IDA python scripts for reverse engineering PS2 EE and IOP executables. Scripts are written for IDA 7.0, the scripts listed below can be loaded via File->Script file command.
Labels the syscall table in an EE kernel executable, good way to perform initial analysis of a EE kernel image. The kernel image must be loaded at address 0x80000000.
Labels syscall stubs in an EE usermode (game, app, homebrew, etc) executable.
Labels import and export tables in IOP modules. All function names are pulled from the corresponding json files in the IOP directory. Each json file contains a version number and list of module exports for that version of the module, as long as the version number in the json file is greater than or equal to the version number in the import/export table the functions will be labeled. The initial set of json files was built by scraping the ps2sdk repository for module definition files. It's preferred to use the Sony function names over community names where possible.