RO:UnloadCRO

From 3dbrew
Jump to: navigation, search

Request[edit]

Index Word Description
0 Header code [0x000500C2]
1 Base address of the mapped CRO, in the process memory, originally passed to RO:LoadExeCRO.
2 Unknown, usually zero?
3 Original address where the CRO was first located in process memory(such as the process heap), also passed to RO:LoadExeCRO.
4 Must be zero
5 KProcess handle

Response[edit]

Index Word Description
0 Header code
1 Result code

Description[edit]

This function patches the CRO binary in memory. It sets up imported symbols (functions+data) according to Import Table(s).