SMW-SA1-Pack
SMW-SA1-Pack copied to clipboard
SA-1 Pack 1.40 hijacks twice the same address ($01AB88)
As title says, $01AB88 is hijacked twice, once at https://github.com/VitorVilela7/SMW-SA1-Pack/blob/a520d82f46a358899bc8731752f608968ad24a91/asm/more_sprites/dp_nontrivial_remap.asm#L418 and at https://github.com/VitorVilela7/SMW-SA1-Pack/blob/a520d82f46a358899bc8731752f608968ad24a91/asm/more_sprites/more_sprites.asm#L326
Once inserting an LDA ($EE) and the other time inserting a JML. The JML is what ultimately ends up in the ROM but I'm pretty sure it should be the indirect pointer read instead.
I just wanted to report this and confirm that it is a bug or something intended