Kuribo64
Views: 23,438,977 Home | Forums | Uploader | Wiki | Object databases | IRC
Rules/FAQ | Memberlist | Calendar | Stats | Online users | Last posts | Search
01-23-25 01:43 PM
Guest:

0 users reading PSA: Always backup anything | 1 bot

Main - General SM64DS hacking - PSA: Always backup anything Hide post layouts | New reply


Staryu Trek
Posted on 01-06-25 08:03 PM Link | #101974
One thing you should always do when hacking SM64DS is making backups and just generally making sure everything you put into your hack also exists on the device you use for hacking SM64DS. So unless a custom asset (model, texture, minimap etc.) goes unused, never delete it.
Export XMLs of all your custom courses. And most importantly, always have a clean, unpatched ROM ready.
A course you're working on, might corrupt, but while working on one course, another one might corrupt too, to a point where you can no longer edit it in SM64DSe. If you have every asset backed-up, all you need to do, is import your assets and XMLs into a clean ROM and you're good to go again. This takes mere minutes, as opposed to starting all over again.

TIP: if a ROM corrupts, don't immediately delete it. Most custom assets are probably still intact, meaning you can extract them from your corrupted ROM and import them into your new ROM using Extract (Raw) and Replace (Raw).

pants64
Posted on 01-07-25 11:56 AM Link | #101975
I've been using private git repos for pretty much all of my SM64DS projects, including the rom, assets, code, etc. It makes it really easy to have everything always backed up, and lets you track down bugs using the commit history. If you make commits often enough, something like corrupting the rom won't even be a problem because you can just restore it to the previous commit.


Main - General SM64DS hacking - PSA: Always backup anything Hide post layouts | New reply

Page rendered in 0.016 seconds. (2048KB of memory used)
MySQL - queries: 28, rows: 198/198, time: 0.010 seconds.
[powered by Acmlm] Acmlmboard 2.064 (2018-07-20)
© 2005-2008 Acmlm, Xkeeper, blackhole89 et al.