Game Console Hacking: Xbox, Playstation, Nintendo, Atari and Gamepark32. Syngress

Have Fun While

Voiding Your Warranty

Joe Grand, Frank Thornton, Albert Yarusso

Special Foreword by
Ralph H. Baer
“The Father of Video Games”

e-books shop
Game Console Hacking
. Xbox, Playstation, Nintendo, Atari and Gamepark32
Acknowledgments
We would like to acknowledge the following people for their kindness and support in making this
book possible. Syngress books are now distributed in the United States and Canada by O’Reilly Media, Inc.The enthusiasm and work ethic at O’Reilly is incredible and we would like to thank everyone there for
their time and efforts to bring Syngress books to market:Tim O’Reilly, Laura Baldwin, Mark
Brokering, Mike Leonard, Donna Selenko, Bonnie Sheehan, Cindy Davis, Grant Kikkert, Opol
Matsutaro, Steve Hazelwood, Mark Wilson, Rick Brown, Leslie Becker, Jill Lothrop,Tim Hinton, Kyle
Hart, Sara Winge, C. J. Rayhill, Peter Pardo, Leslie Crandell,Valerie Dow, Regina Aggio, Pascal
Honscher, Preston Paull, Susan Thompson, Bruce Stewart, Laura Schmier, Sue Willing, Mark Jacobsen,
Betsy Waliszewski, Dawn Mann, Kathryn Barrett, John Chodacki, and Rob Bullington.
The incredibly hard working team at Elsevier Science, including Jonathan Bunkell, Ian Seager, Duncan
Enright, David Burton, Rosanna Ramacciotti, Robert Fairbrother, Miguel Sanchez, Klaus Beran,
Emma Wyatt, Rosie Moss, Chris Hossack, Mark Hunt, and Krista Leppiko, for making certain that our
vision remains worldwide in scope.

David Buckland, Marie Chieng, Lucy Chong, Leslie Lim, Audrey Gan, Pang Ai Hua, and Joseph Chan
of STP Distributors for the enthusiasm with which they receive our books.
Kwon Sung June at Acorn Publishing for his support.

David Scott,Tricia Wilden, Marilla Burgess, Annette Scott, Andrew Swaffer, Stephen O’Donoghue, Bec
Lowe, and Mark Langley of Woodslane for distributing our books throughout Australia, New Zealand,
Papua New Guinea, Fiji Tonga, Solomon Islands, and the Cook Islands.
Winston Lim of Global Publishing for his help and support with distribution of Syngress books in the Philippines. A special thank you to our attorney and friend Gene Landy, whose expertise in “all things intellectual property” is impressive.

Technical Editor & Contributor
Joe Grand; Grand Idea Studio, Inc. Joe Grand is the President of Grand Idea Studio, a San Diegobased
product development and intellectual property licensing firm, where he specializes in the invention
and design of consumer electronics, medical devices, video games, and toys. His latest creations
include the Stelladaptor Atari 2600 Controller-to-USB Interface and the Emic Text-to-Speech Module.

A recognized figure in computer security, Joe has testified before the United States Senate
Governmental Affairs Committee and is a former member of the legendary hacker collective L0pht
Heavy Industries. Joe’s research on mobile devices and embedded security has been published in various
periodicals, including Circuit Cellar and the Digital Investigation Journal. He is the author of many
security-related software tools, including pdd, the first forensic acquisition application for Palm devices.
Joe currently has a patent pending on a hardware-based computer memory imaging concept and apparatus
(U.S. Patent Serial No. 10/325,506).

Joe has presented his work at numerous academic, industry, and private forums, including the
United States Air Force Office of Special Investigations, the Naval Postgraduate School, the IBM
Thomas J.Watson Research Center, the Embedded Systems Conference, the Black Hat Briefings, and
DEFCON. He has appeared in documentaries and news for television, airplane in-flight programming,
and print media outlets. He has also authored Hardware Hacking: Have Fun While Voiding Your Warranty
(Syngress Publishing, ISBN: 1-932266-83-6), contributed to Stealing The Network: How to Own A
Continent (Syngress, ISBN: 1-931836-05-1), and is a frequent contributor to other texts. Joe holds a
Bachelor of Science degree in Computer Engineering from Boston University.
Joe is the author of Chapter 1 “Tools of the Warranty Voiding Trade,” Chapter 2 “Case Modifications:
Building an Atari 2600PC,” Chapter 5 “Nintendo GBA,” Chapter 6 “GP32,” Chapter 7
“NES,” and the Appendices.


