Good news for people like me, who researching Unreal Engine 3 internals using disassembler.
As you probably know, the easiest way to reverse Win32 executable is to load it into the IDA Pro disassembler and load corresponding pdb file containing symbol information. Unfortunately there's no pdb files for UDK etc, so it's very hard to detect any piece of code. UE3 executable files for iOS and Android are Linux .so files with a bunch of debug information (function names). Researching ARM code is very hard because of it's RISC architecture, but with
yesterday's Epic Games release of Epic Citadel for Android it's much easier now. This version has support for both Android CPU architectures - ARM and x86, there's two .so files inside apk. I've just tried to load x86 .so file into the IDA Pro - it looks great, each function in the code has a prototype!
Personally for me, this is a bit useless - I reversed everything I needed for SkeletalMesh support more than a year ago. Also I have full access to the Epic's UE3 code now. But this information still could be useful for other researchers - there's a legally available executable file with debug information.