You can use this tool to reverse the py2exe process. The tool will extract python code objects from executable file with your current python magic number.
SHOW FULL COLUMNS FROM `jrk_downrecords` [ RunTime:0.001844s ]
SELECT `a`.`aid`,`a`.`title`,`a`.`create_time`,`m`.`username` FROM `jrk_downrecords` `a` INNER JOIN `jrk_member` `m` ON `a`.`uid`=`m`.`id` WHERE `a`.`status` = 1 GROUP BY `a`.`aid` ORDER BY `a`.`create_time` DESC LIMIT 10 [ RunTime:0.184815s ]
SHOW FULL COLUMNS FROM `jrk_tagrecords` [ RunTime:0.046046s ]
SELECT * FROM `jrk_tagrecords` WHERE `status` = 1 ORDER BY `num` DESC LIMIT 20 [ RunTime:0.010383s ]
SHOW FULL COLUMNS FROM `jrk_member` [ RunTime:0.008525s ]
SELECT `id`,`username`,`userhead`,`usertime` FROM `jrk_member` WHERE `status` = 1 ORDER BY `usertime` DESC LIMIT 10 [ RunTime:0.014421s ]
SHOW FULL COLUMNS FROM `jrk_searchrecords` [ RunTime:0.299671s ]
SELECT * FROM `jrk_searchrecords` WHERE `status` = 1 ORDER BY `num` DESC LIMIT 5 [ RunTime:0.011878s ]
SELECT aid,title,count(aid) as c FROM `jrk_downrecords` GROUP BY `aid` ORDER BY `c` DESC LIMIT 10 [ RunTime:0.018487s ]
SHOW FULL COLUMNS FROM `jrk_articles` [ RunTime:0.001436s ]
UPDATE `jrk_articles` SET `hits` = 2 WHERE `id` = 39384 [ RunTime:0.025341s ]