Introduction 2.0

The way we customize our things says a lot about who we are.
Today, everywhere we look, we are surrounded by a convergence
of media – videogames, advertisements, and television.We are told
what to believe, how to think, and how to act.We are told what’s
cool and what’s not, what we should buy, what we should wear, and
what music we should listen to.

Hardware hacking has never been about what the mainstream
media thinks. It’s about creativity, education, experimentation, personalization,
and just having fun.This book is no different.
Game Console Hacking focuses on modifying our favorite
videogame systems to do things they were never intended to do, to
add features that we’ve always wanted but the vendors never gave us,
or to create something that has never been done before.
This book is a little bit different than what you might be used to.
We cover a wide spectrum of gaming consoles, from the retro and
arguably archaic Atari systems, to the teenaged Nintendo NES console,
up through the modern consoles like Xbox and PlayStation 2.
There’s something in here for every type of gamer, whether you like
to get your hands dirty with modifying hardware or whether you’re
an aspiring game developer. Step-by-step hacks are presented with a
slew of pictures to hold your hand along the way, as well as resources
to let you jump right in to creating your own games for the systems.
It’s all about education and inspiring you, the reader, to break the
mold of what’s considered “acceptable.” And best of all, you can do so
in the comfort of your own home, without breaking any laws.

Long gone are the days where a few guys can make millions on a self-published
videogame they designed in Mom’s garage. But, the thrill for homebrew game development
is still there; and, it has close ties to hardware hacking in that you are giving the system a
touch of your personal creativity, doing things the way you want to. It gives us a sense of
ownership that a faceless company can’t provide.

There is an underbelly to the videogame industry, which nowadays just seems to only sell
multi-million dollar productions with gameplay based on franchise licenses and the same,
overused 3D game engines.There are thriving development communities for all the systems
we cover in this book.There are people who still yearn to develop games just so they can
play those games. Sharing code samples, socializing with fellow programmers, hacking
videogame systems to allow them to run their custom software, designing games for the sheer
thrill of the kill. For gamers, by gamers.

There’s something to be said for pouring your heart and soul into a creative game design
or hardware hack, and I hope this book will entice you to do so. Inspiration and creativity
can’t be taught or forced.The possibilities are endless.
The way we customize our things says a lot about who we are.
Who are you?
—Joe Grand, author, hardware hacker, and gamer
July 2004


Introduction 1.0
Hardware hacking. Mods.Tweaks.Though the terminology is new,
the concepts are not: A gearhead in the 1950s adding a custom paint
job and turbo-charged engine to his Chevy Fleetline, a ’70s teen converting
his ordinary bedroom into a “disco palace of love,” complete
with strobe lights and a high-fidelity eight-track system, or a technogeek
today customizing his computer case to add fluorescent lighting
and slick artwork.Taking an ordinary piece of equipment and turning
it into a personal work of art. Building on an existing idea to create
something better.These types of self-expression can be found
throughout recorded history.

When Syngress approached me to write Hardware Hacking: Have
Fun While Voiding Your Warranty, our first book on hardware hacking, I
knew they had hit the nail on the head. Where else could a geek like
me become an artistic genius? Combining technology with creativity
and a little bit of skill opened up the doors to a whole new world:
hardware hacking.

But why do we do it? The reasons might be different for all of us,
but the result is usually the same.We end up with a unique thing that
we can call our own—imagined in our minds and crafted through
hours, days, or years of effort. And doing it on our own terms.
Hardware hacking today has hit the mainstream market like never
before. Computer stores sell accessories to customize your desktop
PC.Web sites are popping up like unemployed stock brokers to show
off the latest hacks. Just about any piece of hardware can serve as a
candidate to be hacked. Creativity and determination can get you
much farther than most product developers could ever imagine.
Hardware hacking is usually an individual effort, like creating a piece
of art. However, just like artists, hackers sometimes collaborate and form communities of folks
working toward a similar goal.

