New working clones

------------------
X80 - War Command (ManilaMatic bootleg of Missile Command) [Trol, Audiokit]

New working software list items
-------------------------------
Ayrton Senna's Super Monaco GP II (Europe, Japan, prototype) [trol]

- sega/segas32.cpp: used good GFX ROM dumps for brivalj (the gfx1 region ROMs were wrongly named (same MPR codes as Arabian Fight) and were otherwise slightly corrupt versions of the brival ROMs. The sprites had slight corruptions too, despite having the same MPR numbers as the parent (so just bad dumps of the parent ROMs)
This commit is contained in:
Ivan Vangelista 2023-08-04 18:38:09 +02:00
parent 12b0fdbc2c
commit 8b041449ba
4 changed files with 58 additions and 15 deletions

View file

@ -848,6 +848,29 @@ The three available regions are PAL, NTSC-U and NTSC-J or a combination such as
</software> </software>
<software name="smgp2p" cloneof="smgp2">
<description>Ayrton Senna's Super Monaco GP II (Europe, Japan, prototype)</description>
<year>1992</year>
<publisher>Sega</publisher>
<sharedfeat name="compatibility" value="PAL,NTSC-J"/>
<part name="cart" interface="megadriv_cart">
<feature name="slot" value="rom_sram"/>
<dataarea name="rom" width="16" endianness="big" size="1048576">
<rom name="epr1.bin" size="131072" crc="49d4e5c6" sha1="ff79b4b6869458f1440a86ea5b25f0d325acb93f" offset="0x00000" loadflag="load16_byte"/>
<rom name="epr0.bin" size="131072" crc="eb0d0619" sha1="831eee46616596f4a985e6e2616def88eee51198" offset="0x00001" loadflag="load16_byte"/>
<rom name="epr3.bin" size="131072" crc="10ddeb8e" sha1="da66eb7780f53c5754106b09c7f8cef53a8b2620" offset="0x40000" loadflag="load16_byte"/>
<rom name="epr2.bin" size="131072" crc="99bf91df" sha1="07da2e26015022e7e895d7dbe7ba946d701b2b49" offset="0x40001" loadflag="load16_byte"/>
<rom name="epr5.bin" size="131072" crc="91b2e098" sha1="905c76b96ddd85c9edee33dfd4c9ba1f5056e91f" offset="0x80000" loadflag="load16_byte"/>
<rom name="epr4.bin" size="131072" crc="561b23a5" sha1="d6747cc415587e6918e936ce07b599e69a2743bb" offset="0x80001" loadflag="load16_byte"/>
<rom name="epr7.bin" size="131072" crc="376181c6" sha1="fe24eb3263595056e198a533ffb7c86705dcc37a" offset="0xc0000" loadflag="load16_byte"/>
<rom name="epr6.bin" size="131072" crc="7ff276dd" sha1="8264f0deb8607a248638d6bd71db22677bebb35c" offset="0xc0001" loadflag="load16_byte"/>
</dataarea>
<dataarea name="sram" size="16384">
</dataarea>
</part>
</software>
<software name="backtof3"> <software name="backtof3">
<description>Back to the Future Part III (Europe)</description> <description>Back to the Future Part III (Europe)</description>
<year>1991</year> <year>1991</year>

