- Joined
- Aug 21, 2012
- Messages
- 596
- Trophies
- 0
- Age
- 39
- Location
- The Void
- Website
- www.void-comics.com
- XP
- 272
- Country
I do want to say thank you for this info and others, I got it to work by disabling Wiikey! Phew!!..Woah, where did the influx of new guys suddenly come from?
Anyway, two things about devolution:
1. it does not work on systems with modchips
2. it currently does not support cheat codes
I have all the courses unlocked and half of the AX pilots, but I don't own nor am I interested in owning Animal Crossing...... I'd also love a save file for F-Zero with all the courses unlocked and everything unlocked on Animal Crossing! :-)
Wifi is ready
Devolution Engine r169 2012/12/19 03:43:54 Copyright (C) tueidj
AI clocks configured (197f6f27)
Exception vectors placed.
MMU initialized.
IOS was reloaded
stm_eh_fd: 0
stm_imm_fd: 1
GPIO Flags: 00ffc3a0
IOS communication initialized.
Starting to bring up wifi
HID FD: 2
GETLINKSTATUS returned 0
IOCTL_NWC24_STARTUP returned 0 (0)
IOCTL_SO_STARTUP returned 0
IOCTL_SO_GETHOSTID retry 99
net init result: 0 (3)
IOCTL_SO_GETHOSTID retry 98
net init result: 0 (3)
IOCTL_SO_GETHOSTID retry 97
net init result: 0 (3)
IOCTL_SO_GETHOSTID retry 96
net init result: 0 (3)
Got negative IPC reply for 9321A840 (-1062731518)
Host IP Address: 192.168.1.2
net init result: 1 (3)
Network initialization succeeded
Socket number for log: 0
Result from FCNTL: 0
bind returned 0
sendto returned 14
USB FD: 4
Found 1 USB devices while searching for Mass Storage
Device 0: id e71f0021 VID 1058 PID 1003
Device class 00, subclass 00, protocol 00
Number of configurations: 1
Configuration 1 has 1 interfaces
Interface 0 has 2 endpoints
Endpoint 81 Attributes 02 MaxPacket 0200
Endpoint 02 Attributes 02 MaxPacket 0200
Current device configuration: 1
Using config 1, interface 0, alt 0, ep_in 81, ep_out 02
USB device reset returned 8
Device MAX_LUN returned 9: 1
Cleared USB storage device error status
LUN 0 is a Direct Access device
USB_MS sector size for LUN 0: 512, max LBA: 1953525167
Using storage device: "USB Western Digital External HDD ", serial 35333835
MBR partition offset: 00000800
MBR partition offset: 00000000
MBR partition offset: 00000000
MBR partition offset: 00000000
Found a FAT partition at sector 2048 (1)
Number of bytes per FAT entry: 4 (FAT32)
Sectors per cluster: 64 (32K)
FAT1 first sector: 2080
FAT2 first sector: 240489
Root cluster / sector: 2 / 478898
First Data sector: 478898
End sector boundary: 1953521664
Total number of clusters: 30516293
Specified cluster for memcard file: 00157FDE
Cluster for MEMCARD file: 1408990 (90654130)
Checking file fat chain...
Total allocated size of file: 16777216 bytes in 32768 sectors
MEMCARD has 1 fragments
memcard serial: 00000000 00000000 00000000
Memory card emulation activated (80)
Specified cluster for iso file: 01D00002
ISO file found: GPOE Disc 0 Version 1
Checking file fat chain...
Total allocated size of file: 1407385600 bytes in 2748800 sectors
Result: 1 fragments
HID device change callback was registered
HID device change: 0 devices present
HID device change callback was registered
Date of Apploader: 2002/04/10
AppStart: 81200268, rounded total_size 000015E0
Apploader start: 81200268
Apploader begin 81200290, load 81200580, finish 81200D54
Apploader Initialized. $Revision: 29 $.
