Toggle menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

MDT (Gotcha Force): Difference between revisions

No edit summary
No edit summary
Line 14: Line 14:
* 000 dat file contains at first sight all texts of the game (Related to all dat file, not only one).
* 000 dat file contains at first sight all texts of the game (Related to all dat file, not only one).
* 001 TPL including an alphanumeric alphabet used by the dat file
* 001 TPL including an alphanumeric alphabet used by the dat file
dat file header:
* 4 bytes - header_length
* 4 bytes - symbols_count # number of symbols contained in the tpl
* 2 bytes - symbols id (array)


Virtual World RE has developed the python script [https://github.com/Virtual-World-RE/NeoGF/tree/main/pzztool pzztool.py] to manipulate MDT files and their internal files.
Virtual World RE has developed the python script [https://github.com/Virtual-World-RE/NeoGF/tree/main/pzztool pzztool.py] to manipulate MDT files and their internal files.

Revision as of 21:44, 6 September 2022

← Gotcha Force

This section is currently being written.
More research is needed and some paragraphs may be wrong.

MDT files are similar to PZZ files, with a header of 0x800 / 2048 bytes including :

  • the number of files (uint32 big endian)
  • the file size / 0x800 for each file

It is possible to unpack and repack .mdt files with the pzztool.py tool. Unlike pzz, the internal files of .mdt are packaged and not compressed.

  • 000 dat file contains at first sight all texts of the game (Related to all dat file, not only one).
  • 001 TPL including an alphanumeric alphabet used by the dat file

dat file header:

  • 4 bytes - header_length
  • 4 bytes - symbols_count # number of symbols contained in the tpl
  • 2 bytes - symbols id (array)

Virtual World RE has developed the python script pzztool.py to manipulate MDT files and their internal files.


PGCD of MDT file sizes: 2048 / 0x800