1
ROM Hacking Discussion / Re: Extract Intel Hex files from MAME ROM files
« on: September 05, 2021, 07:27:52 am »
Thanks Jorpho ~
I have the downloaded ROM files for Defender, but need to determine their format and whether or not they are directly suitable for PROM burning or require a conversion first. I will use an editor to open each one and determine how the contents are organized. I suspect they may be in .bin format. BTW, I've started to read out the physical ROMs that I do have using my PROM Programmer. I am saving those content files and will compare them to the Red Label files from the MAME download. I'll get there.
September 06, 2021, 01:12:12 pm - (Auto Merged - Double Posts are not allowed before 7 days.)
Ok, so I figured out the 15 files in defender.zip (decoder.2, decoder.3, defend.1 ~ defend.12, and defend.snd) are all raw binary files; i.e., they hold the raw bytes of the ROM images (just like the filetype *.bin). I didn't know this before.
I was able to use my PROM reader/programmer to read the contents of the ROM parts (the few I have) and verify they match with the .bin files from defender.zip.
So, now I can begin programming my new UV-EPROMs using the data extracted from defender.zip and end up with a set of ROMs ready for testing in the hardware.
I used the program HxD to open and view the raw hex values from the MAME file set; used the IntelHex Python library to convert these to Intel Hex (.hex) files; then used Notepad++ to view and compare the .hex contents to the raw hex .bin contents in HxD.
Thanks for your initial comments, folks!
I have the downloaded ROM files for Defender, but need to determine their format and whether or not they are directly suitable for PROM burning or require a conversion first. I will use an editor to open each one and determine how the contents are organized. I suspect they may be in .bin format. BTW, I've started to read out the physical ROMs that I do have using my PROM Programmer. I am saving those content files and will compare them to the Red Label files from the MAME download. I'll get there.
September 06, 2021, 01:12:12 pm - (Auto Merged - Double Posts are not allowed before 7 days.)
Ok, so I figured out the 15 files in defender.zip (decoder.2, decoder.3, defend.1 ~ defend.12, and defend.snd) are all raw binary files; i.e., they hold the raw bytes of the ROM images (just like the filetype *.bin). I didn't know this before.
I was able to use my PROM reader/programmer to read the contents of the ROM parts (the few I have) and verify they match with the .bin files from defender.zip.
So, now I can begin programming my new UV-EPROMs using the data extracted from defender.zip and end up with a set of ROMs ready for testing in the hardware.
I used the program HxD to open and view the raw hex values from the MAME file set; used the IntelHex Python library to convert these to Intel Hex (.hex) files; then used Notepad++ to view and compare the .hex contents to the raw hex .bin contents in HxD.
Thanks for your initial comments, folks!