forked from ahezard/nintendo-ds-tools
-
Notifications
You must be signed in to change notification settings - Fork 1
fork of fwTool to use the "FIRM partitions known-plaintext" exploit for firm writing on 3ds
License
davidzech/dgTool
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
1. Put dgTool.nds in the root of your 3ds sdmc card. 2. Place the dgTool folder with it's files inside in the root as well. 3. Run the app with the dsiware entry point of your choice. Flashcards will not work - no access to NAND. 4. Dump your 3ds firm0 firm1. Make sure OLD/NEW 3DS at the top matches your model of 3ds. Only 3ds's with "New" in the title are NEW 3DS. 5. Select "Downgrade to 10.4" to downgrade your 11.1 firm to 10.4, allowing kernel hax. 6. Run any kernel hax as a 3dsx in 3ds mode to test downgrade success. This app only writes to FIRM0, not FIRM1, so it should be safe given your FIRM1 is not corrupt. Never use this on anything but 3ds firm 11.1.X-YZ. Never use this if arm9loaderhax is installed; on any firmware. Remember, if something goes wrong, it's your fault! NAND writing is always a high risk. Read the LICENSE.txt (MIT) included for details. Based on Wintermute's fwTool. https://github.com/WinterMute/nintendo-ds-tools/tree/master/firmware/nds/fwTool This was written by an anonymous contributor; I only maintain this repository.
About
fork of fwTool to use the "FIRM partitions known-plaintext" exploit for firm writing on 3ds
Resources
License
Stars
Watchers
Forks
Packages 0
No packages published
Languages
- Makefile 44.5%
- C++ 37.6%
- C 11.4%
- Assembly 6.4%
- Batchfile 0.1%