The use of the term hacker is a double-edged sword and often carries a mythical feel.
Contrary to the way major media outlets enjoy using the word to describe criminals
breaking into computer systems, a hacker can simply be defined as somebody involved in the
exploration of technology. And a hack in the technology world usually defines a new and
novel creation or method of solving a problem, typically in an unorthodox fashion.
The philosophy of most hardware hackers is straightforward:
  • Do something with a piece of hardware that has never been done before.
  • Create something extraordinary.
  • Harm nobody in the process.

Hardware hacking arguably dates back almost 200 years. Charles Babbage created his difference
engine in the early 1800s—a mechanical form of hardware hacking.William Crookes
discovered the electron in the mid-1800s—possibly the first form of electronics-related hardware
hacking.Throughout the development of wireless telegraphy, vacuum tubes, radio, television,
and transistors, there have been hardware hackers—Benjamin Franklin,Thomas
Edison, and Alexander Graham Bell, to name a few. As the newest computers of the mid-20th
century were developed, the ENIAC, UNIVAC, and IBM mainframes, people from those
academic institutions fortunate enough to have the hardware came out in droves to experiment.
With the development and release of the first microprocessor (Intel 4004) in
November 1971, the general public finally got a taste of computing.The potential for hardware
hacking has grown tremendously in the past decade as computers and technology have
become more intertwined with the mainstream and everyday living.
Hardware hacks can be classified into four different categories, though sometimes a hack
falls into more than one:
1. Personalization and customization Think “hot rodding for geeks,” the most
prevalent of hardware hacking.This includes things such as case modifications,
custom skins and ring tones, and art projects like creating an aquarium out of a vintage
computer.
2. Adding functionality Making the system or product do something it wasn’t
intended to do.This includes things such as converting the iPod to run Linux,
implementing a serial port interface on your PlayStation 2, or modifying the Atari
2600 to support stereo sound.
3. Capacity or performance increase Enhancing or otherwise upgrading a
product.This includes things such as adding memory to your favorite personal digital assistant (PDA), modifying your wireless network card to support an external
antenna, or overclocking your PC’s motherboard.
4. Defeating protection and security mechanisms This includes things such as
removing the unique identifier from CueCat barcode scanners, finding Easter eggs
and hidden menus in a TiVo or DVD player, or creating a custom cable to unlock
the secrets of your cell phone.

Creating your own hardware hacks and product modifications requires at least a basic
knowledge of hacking techniques, reverse engineering skills, and a background in electronics
and coding. All the information you’ll need is in the pages of this book. And if a topic isn’t
covered in intimate detail, we include references to materials that do. If you just want to do
the hack without worrying about the underlying theory behind it, you can do that, too.The
step-by-step sections throughout each chapter include pictures and “how to” instructions.The
details are in separate sections that you can skip right over and get to the fun part—voiding
your warranty!

This book has something for everyone from the beginner hobbyist with little to no electronics
or coding experience to the self-proclaimed “gadget geek” and advanced technologist.
It is one of the first books to bring hardware hacking to the mainstream. It is meant to be
fun and will demystify many of the hacks you have seen and heard about.We, all the contributors
to this project, hope you enjoy reading this book and that you find the hacks as
exciting and satisfying as we have.
If your friends say “Damn, now that’s cool,” then you know you’ve done it right.
—Joe Grand, the hardware hacker formerly known as Kingpin
January 2004


Screenshot

e-books shop

Purchase Now !
Just with Paypal



Product details
 Price
 File Size
 23,290 KB
 Pages
 593 p
 File Type
 PDF format
 ISBN
 1-931836-31-0
 Copyright
 2004 by Syngress Publishing, Inc 

