I threw the unaltered JP version on my English M3 just to see what it did (looking for clues for an attempt at hex editing/reverse engineering) - it said 'No system file found' as expected. After (unsuccessfully) trying a few things involving copying and replacing some files with the hacked older version, I opened the g6loader.jp and .eng files from the hacked version, and the .jp from the new, and noticed the similarities - compare the old .jp to the new, after the header section the files looked identical as far in as I looked. I haven't been able to get a complete comparison between the two to see all the differences yet, but the header only had three or four changes. Maybe this will help? (Probably the translation team has already discovered this though...) I am way too far behind on my programming abilities, so it will take me a while to get caught up and figure out anything really useful... won't stop me from trying though.
[EDIT] I tried switching the headers, thinking maybe, just maybe, that would switch out the region lock. It got rid of the 'no system file' message, but left me with two black screens. I didn't really think it would be that simple, but it does clear up one thing (which I'm sure the translation team already knew) - English carts look for the .eng file, and 6gdsloader is the main system file.
To those of you who have had some luck reverse engineering these files, what software/settings did you use? I've tried with ADA Pro and was able to get some things to disassemble, but I don't know if I used the proper file format - it did detect some ARM code, but that doesn't mean it was correct, since it will probably find 'valid' code bytes in any format used - but that doesn't mean they are actually valid. Care to offer any suggestions?
[EDIT] I tried switching the headers, thinking maybe, just maybe, that would switch out the region lock. It got rid of the 'no system file' message, but left me with two black screens. I didn't really think it would be that simple, but it does clear up one thing (which I'm sure the translation team already knew) - English carts look for the .eng file, and 6gdsloader is the main system file.
To those of you who have had some luck reverse engineering these files, what software/settings did you use? I've tried with ADA Pro and was able to get some things to disassemble, but I don't know if I used the proper file format - it did detect some ARM code, but that doesn't mean it was correct, since it will probably find 'valid' code bytes in any format used - but that doesn't mean they are actually valid. Care to offer any suggestions?

