他们如何非正式地将编译的程序从一种人类语言翻译成另一种人类语言?
我看到有几款日本游戏有非官方的粉丝制作的英文翻译补丁。我可以看到程序中的日语字符串必须修改为英语,并且纹理中的任何日语文本都必须修改。
现在,我想知道他们使用哪些工具来知道在哪里寻找这些资源,以及如何修改二进制文件和其他内容并仍然使游戏正常运行?
I've seen that there are unofficial fanmade English translation patches for several Japanese games. I can see that the Japanese strings in the program have to be modify into English and any Japanese text in the textures have to be modified.
Now, I am wondering what are some of the tools they use to know where to look for these resources and possibly how to modify the binary and other things and still make the game work?
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(1)
通常,这是使用可以提取和修改可执行文件中的资源并就地修改它们的软件来完成的。根据特定的应用程序和/或操作系统,此方法将允许您修改 UI 控件上的图标、菜单、字符串和标签等。
用于此目的的常见实用程序是 Angus Johnson 开发的 Resource Hacker。但是,它不再处于积极开发状态,并且尚未作为开源发布。其他替代方案包括:
例如,在下面的屏幕截图中,我使用 Resource Hacker 修改 7-Zip 文件使用的对话框之一管理器应用程序:
您选择的十六进制编辑器也可用于对原始二进制源代码进行修改被编译成可执行文件。这可以让您对尚未放入字符串表中的字符串进行更改以便于修改。
值得注意的是,这是一种更容易出错的修改方式。通过覆盖错误的序列来破坏二进制文件是非常容易的。通常,您必须将一个字符串替换为另一个长度完全相同的字符串。
当然,始终使用原始可执行文件的副本!
Generally, this is done using software that can extract and modify resources in an executable file and modify them in place. Depending on the specific application and/or operating system, this approach will allow you to modify icons, menus, strings, and the labels on UI controls, among other things.
A common utility for this purpose was Resource Hacker by Angus Johnson. However, it is no longer under active development, and has not been released as open source. Other alternatives include:
For example, in the screenshot below I am using Resource Hacker to modify one of the dialog boxes used by the 7-Zip File Manager application:
A hexadecimal editor of your choice can also be used to make modifications to the raw, binary source code that is compiled into the executable file. This can allow you to make changes to strings that haven't been placed into a string table for easy modification.
It's worth noting that this is a much more error-prone way of making modifications. It's extremely easy to corrupt the binary by overriding the wrong sequence. Generally, you must replace a string with another string of exactly the same length.
And, of course, always work on a copy of the original executable!