Hacking Movable.used replacement

Joined
Jan 1, 2018
Messages
7,292
Trophies
2
XP
5,912
Country
United States
You shouldn't NAND inject movable.sed generated from bruteforcemovable.com.

What you should do is this:
  1. GodMode9 → [S:] SYSNAND VIRTUAL/essential.exefsMount as EXEFS image.
  2. While in the drive [G:] EXEFS GAME IMAGE, press (A) on movableCopy to 0:/gm9/out.
  3. Go to sdmc:/gm9/out and rename the file as such:
    • movablemovable.sed
  4. Press (Y) to [CLIPBOARD] select the file (see bottom screen, right-top corner).
    • If selection mistake was made, press (SELECT) to reset your choice.
  5. Back out with (B) button. Go to [1:] SYSNAND CTRNAND/private directory.
  6. Press (Y) to paste → Copy path(s) <A> yes → button combo → Overwrite file(s)<A> yes.
  7. Press (A) on movable.sedCalculate CMAC <A> yes → etc.
  8. Back out with (B) button. While hovering the white selector on [1:] SYSNAND CTRNAND, hold (R)-shoulder and press (A) → Fix CMACs for drive<A> yes → button combo → <A> yes → button combo → <A> to continue<A> yes.

Edit - Only do the above if you made the mistake of injecting external, pseudo, or foreign movable.sed from another 2DS/3DS system.
 
Last edited by TurdPooCharger,
General chit-chat
Help Users
    SylverReZ @ SylverReZ: @Psionic Roshambo, That's WiiMiiSwitch's job. Lol.