Where do we inject ARM 11 code? Where is the program counter at once the exploit loads?
Gateway uses 0x1FFF4000 which is part of the exception vectors.
Where do we inject ARM 11 code? Where is the program counter at once the exploit loads?
Man I should of not updated my 3ds so much! Now I have to wait till they have a hack for 7.1.0-15U :C
Which is the f*** current version!
Don't worry dude, all they will need is to make a cfw like the PSP eventually they will have to step beyond the 4.5 firmware due machine malfunctions and people accidently updating. The community will keep shrinking till that point. It is just a matter of time.
Why change the offset? I though nop40 used 0x1044000?Edit: Just change *(u8*)0x10144000 to *(u8*)0x10144001
Why change the offset? I though nop40 used 0x1044000?
Thumb? How does changing that one nibble make it change to Thumb mode?ARM -> Thumb
0 -> 1
No, it's really not.
They may find an exploit for 7.X tomorrow or never.
Normally i changed "Nintendo" to "Homebrew?", but i'm not allowed to do that, because it's Nintendos code. And yeah, that's a modified SDK demo.
A Panda unit eh?
Normally i changed "Nintendo" to "Homebrew?", but i'm not allowed to do that, because it's Nintendos code. And yeah, that's a modified SDK demo.
Well it is a matter of time....if you feel like brute forcing encryption keys XD.
You can't assume they will defiantly fine a new exploit for 7.x, if anyone is interested in homebrew your best bet would be getting hold of a 4.x console.
A Panda unit eh?
unrelated to that ^
Here's a binary loader I've been working on:
Hello everyone, i'm working on homebrew too, but i have a little problem(or big), i have an old R4 Revolution, but it doesn't work on my 3DS 4.5, is there a firmware to suport the 3DS 4.5 verson ?
Anyway, I will work on an emulator if the R4 work.
Regards, St4rk.