Contents
Foreword . . . . . . . .. . . . . .xxi
Introduction 2.0 . . . . . .  . . . . . .xxvii
Introduction . . . . . . . . . . .xxix
Part I Introduction to Hardware Hacking
Chapter 1 Tools of the Warranty-Voiding Trade
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
The Essential Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5
Basic Hardware Hacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
Advanced Projects and Reverse Engineering . . . . . . . . . . . . . . .13
Where to Obtain the Tools . . . . . . . . . . . . . . . . . . . . . . . . . . .16
Chapter 2 Case Modifications: Building an Atari 2600PC
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
Choosing Your Features:Why the Atari 2600? . . . . . . . . . . . . . .21
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29
Opening the Case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29
Cleaning the Case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
Mocking Up the Design . . . . . . . . . . . . . . . . . . . . . . . . . .32
Configuring the BIOS . . . . . . . . . . . . . . . . . . . . . . . . .35
Installing Software . . . . . . . . . . . . . . . . . . . . . . . . . . . .36
Preparing the Control Panel . . . . . . . . . . . . . . . . . . . . . . .38
Preparing the USB/FireWire Backplane . . . . . . . . . . . . . . .45
Preparing the Cordless Keyboard/Mouse Receiver . . . . . . . .46
Preparing the Stelladaptor 2600 Controller-to-USB Interfaces 51
Preparing the Power Supply Connector . . . . . . . . . . . . . . .54
Preparing the Mini-ITX Motherboard . . . . . . . . . . . . . . . .56
Preparing the Housing . . . . . . . . . . . . . . . . . . . . . . . . . . .59
Putting It All Together . . . . . . . . . . . . . . . . . . . . . . . . . . .67
The CD-ROM Drive . . . . . . . . . . . . . . . . . . . . . . . . . .67
The Motherboard . . . . . . . . . . . . . . . . . . . . . . . . . . . .70
The Hard Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71
The PW70 Power Supply Module . . . . . . . . . . . . . . . . .72
The USB Components . . . . . . . . . . . . . . . . . . . . . . . . .73
The Control Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . .75
Closing It Up: Completing the Atari 2600PC Case
Modification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78
In Conclusion... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .82
Resources and Other Hacks . . . . . . . . . . . . . . . . . . . . . . . . . .82
Case Modifications on the Web . . . . . . . . . . . . . . . . . . . . .82
Stuffing PCs into Videogame System Consoles . . . . . . . .83
Creating Your Own Portable Game System . . . . . . . . . . .83
Parts and Materials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .83
Part II Modern Game Consoles
Chapter 3 The Xbox
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88
Xbox Hardware and Specifications . . . . . . . . . . . . . . . . . . .89
Xbox Versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .90
Opening the Xbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .92
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . .92
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .92
Controller Hacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .95
Controller Versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .96
Getting Inside Your Controller . . . . . . . . . . . . . . . . . . . . . . . .97
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . .97
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .97
Illuminating the Controller Buttons with LEDs . . . . . . . . . .99
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . .99
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .99
Under the Hood: How the Hack Works . . . . . . . . . . . .103
Testing and Troubleshooting . . . . . . . . . . . . . . . . . . . .104
Optional Hack: Illuminating the Controller Logo . . . . . .104
Adding a Remote Reset Switch . . . . . . . . . . . . . . . . . . . .104
Adding a Remote Reset Switch to the Xbox Controller .104
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .104
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .105
Adding a Remote Reset Switch to the Xbox Controller
Memory Card or Xbox Live Communicator . . . . . . . .107
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .107
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . .108
Testing and Troubleshooting . . . . . . . . . . . . . . . . . . . . . . .110
Adding an Xbox Live Communicator to a Wireless
Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .111
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .111
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .112
Xbox Networking Hacks . . . . . . . . . . . . . . . . . . . . . . . . . . .112
Establishing a Network Link Using Standard Networking .113
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .114
Testing and Troubleshooting . . . . . . . . . . . . . . . . . . . .115
Creating Your Own Crossover Cable . . . . . . . . . . . . . . . . . . .116
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .117
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .117
Testing and Troubleshooting . . . . . . . . . . . . . . . . . . . . . . .119
Extending the Network Status LEDs to the Front Panel . . . . . .120
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .120
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .120
Testing and Troubleshooting . . . . . . . . . . . . . . . . . . . . . . .122
Wireless Networking Hacks . . . . . . . . . . . . . . . . . . . . . . . . .123
Adding a Wireless Networking Adapter to the Xbox . . . . . .123
Adding a Removable Antenna to the Microsoft Xbox