View file

@ -1214,6 +1214,26 @@ ROM_START( missilea )
ROM_END ROM_END
ROM_START( x80wc ) // PCB etched COMPUTER GAME 80
ROM_REGION( 0x8000, "maincpu", 0 )
ROM_LOAD( "20mm.b1", 0x5000, 0x0400, CRC(20460c38) SHA1(a9a0e951ead6ca96d094bfdcbb89a802aa108340) )
ROM_LOAD( "1mm.c1", 0x5400, 0x0400, CRC(83d0a10e) SHA1(b382ba1a893601a4a00922960c79363664bceaa4) ) // 1xxxxxxxxxx = 0xFF
ROM_IGNORE( 0x0400 )
ROM_LOAD( "2mm.d1", 0x5800, 0x0400, CRC(291fe2bf) SHA1(9d2ed129e5da90b2542e001e0a8a5f67e4f2194b) )
ROM_LOAD( "3mm.e1", 0x5c00, 0x0400, CRC(d868e424) SHA1(be51917c609a8d804ec271ba84358aa928572d1c) )
ROM_LOAD( "4mm.fh1", 0x6000, 0x0400, CRC(72d0e053) SHA1(5f4e6c826081d19bb185f00be5a22481b17ede4c) )
ROM_LOAD( "5mm.j1", 0x6400, 0x0400, CRC(dd8b21a3) SHA1(5f09fdcf915728762f50655c48aaed40c6e87d7c) )
ROM_LOAD( "6mm.k1", 0x6800, 0x0400, CRC(066c48d7) SHA1(34d78d3854816e5935acfda814be0aeffc4450d1) )
ROM_LOAD( "7mm.l1", 0x6c00, 0x0400, CRC(305781c7) SHA1(618303d596d114e91cf56573f518e6188af628bb) )
ROM_LOAD( "8mm.m1", 0x7000, 0x0400, CRC(091a9353) SHA1(63364a4ddb71d0760a51dabb8aa697931a858169) )
ROM_LOAD( "9mm.n1", 0x7400, 0x0400, CRC(1955b6e4) SHA1(118e813c3b965c879185efdd75c2f1b9ef9fda9d) )
ROM_LOAD( "10mm.p1", 0x7800, 0x0400, CRC(770fe1a3) SHA1(b75220778909887daef2d6a0da2d01bcce6629df) )
ROM_LOAD( "11mm.r1", 0x7c00, 0x0400, CRC(5c5e775b) SHA1(72be5e60f115c1836d6a5e02b55877127855cf3f) )
ROM_REGION( 0x0020, "proms", 0 )
ROM_LOAD( "mmi6331.l6", 0x0000, 0x0020, CRC(86a22140) SHA1(2beebf7855e29849ada1823eae031fc98220bc43) )
ROM_END
/************************************* /*************************************
* *
@ -1314,7 +1334,7 @@ void missile_state::init_missilem()
} }
} }
} // Anonymous namespace } // anonymous namespace
@ -1333,6 +1353,9 @@ GAME( 1981, suprmatkd,missile, missile, suprmatk, missile_state, empty_init,
// the following bootleg has extremely similar program ROMs to missile1, but has different unknown sound hardware and 2 more ROMs // the following bootleg has extremely similar program ROMs to missile1, but has different unknown sound hardware and 2 more ROMs
GAME( 1981, missilea, missile, missilea, missile, missile_state, empty_init, ROT0, "bootleg (U.Games)", "Missile Attack (U.Games bootleg of Missile Command)", MACHINE_NO_SOUND | MACHINE_SUPPORTS_SAVE ) GAME( 1981, missilea, missile, missilea, missile, missile_state, empty_init, ROT0, "bootleg (U.Games)", "Missile Attack (U.Games bootleg of Missile Command)", MACHINE_NO_SOUND | MACHINE_SUPPORTS_SAVE )
// the following bootleg has different unknown sound hardware (sound chip had been removed from the PCB the dump comes from)
GAME( 1981, x80wc, missile, missilea, missile, missile_state, empty_init, ROT0, "bootleg (ManilaMatic)", "X80 - War Command (ManilaMatic bootleg of Missile Command)", MACHINE_NO_SOUND | MACHINE_SUPPORTS_SAVE )
// the following bootlegs are on different hardware and don't work // the following bootlegs are on different hardware and don't work
GAME( 1980, mcombat, missile, missileb, missileb, missile_state, empty_init, ROT0, "bootleg (Videotron)", "Missile Combat (Videotron bootleg, set 1)", MACHINE_NOT_WORKING ) GAME( 1980, mcombat, missile, missileb, missileb, missile_state, empty_init, ROT0, "bootleg (Videotron)", "Missile Combat (Videotron bootleg, set 1)", MACHINE_NOT_WORKING )
GAME( 1980, mcombata, missile, missileb, missileb, missile_state, empty_init, ROT0, "bootleg (Videotron)", "Missile Combat (Videotron bootleg, set 2)", MACHINE_NOT_WORKING ) GAME( 1980, mcombata, missile, missileb, missileb, missile_state, empty_init, ROT0, "bootleg (Videotron)", "Missile Combat (Videotron bootleg, set 2)", MACHINE_NOT_WORKING )

View file

@ -1957,6 +1957,7 @@ missilea // bootleg (Ugames)
missilem // hack missilem // hack
suprmatk // (c) 1980 + (c) 1981 Gencomp suprmatk // (c) 1980 + (c) 1981 Gencomp
suprmatkd // (c) 1980 + (c) 1981 Gencomp suprmatkd // (c) 1980 + (c) 1981 Gencomp
x80wc // bootleg (ManilaMatic)
@source:atari/nitedrvr.cpp @source:atari/nitedrvr.cpp
nitedrvr // 006321 1976/10 [6502] nitedrvr // 006321 1976/10 [6502]

