I wrote a hack which can dump active EUD mappings.
It showed that the game structure (0057F0F0 - 005967F0) is fully editable, but more importantly, it shows that the EUD emulator is even emulating some of the memory allocation patterns that depend on map:
map 1
19046138 : 4 (c00), normal data
1904613c : 4 (c00), normal data
19046140 : 4aed5 (1b008000), grp?
19091020 : be4a (1c008000), grp?
1909ce70 : c807 (1d008000), grp?
190a9680 : bfcc (13000000), stat_txt_tbl?
190b5650 : 889 (c01), scenario.chk str section
190b5ee0 : 7239 (c01), unknown
190bd120 : 968 (81), trigger?
190bda90 : 968 (81), trigger?
190be400 : 968 (81), trigger?
190bed70 : 968 (81), trigger?
190bf6e0 : 968 (81), trigger?
190c0050 : 968 (81), trigger?
190c09c0 : 968 (81), trigger?
190c1330 : 968 (81), trigger?
190c1ca0 : 968 (81), trigger?
190c2610 : 968 (81), trigger?
190c2f80 : 968 (81), trigger?
190c38f0 : 968 (81), trigger?
190c4260 : 20 (201), unknown
190c4280 : 30 (12000201), scenario.chk something?
190c42b0 : 4000 (201), unknown
190c82b0 : 144 (11000081), map file handle
map 2
19046138 : 4 (c00), unknown
1904613c : 4 (c00), unknown
19046140 : 4aed5 (1b008000), grp
19091020 : be4a (1c008000), grp
1909ce70 : c807 (1d008000), grp (tranwire.grp)
190a9680 : bfcc (13000000), stat_txt
190b5650 : 85b (c01), scenario.chk str section
190b5eb0 : 7239 (c01), unknown
190bd0f0 : 968 (81), trigger
190bda60 : 20 (201), unknown
190bda80 : 20 (12000201), scenario.chk something?
190bdaa0 : 4000 (201), unknown
190c1aa0 : 144 (11000081), map file handle
The addresses change depending on size of the string table, and amount of triggers in the map
Also, editing stat_txt.tbl by writing bytes to the memory after 190a9680 works, as does swapping wireframes to another by writing over frame header of tranwire.grp. Rewriting the graphics itself didn't seem to work though. The other 2 grps are likely grpwire.grp and wirefram.grp. Writing over trigger structures worked.
None.