Wireless Adapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . .125
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .126
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . .126
Under the Hood: How the Hack Works . . . . . . . . . . . .131
Installing a Modchip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .131
A Brief Introduction to Modchips . . . . . . . . . . . . . . . . . .131
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .135
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .135
Running Linux on an Unmodified Xbox . . . . . . . . . . . . . . .141
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .141
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . .142
Other Hacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .144
Homebrew Game Development . . . . . . . . . . . . . . . . . . . . . .144
Xbox Resources on the Web . . . . . . . . . . . . . . . . . . . . . . . . .146
Chapter 4 PlayStation 2
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .148
Commercial Hardware Hacking: Modchips . . . . . . . . . . . . . . .148
Getting Inside the PS2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . .150
Mainboard Revisions . . . . . . . . . . . . . . . . . . . . . . . . . . .150
Identifying Your Mainboard . . . . . . . . . . . . . . . . . . . . .151
Opening the PS2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .152
Installing a Serial Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .156
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .157
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .158
Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .164
Under the Hood: How the Hack Works . . . . . . . . . . . . . .164
Booting Code from the Memory Card . . . . . . . . . . . . . . . . . .164
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .165
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . .165
Preparing TITLE.DB . . . . . . . . . . . . . . . . . . . . . . . . .165
Choosing BOOT.ELF . . . . . . . . . . . . . . . . . . . . . . . . .168
Saving TITLE.DB to the Memory Card . . . . . . . . . . . .168
Independence! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .169
Under the Hood: How the Hack Works . . . . . . . . . . . . . .169
Other Hacks: Independent Hard Drives . . . . . . . . . . . . . . . . .171
PS2 Technical Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .171
Understanding the Emotion Engine . . . . . . . . . . . . . . . . .172
The Serial I/O Port . . . . . . . . . . . . . . . . . . . . . . . . . .173
The I/O Processor . . . . . . . . . . . . . . . . . . . . . . . . . . . . .175
The Sub-CPU Interface . . . . . . . . . . . . . . . . . . . . . . . . .176
Homebrew Game Development . . . . . . . . . . . . . . . . . . . . . .176
PS2 Resources on the Web . . . . . . . . . . . . . . . . . . . . . . . . . .177
Part III Handheld Game Platforms 
Chapter 5 Nintendo Game Boy Advance
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .182
Game Boy, 1989 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .182
Game Boy Pocket, 1996 . . . . . . . . . . . . . . . . . . . . . . . . .183
Game Boy Color, 1998 . . . . . . . . . . . . . . . . . . . . . . . . . .183
Game Boy Advance, 2001 . . . . . . . . . . . . . . . . . . . . . . . .184
Game Boy Advance SP, 2003 . . . . . . . . . . . . . . . . . . . . . .185
A Very Brief History of Nintendo . . . . . . . . . . . . . . . . . . . . .186
Opening the GBA Console . . . . . . . . . . . . . . . . . . . . . . . . . .187
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .187
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .188
Replacing the Display Lens . . . . . . . . . . . . . . . . . . . . . . . . . .193
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .194
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .194
Light Up Your LCD with the GBA Afterburner Mod . . . . . . . .198
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .198
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .200
Removing the LCD . . . . . . . . . . . . . . . . . . . . . . . . . .201
Preparing the GBA Housing . . . . . . . . . . . . . . . . . . . .203
Preparing the LCD . . . . . . . . . . . . . . . . . . . . . . . . . . .206
Preparing the Afterburner Module . . . . . . . . . . . . . . . .209
Installing the Afterburner Module . . . . . . . . . . . . . . . .211
Adding the Brightness Control (Optional) . . . . . . . . . . .214
Under the Hood: How the Hack Works . . . . . . . . . . . . . .216
Enhancing Your Afterburner with the GBA Stealth Dimmer Chip 217
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .218
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .219
Under the Hood: How the Hack Works . . . . . . . . . . . . . .225
Nintendo GBA Technical Specifications . . . . . . . . . . . . . . . . .226
The Central Processor . . . . . . . . . . . . . . . . . . . . . . . . . . .226
CPU Registers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .227
Memory Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . .228
Internal Working RAM . . . . . . . . . . . . . . . . . . . . . . .229
External Working RAM . . . . . . . . . . . . . . . . . . . . . . .230
Graphics Memory . . . . . . . . . . . . . . . . . . . . . . . . . . .230
Game ROM and Game Save Memory . . . . . . . . . . . . .231
The Graphics System . . . . . . . . . . . . . . . . . . . . . . . . . . .231
Tile-Based Modes (0–2) . . . . . . . . . . . . . . . . . . . . . . .232
Bitmap-Based Modes (3–5) . . . . . . . . . . . . . . . . . . . . .232
The Sound System . . . . . . . . . . . . . . . . . . . . . . . . . . . . .233
Homebrew Game Development . . . . . . . . . . . . . . . . . . . . . .233
Other Hacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .234