View file

@ -3468,23 +3468,19 @@ ROM_START( brivalj )
ROM_LOAD( "mpr-15626.ic34", 0x200000, 0x100000, CRC(83306d1e) SHA1(feb08902b51c0013d9417832cdf198e36cdfc28c) ) ROM_LOAD( "mpr-15626.ic34", 0x200000, 0x100000, CRC(83306d1e) SHA1(feb08902b51c0013d9417832cdf198e36cdfc28c) )
ROM_LOAD( "mpr-15625.ic24", 0x300000, 0x100000, CRC(3ce82932) SHA1(f2107bc2591f46a51c9f0d706933b1ae69db91f9) ) ROM_LOAD( "mpr-15625.ic24", 0x300000, 0x100000, CRC(3ce82932) SHA1(f2107bc2591f46a51c9f0d706933b1ae69db91f9) )
/* the 10 ROMs below may be bad dumps ... mp14598 / 99 have corrupt tiles when compared to the ROMs
in the parent set, but Sega did change the part numbers so they might be correct, the others
are suspicious, the changes are very similar but the part numbers haven't changed. We really
need a 3rd board to verify */
ROM_REGION( 0x400000, "mainpcb:gfx1", 0 ) /* tiles */ ROM_REGION( 0x400000, "mainpcb:gfx1", 0 ) /* tiles */
ROM_LOAD16_BYTE( "mpr-14599f.ic14", 0x000000, 0x200000, CRC(1de17e83) SHA1(04ee14b863f93b42a5bd1b6da71cff54ef11d4b7) ) /* ROM # matches tile ROM # from Arabian Fight ??? */ ROM_LOAD16_BYTE( "mpr-15629.ic14", 0x000000, 0x200000, CRC(2c8dd96d) SHA1(4a42a30485c19eb4f4a9d518a3dff3ae11911d01) )
ROM_LOAD16_BYTE( "mpr-14598f.ic5", 0x000001, 0x200000, CRC(cafb0de9) SHA1(94c6bfc7a4081dee373e9466a7b6f80889696087) ) /* ROM # matches tile ROM # from Arabian Fight ??? */ ROM_LOAD16_BYTE( "mpr-15628.ic5", 0x000001, 0x200000, CRC(58d4ca40) SHA1(b1633acc803bba7e8283a9663b49abeda662a74d) )
ROM_REGION32_BE( 0x1000000, "mainpcb:sprites", 0 ) /* sprites */ ROM_REGION32_BE( 0x1000000, "mainpcb:sprites", 0 ) /* sprites */
ROM_LOAD64_WORD( "brivalj_mp15637.32", 0x000000, 0x200000, CRC(f39844c0) SHA1(c48dc8cccdd9d3756cf99a983c6a89ed43fcda22) ) ROM_LOAD64_WORD( "mpr-15637.ic32", 0x000000, 0x200000, CRC(b6cf2f05) SHA1(a308d40ce5165e03fccf7fcd615ee111f7840fdc) )
ROM_LOAD64_WORD( "brivalj_mp15635.30", 0x000002, 0x200000, CRC(263cf6d1) SHA1(7accd214502fd050edc0901c9929d6069dae4d00) ) ROM_LOAD64_WORD( "mpr-15635.ic30", 0x000002, 0x200000, CRC(70f2eb2b) SHA1(9868c8b0dd8ce810a0e32f51e702eee7e1c9a967) )
ROM_LOAD64_WORD( "brivalj_mp15633.28", 0x000004, 0x200000, CRC(44e9a88b) SHA1(57a930b9c3b83c889df54de60c90f847c2dcb614) ) ROM_LOAD64_WORD( "mpr-15633.ic28", 0x000004, 0x200000, CRC(005dfed5) SHA1(f555620d75d3886a890307be9df9c0879bcda695) )
ROM_LOAD64_WORD( "brivalj_mp15631.26", 0x000006, 0x200000, CRC(e93cf9c9) SHA1(17786cd3ccaef613216db724e923861841c52b45) ) ROM_LOAD64_WORD( "mpr-15631.ic26", 0x000006, 0x200000, CRC(c35e2f21) SHA1(37935aa2eaa1769e57fb58f47f9797ae153d7496) )
ROM_LOAD64_WORD( "brivalj_mp15636.31", 0x800000, 0x200000, CRC(079ff77f) SHA1(bdd41acef58c39ba58cf85d307229622877dbdf9) ) ROM_LOAD64_WORD( "mpr-15636.ic31", 0x800000, 0x200000, CRC(d81ca97b) SHA1(a8e64e6cbe822f18ce20f50c8ddb8f1d5ed8b783) )
ROM_LOAD64_WORD( "brivalj_mp15634.29", 0x800002, 0x200000, CRC(1edc14cd) SHA1(80a281c904560b364fe9f2b8987b7a254220a29f) ) ROM_LOAD64_WORD( "mpr-15634.ic29", 0x800002, 0x200000, CRC(b0c6c52a) SHA1(04dd7344ca82e38f9d796a764c9e5a631a89aaac) )
ROM_LOAD64_WORD( "brivalj_mp15632.27", 0x800004, 0x200000, CRC(796215f2) SHA1(d7b393781dbba59c9b1cd600d27e6d91e36ea771) ) ROM_LOAD64_WORD( "mpr-15632.ic27", 0x800004, 0x200000, CRC(8476e52b) SHA1(e89748d34febcaf362580cdae30a5c570e56899a) )
ROM_LOAD64_WORD( "brivalj_mp15630.25", 0x800006, 0x200000, CRC(8dabb501) SHA1(c5af2187d00e0b9732a82441f9758b303fecbb2c) ) ROM_LOAD64_WORD( "mpr-15630.ic25", 0x800006, 0x200000, CRC(bf7dd2f6) SHA1(ab3fbe9e2b9b57424fb2a147f32b0f573c0b11b8) )
ROM_END ROM_END