- Opcode: 0x117, 0x11b & 0x11f
- Name: push special
- Two-word opcode: Yes
Parameters
Location | Name | Description |
---|---|---|
Code | Address | “Address” to the special variable |
Notes
There are 21 different special variables accessible to the script engine. There are several opcodes that access these variables in the same way, presumably they were supposed to be bit, byte and word versions of the instruction but there is absolutely no difference in the way they work.
The variables you can access through this instruction are:
Address | Description |
---|---|
0 | Active entity X mesh coordinate |
1 | Active entity Y mesh coordinate |
2 | Active entity X coordinate in mesh |
3 | Active entity Y coordinate in mesh |
4 | Active entity direction (0-255) |
5 | Scenario parameter when entering WM from a field (see opcode 0x318 |
6 | Field ID of “wm” field that jumped to the WM |
7 | Unknown |
8 | Model ID of entity at top of entity list |
9 | Model ID of active entity |
10 | Check if ran from battle |
11 | Zolom escape result flag (1: place party on the stables side, 0: place party on the cave side) |
12 | Prompt window result |
13 | Unknown |
14 | Unknown |
15 | Unknown |
16 | Unknown |
17 | Unknown |
18 | Unknown |
19 | Unknown |
20 | Unknown |