06-23-2015, 08:59 PM
I opened the file in what's called a hex editor (In my case, I used HxD, though any hex editor will work), which basically just looks at the raw data of a file, and lets you edit it. Very useful for reverse engineering file formats. Here's what it looks like:
The "‰PNG" part I have selected (89 50 4E 47 in hexadecimal) is the standard first four bytes of a PNG header, so I know a PNG image follows. Cutting out the file from the beginning of that to just before the beginning of the next "‰PNG" I found (the next PNG header) gives me a whole PNG image, so I just saved that out as a .png, and there you go. It looks to be just four bytes before the beginning of each PNG image (the 00 00 F3 1B at the beginning of the file here).
Make any sense at all? If not I can probably make a small program to rip it out for you. I really should learn BMS sometime so this sort of thing is easier...
The "‰PNG" part I have selected (89 50 4E 47 in hexadecimal) is the standard first four bytes of a PNG header, so I know a PNG image follows. Cutting out the file from the beginning of that to just before the beginning of the next "‰PNG" I found (the next PNG header) gives me a whole PNG image, so I just saved that out as a .png, and there you go. It looks to be just four bytes before the beginning of each PNG image (the 00 00 F3 1B at the beginning of the file here).
Make any sense at all? If not I can probably make a small program to rip it out for you. I really should learn BMS sometime so this sort of thing is easier...