Is a ekx/ek6 file just a copy of how the pokemon data structure would look in RAM? I'm trying to understand how the web exploit works more.
Furthermore, where does one learn the entry point to copy the contents of the ekx/ek6 file over? Is this something that was reverse engineered from a RAM dump? Is the addressing dynamic or is there a specific hex string that you'd be looking for?
I'm under the impression that this exploit just works by performing a memcpy of a pokemon data structure from a file into the proper place in RAM.
Thanks for your time!