

If the hacks start messing with code (different jumps, functionality and what have you, like I have seen a few go in for) then that gets far harder again - any such hack made before this likely was an assembly hack laid on top of the original and thus won't likely decompile to anything useful. Good hackers making good hacks have good reason to make radical changes as well though, and it is far from unexpected for such a thing to happen.). I don't have the most experience with Mario 64 hacks but I have seen what I consider amazing hacks do things that would be fairly minimal changes to the ROM, and have seen new kids rock up and play with a GUI editor to in turn radically change things despite the end result being junk and also not that apparent in normal play. The further the hacks get from the original ROM in terms of general overview (as in the stages can be entirely new but if it is still the original notion of 15 stages going off similar layout to the original ROM then that is not much of a change for this sort of analysis) then the harder this gets (Someone starts expanding this to dozens of levels beyond what the original had and that gets trickier by far. Might even be reasonably doable (especially as we technically have the source code to the ROM) to make a tool that is aware of things to know where something else exists now - we have seen a few things like this before (pokemon tools often will read all the various pointers down the line to find something that has been relocated, and atrius' golden sun tools also provide an example of some more content aware stuff) so it is not unbroken ground. If they are just assets then chances are it can be ported out, or maybe remade, in reasonably short order as these things often still want the original assets to build the code. It is certainly not going to just be a matter of finding the new address and decrypting or decompressing a ROM like it might have been for the various official emulated versions or other N64 emulators people are injecting things into. Click to expand.Depending upon what the hacks do that can get tricky.