Nintendo GBA Resources on the Web . . . . . . . . . . . . . . . . . .238
Chapter 6 Gamepark 32 (GP32)
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .242
Out of the Box: Configuring Your GP32 . . . . . . . . . . . . . . . .245
Opening the GP32 Console . . . . . . . . . . . . . . . . . . . . . . . . .251
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .251
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .251
Replacing the GP32 Screen Cover . . . . . . . . . . . . . . . . . . . . .257
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .258
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .258
Repairing Your Buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . .262
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .262
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .263
Accelerating Your GP32 (CPU Core Voltage Increase) . . . . . . .264
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .265
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .265
Under the Hood: How the Hack Works . . . . . . . . . . . . . .268
Creating a DC Power Adapter . . . . . . . . . . . . . . . . . . . . . . . .269
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .269
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .273
Under the Hood: How the Hack Works . . . . . . . . . . . . . .275
Installing the Multifirmware Loader . . . . . . . . . . . . . . . . . . . .275
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .276
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .276
Backing Up Your Firmware . . . . . . . . . . . . . . . . . . . . .276
Reprogramming (Flashing) the New Firmware . . . . . . .278
Homebrew Game Development . . . . . . . . . . . . . . . . . . . . . .280
Other Hacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .284
GP32 Resources on the Web . . . . . . . . . . . . . . . . . . . . . . . . .286
Part IV Retro and Classic Systems . . . . . . . . . . . . . . . . . . .289
Chapter 7 Nintendo NES
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .292
Opening the NES Console . . . . . . . . . . . . . . . . . . . . . . . . . .294
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .294
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .294
Replacing the 72-Pin Cartridge Connector . . . . . . . . . . . . . .299
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .300
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .301
Blue Power LED Modification . . . . . . . . . . . . . . . . . . . . . . .302
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .303
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .304
Under the Hood: How the Hack Works . . . . . . . . . . . . . .310
Disabling the NES “Lockout Chip” . . . . . . . . . . . . . . . . . . . .311
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .312
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .312
Optional: Adding a Switch . . . . . . . . . . . . . . . . . . . . . . . .315
Under the Hood: How the Hack Works . . . . . . . . . . . . . .315
Opening an NES Game Cartridge . . . . . . . . . . . . . . . . . . . . .316
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .316
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .318
Replacing the Battery in Certain Game Cartridges . . . . . . . . .319
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .320
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .321
Creating an EPROM Cartridge for Homebrew Game
Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .324
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .324
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .325
Under the Hood: How the Hack Works . . . . . . . . . . . . . .330
Homebrew Game Development . . . . . . . . . . . . . . . . . . . . . .330
Other Hacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .332
NES Resources on the Web . . . . . . . . . . . . . . . . . . . . . . . . .333
Chapter 8 Atari 2600
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .336
Hacks in This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . .337
Atari 2600 Left-Handed Joystick Modification . . . . . . . . . . . . .337
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .338
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .338
Repair Your Atari 2600 Joysticks . . . . . . . . . . . . . . . . . . . . . .342
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .342
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .343
Revitalize Your Atari 2600 Paddles . . . . . . . . . . . . . . . . . . . . .349
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .350
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .350
Use an NES Control Pad with your 2600 . . . . . . . . . . . . . . . .356
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .357
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .358
Atari 2600 S-Video/Audio Mod . . . . . . . . . . . . . . . . . . . . . .364
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .364
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .366
Optional: Commodore 1702 Hack . . . . . . . . . . . . . . . . . .380
Optional: Do-It-Yourself 2600 A/V Mod . . . . . . . . . . . . .381
Technical Information . . . . . . . . . . . . . . . . . . . . . . . . . . .381
Atari 2600 Stereo Audio Output . . . . . . . . . . . . . . . . . . . . . .382
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .384
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .384
Under the Hood: How the Hack Works . . . . . . . . . . . . . .391
Homebrew Game Development . . . . . . . . . . . . . . . . . . . . . .391
Atari 2600 Resources on the Web . . . . . . . . . . . . . . . . . . . . .396
