zachtronics, being the nerdsniping master he is, wrote a "reverse engineering walkthrough" because he hates that i have free time sometimes
aaaand i've successfully managed to extract images from this binary, like in the post!
i'll work on the palette later, but this is really cool!
success!
though admittedly the palette wasn't in the data file, so i couldn't follow along the extraction of it--it's just a big vector without reason
the way i wanted to *try* and find the palette and extract it turned out to be correct though! it just wasn't anywhere i could possibly do that
i also wrote the flags for each tile into their filenames, since there's no other way to express them meaningfully right now
i've always wanted to learn how to reverse engineer and analyze data, so i'm super-grateful this exists!
it really helps see what the mindset behind it is--plus doing it in another language just solidifies the hands-on part of all of this