E
7FE921AE 7C0920AC
38840001 4200FFEC
39290040 7D2803A6
4E800021 93A36810
90A3680C BBC3680C
73DE0001 4082FFF8
4E800020 7D0802A6
90A36800 4BFFFFE1
64DD4000 4BFFFFD9
3BA00004 4BFFFFD1
37BDFFFF 4082FFF8
3FA09500 4BFFFFC1
3FA0FF00 4BFFFFB9
7D0803A6 4E800020


I just would like to know, if there is a kind of (online / win32/64) decoder that can decode the decrypted AR codes to a more human readable format / pseudo code.

Maybe, is there a decoder using these specifications?:

https://github.com/dolphin-emu/dolphin/ ... Code-Types
https://github.com/dolphin-emu/dolphin/ ... e-Version)
https://gist.github.com/Nanquitas/d6c92 ... ffa76de860
User avatar
Andross89
Posts: 325
Joined: Sun May 25, 2014 10:02 pm

Re: Action Replay decoder - pseudocode

Post by Andross89 » Wed Dec 29, 2021 8:54 am

Borg Number One wrote:
Tue Dec 28, 2021 10:01 pm
Hi,

on http://www.gc-linux.org/wiki/SDload you can see (encrypted) AR codes for starting SDLoad with the help of action replay.
So, with the help of GCNCrypt these codes can be decrypted to unencrypted Action Replay Codes / " instructions"

For example:

7YPR-RKZZ-MH6W5
D26A-PE4J-1XX2W
ZJHY-B1ZH-6P00G

will be decrypted to:

0F420000 88000000
04001DD8 4BFFFB50
01100000 1FFFFF00


And:

AF4H-JPF5-H1B5J
MVAB-7TQE-ABZPB
V2CK-QQ1A-Y6P72
M5N6-CMMH-9EURT
0JFM-3A6C-VZ6VK
KYV8-0JGV-0GR1N
2EGU-HVKF-NDMCN
7AH0-J9JZ-HHGNJ
4MHU-G8XT-ZRYCJ
9474-KF41-8KG34
QMEV-G90N-A8RV0
KD4G-5QHV-74D46
V97K-652Q-Y4TEY
6M4W-9GPT-E99NG
QPFY-DJAF-E01FV
2Z6E-P2WY-24WV4
6NHW-G3NH-HP31Y
A2KF-MCKN-D645J
K5V8-EF9W-7GFQC
XTU3-269T-VH5NE
H9GP-C4PP-6FGF9
HF77-R45C-ZXPDV
22Y3-D98C-50AJM
WTWZ-EC88-U5ZTV
36G1-UGDG-J2G84
DUMT-15KR-DXJ8K
JV55-6VF5-2Z02T
D4R8-MVJ5-QGR21
1G3C-APD7-1CUVD

will be decrypted to:

0F420001 08000000
7C6000A6 5463045E
7C600124 3C60CC00
38A004C9 3FA0FF00
7CA903A6 48000071
4200FFFC 38C00000
38E00000 48000079
3CC00100 48000071
48000055 77FFFF00
4082FFF0 90636800
3D208100 7CA903A6
3CC01100 48000051
48000035 3C9F0200
7484FF00 4082FFF4
48000025 57FF463E
7FE921AE 7C0920AC
38840001 4200FFEC
39290040 7D2803A6
4E800021 93A36810
90A3680C BBC3680C
73DE0001 4082FFF8
4E800020 7D0802A6
90A36800 4BFFFFE1
64DD4000 4BFFFFD9
3BA00004 4BFFFFD1
37BDFFFF 4082FFF8
3FA09500 4BFFFFC1
3FA0FF00 4BFFFFB9
7D0803A6 4E800020


I just would like to know, if there is a kind of (online / win32/64) decoder that can decode the decrypted AR codes to a more human readable format / pseudo code.

Maybe, is there a decoder using these specifications?:

https://github.com/dolphin-emu/dolphin/ ... Code-Types
https://github.com/dolphin-emu/dolphin/ ... e-Version)
https://gist.github.com/Nanquitas/d6c92 ... ffa76de860
Could you show an example of "human readable format"? I still do not understand. For me, the code needs to be encrypted or in RAW. I can't imagine another alternative. Or the need for it.
knuckles2007
Posts: 3
Joined: Tue Aug 17, 2021 3:21 am

Re: Action Replay decoder - pseudocode

Post by knuckles2007 » Wed May 24, 2023 4:03 am

can somebody please convert this pikmin 2 european co-op story mode code into a US action replay gamecube format

0414DA94 3BE00002 <— i really badly want to try this out… it’s supposed to be a co-op story mode but it’s for the European version of pikmin 2 on the wii…
Post Reply