Skip to content

Commit 011fd41

Browse files
committed
formatter
1 parent 93d3b48 commit 011fd41

File tree

2 files changed

+4
-6
lines changed

2 files changed

+4
-6
lines changed

worlds/dk64/DK64Client.py

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -80,8 +80,6 @@ async def validate_client_connection(self):
8080
self.memory_pointer = self.n64_client.read_u32(DK64MemoryMap.memory_pointer)
8181
self.n64_client.write_u8(self.memory_pointer + DK64MemoryMap.connection, 0xFF)
8282

83-
84-
8583
def send_message(self, item_name, player_name, event_type="from"):
8684
stripped_item_name = "".join(e for e in item_name if str(e).isalnum() or str(e) == " ")
8785
stripped_player_name = "".join(e for e in player_name if str(e).isalnum() or str(e) == " ")
@@ -244,7 +242,6 @@ async def readChecks(self, cb):
244242
if flag_id:
245243
self.bulk_lookup(flag_id, _bulk_read_dict)
246244

247-
248245
dict_data = self.n64_client.read_dict(_bulk_read_dict)
249246
# Json loads the dict_data
250247
dict_data = json.loads(dict_data)

worlds/dk64/client/pj64.py

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -86,8 +86,8 @@ def _check_client(self):
8686

8787
def _is_exe_running(self, exe_name):
8888
"""Check if a given executable is running."""
89-
for process in psutil.process_iter(['name']):
90-
if process.info['name'] and process.info['name'].lower() == exe_name.lower():
89+
for process in psutil.process_iter(["name"]):
90+
if process.info["name"] and process.info["name"].lower() == exe_name.lower():
9191
return True
9292
return False
9393

@@ -185,6 +185,7 @@ def read_u32(self, address):
185185
def read_dict(self, dict):
186186
"""Reads a dictionary of memory addresses and returns the values."""
187187
return self._send_command(f"dict {json.dumps(dict, separators=(',', ':'))}")
188+
188189
def _write_memory(self, command, address, data):
189190
"""Writes data to memory and returns the emulator response."""
190191
return self._send_command(f"{command} {hex(address)} [{data}]")
@@ -208,4 +209,4 @@ def validate_rom(self, name, memory_location=None):
208209
return False
209210
if rom_info.get("goodName", "").upper() == name.upper():
210211
return memory_location is None or self.read_u32(memory_location) != 0
211-
return False
212+
return False

0 commit comments

Comments
 (0)