This Apploader built Apr 10 2002 02:35:29
app address: 81201480, app section size 00000020, app offset 00000420
app address: 812015C0, app section size 00000020, app offset 00000440
app address: 817E4CA0, app section size 00002000, app offset 00000440
app address: 812014A0, app section size 00000100, app offset 0001E000
app address: 8000C000, app section size 00002520, app offset 0001E100
app address: 8000E5A0, app section size 00028520, app offset 00020620
app address: 8000E520, app section size 00000020, app offset 00048B40
app address: 8000E540, app section size 00000060, app offset 00048B60
app address: 80036AC0, app section size 00000020, app offset 00048BC0
app address: 80036AE0, app section size 00000020, app offset 00048BE0
app address: 80036B00, app section size 000006E0, app offset 00048C00
app address: 800371E0, app section size 00006A40, app offset 000492E0
app address: 80044660, app section size 00000100, app offset 0004FD20
app address: 80044B00, app section size 000003C0, app offset 0004FE20
app address: 817E6CA0, app section size 00019360, app offset 00050200
apploader finished, GAME Entry point: 8000C040
Patched DBAT mtspr 528 @ 932FF428
Patched DBAT mtspr 530 @ 932FF42C
Patched DBAT mtspr 532 @ 932FF430
Patched DBAT mtspr 534 @ 932FF434
Patched DBAT mtspr 536 @ 932FF438
Patched DBAT mtspr 538 @ 932FF43C
Patched DBAT mtspr 540 @ 932FF440
Patched mtspr sr0, r0 @ 932FF470
Patched mtspr sr1, r0 @ 932FF474
Patched mtspr sr2, r0 @ 932FF478
Patched mtspr sr3, r0 @ 932FF47C
Patched mtspr sr4, r0 @ 932FF480
Patched mtspr sr5, r0 @ 932FF484
Patched mtspr sr6, r0 @ 932FF488
Patched mtspr sr7, r0 @ 932FF48C
Patched mtspr sr8, r0 @ 932FF490
Patched mtspr sr9, r0 @ 932FF494
Patched mtspr sr10, r0 @ 932FF498
Patched mtspr sr11, r0 @ 932FF49C
Patched mtspr sr12, r0 @ 932FF4A0
Patched mtspr sr13, r0 @ 932FF4A4
Patched mtspr sr14, r0 @ 932FF4A8
Patched mtspr sr15, r0 @ 932FF4AC
Patched DBAT mtspr 529 @ 932FF4C0
Patched DBAT mtspr 528 @ 932FF4C4
Patched DBAT mtspr 537 @ 932FF4C8
Patched DBAT mtspr 536 @ 932FF4CC
Patched DBAT mtspr 539 @ 932FF4FC
Patched DBAT mtspr 538 @ 932FF500
Since it's PSO, you may have luck posting in this thread:Ripped a clean copy of PSO Ep1&2, Devolution flashes 5 times to verify the disk, and then it keeps rebooting. Any ideas anyone?
ISO file size is wrong, it's not a clean rip.Code:Specified cluster for iso file: 01D00002 ISO file found: GPOE Disc 0 Version 1 Checking file fat chain... Total allocated size of file: 1407385600 bytes in 2748800 sectors Result: 1 fragments
Yeah, only tueidj knows exactly why that's included in there. It might just be for amusement of anyone who tries to look at the file but if you change any of it then Devolution stops working. It also might be used to pad hashes or otherwise help in the obfuscation of the verification files and the loader's programming itself to make the AP more secure. Those are only guesses, though.I was messing around with loader.bin in a hex editor and noticed this interesting message at the bottom:
You've got your pretty face.
You've got disarming eyes...
You've got such social grace....
I've got my pretty spies....
I found you lost misplaced..
I loved that lovely guise...
I said I'd try my luck and you said.
Well you don't, you don't have to try...
I forgot that night,....
What you said that night,
...I had the most exquisite time...
Well you got that right.
But it's not the whole story....
I want it all...
I court the loveliest of crimes.
Say it as if it were true...
We've got the knife you left behind.
Play it just like you do....
I wanna hear you mean it....
When you say I'm not next in line...
Save it 'cause we've got the knife......
I hate that bastard too.
Seriously, he goes out of his way to look for GPL violations in ModMii.
The guy is attacking me and ModMii personally and then gets upset when people accuse him of being the reason ModMii is sometimes falsely identified as a virus.
I honestly, think I'm the center of his universe sometimes.
It's pretty sad to see such potential go to waste because of a lack of social skills..
Sorry p1ng, looks like you'll need to come up with better dirt on tj if you really want his supervisor job.
Don't worry I won't tell anyone what you did..
and now I'm certain they're reporting ModMii as a virus to many virus scanners, it's kinda funny, they can't do anything to me or my program so they've resorted to childish tactics..
I think they contributed to the project and the real brains were marcan and bushing.
But I think it was tueidj's idea to add a captcha requirement purposely to mess with ModMii using it...
he's a fucking prick..im not gonna say the exact amount yet, but it has a comma and 5 digits.
and just keep this part to yourself...
team twiizers might have taken my exploit and given it away for free,
but i have taken their exploit and sold the shit out of it.
the exploit used in the hackmii installer is also being used in a commercial product.
I just talked to tueidj about CC support in Devolution, and although he said it "won't be released for a while", he has made a decision on button mapping that will affect how I do the mapping for these adapters. Here's how the CC buttons are being mapped in Devolution:
CC GC
Y->B
B->A
A->X
X->Y
This mapping makes sense if you're using a CC to play GC games. So, in the interest of Devolution support, this is most likely how I'll be mapping my adapters. The ideal solution would be to support both this mapping and the default A->A, B->B, etc. mapping and switch between mappings by holding a button while plugging in the controller, the way the raphnet N64 adapters work. We'll see...
Edit: Even better, there might be a way to have software (i.e. Devolution) dynamically remap the buttons at will, which would be awesome. This does mean that it might take longer for me to have these adapters available as I try to add this, but I have a feeling that it will be worthwhile.
Uh... Devolution can already emulate a GameCube memory card...
Enabling Devolution's Emulated Memory:
USB Loader GX: Go to main settings page 1, click Loader Settings and scroll down till you see "DEVO MemCard Emulation". Click on it to turn it on.
CFG Loader: Find the game you want to use emulated memory on, click on it, click the Options tab and turn on "NMM" (must be enabled on a game by game basis)
WiiFlow: Find the game you want to use emulated memory on, click on it, go to settings page 3 and turn on "Devolution Memcard Emulator" (must be enabled on a game by game basis)
This is excellent news! Can I ask you about more information? Is there a file available to download?
Controllers and disc verification.Excellent news for me! So I suppose that practically the only thing that holds apart Devolution from Wii U is the controller problem...