Chapter 9 Atari 5200
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .400
Opening the Atari 5200 . . . . . . . . . . . . . . . . . . . . . . . . . . . .401
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .401
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .401
Reassembly . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .408
Atari 5200 Blue LED Modification . . . . . . . . . . . . . . . . . . . .408
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .409
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .410
Under the Hood: How the Hack Works . . . . . . . . . . . . . .413
Atari 5200 Two-Port BIOS Replacement . . . . . . . . . . . . . . . .413
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .414
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .414
Creating an Atari 5200 Paddle Controller . . . . . . . . . . . . . . . .419
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .421
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .421
Disassembling the Atari 2600 Paddle Controller . . . . . . .422
Building the 5200 Paddle Controller . . . . . . . . . . . . . .424
Adding a Weighted Dial . . . . . . . . . . . . . . . . . . . . . . .432
Under the Hood: How the Hack Works . . . . . . . . . . . . . .433
Freeing Yourself from the 5200 Four-Port Switchbox . . . . . . . .434
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .435
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .436
Under the Hood: How the Hack Works . . . . . . . . . . . . . .445
Atari 5200 Video and Audio Upgrade Modification . . . . . . . . .446
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .447
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .449
Other Hacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .467
Rebuilding Atari 5200 Controllers . . . . . . . . . . . . . . . . . .467
Atari 5200 Four-Port VCS Cartridge Adapter Fix . . . . . . . .470
Homebrew Game Development . . . . . . . . . . . . . . . . . . . . . .470
Atari Resources on the Web . . . . . . . . . . . . . . . . . . . . . . . . .474
Chapter 10 Atari 7800
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .478
Hacks in This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . .479
Blue LED Modification . . . . . . . . . . . . . . . . . . . . . . . . . . . .479
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .480
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .481
Under the Hood: How the Hack Works . . . . . . . . . . . . . .485
Game Compatibility Hack to Play Certain Atari 2600 Games . .486
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .487
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .487
Under the Hood: How the Hack Works . . . . . . . . . . . . . .489
Voltage Regulator Replacement . . . . . . . . . . . . . . . . . . . . . .490
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .490
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .491
Under the Hood: How the Hack Works . . . . . . . . . . . . . .494
Power Supply Plug Retrofit . . . . . . . . . . . . . . . . . . . . . . . . . .495
Preparing for the Hack . . . . . . . . . . . . . . . . . . . . . . . . . .496
Performing the Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .497
Other Hacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .501
Atari 7800 Composite and S-Video Output . . . . . . . . . . . .501
Sega Genesis to Atari 7800 Controller Modification . . . . . .501
NES Control Pad to Atari 7800 Controller Modification . . .502
Atari 7800 DevOS Modification and Cable Creation . . . . .502
Homebrew Game Development . . . . . . . . . . . . . . . . . . . . . .502
Atari 7800 Resources on the Web . . . . . . . . . . . . . . . . . . . . .506
Appendix A Electrical Engineering Basics
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .510
Fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .510
Bits, Bytes, and Nibbles . . . . . . . . . . . . . . . . . . . . . . . . . .510
Reading Schematics . . . . . . . . . . . . . . . . . . . . . . . . . . . .514
Voltage, Current, and Resistance . . . . . . . . . . . . . . . . . . . .516
Direct Current and Alternating Current . . . . . . . . . . . .517
Resistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .518
Ohm’s Law . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .518
Basic Device Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .519
Resistors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .519
Capacitors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .521
Diodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .524
Transistors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .526
Integrated Circuits . . . . . . . . . . . . . . . . . . . . . . . . . . . . .528
Microprocessors and Embedded Systems . . . . . . . . . . . . . . . . .530
Soldering Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .531
Hands-On Example: Soldering a Resistor to a Circuit Board 531
Desoldering Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .533
Hands-On Example: SMD Removal Using ChipQuik . .534
Common Engineering Mistakes . . . . . . . . . . . . . . . . . . . . . . .537
Web Links and Other Resources . . . . . . . . . . . . . . . . . . . . . .538
General Electrical Engineering Books . . . . . . . . . . . . . . . .538
Electrical Engineering Web Sites . . . . . . . . . . . . . . . . . . .539
Data Sheets and Component Information . . . . . . . . . . . . .539
Major Electronic Component and Parts Distributors . . . . . .540
Obsolete and Hard-to-Find Component Distributors . . . . .540
Appendix B: Coding 101 and Appendix C: Operating Systems
Index 541

  ●▬▬▬▬▬❂❂❂▬▬▬▬▬●
●▬▬❂❂▬▬●
●▬❂▬●

═════ ═════

Previous Post Next Post