Closed kimjaejundfadsf closed 4 years ago
Please upload your nand dump to your google drive and share the link in order to update the helper and make it compatible with korean DSis
very very thank you
Thanks. Now I'm trying to find the v512 launcher (the one from system version 1.4.1K) in order to add full support.
I'm sorry but the latest version of Korean DSi is 1.4.6K, not 1.4.1.
@SAENGGAK HiyaCFW uses a modified version of the v512 launcher from the 1.4.0U/J/E/A (1.4.1K) system version, that's why the one present in the NAND dump is not used, instead it has to be downloaded from the big N servers and patched afterwards. The problem that I had is that it is not available for download, ergo the Helper at this time does not support Korea or China DSis. Someone from GBATemp provided me with a copy of the launcher and I'm in the process of testing if it can be used for Hiya.
I have a 1.4.1K NAND dump from my DSi if it can help, I'm eager to get HiyaCFW running on this console too.
@Chiharuuu That will help a lot, thanks. Someone provided me with a pre-patched launcher but does not work for running HiyaCFW from the SD card, that's why I have not released it.
@mondul here is the NAND from my DSi, firmware 1.4.1K. If it's corrupted somehow I can always dump it again.
1.4.6k not supported???? ㅜㅜ
Some problems with 1.4.1k Checking NAND file...
Downloading latest HiyaCFW release...
Extracting ARM7/ARM9 BIOS from NAND...
Patching ARM7/ARM9 BIOS...
Prepending data to ARM9 BIOS...
Generating new bootloader...
Decrypting NAND...
Extracting files from NAND...
Downloading KOR launcher... ERROR: Could not download KOR launcher
Cleaning... Done
Still working on it, at this moment the patched launcher can't boot HiyaCFW from the SD card
@kimjaejundfadsf @Chiharuuu @Darxmax Made another test and it doesn't boot in no$gba, I just get a white screen. I would like some feedback on what happens on a real console. Can anyone of you download the latest release of the helper, put this file at the same folder where you extracted it, run the helper and let me know what happens on your console? Thanks!
Yep, that working.
Patching with the KOR launcher now works, but I can't get TwilightMenu++ to show on the system menu, or autoboot either. Tried both installing it from the Helper, and manually installing it too...
Patching with the KOR launcher now works, but I can't get TwilightMenu++ to show on the system menu, or autoboot either. Tried both installing it from the Helper, and manually installing it too. Yes, some problems, but i resolved by unlaunch in option - > no button-> and choose TwilightMenu++ -> save and exit.
KOR launcher now works Perfectly.Thank You for Your Hard Work.
does anyone has this file?
@thenist Pushed to a new branch in 01a6902d98aa139055ef9af9a81870a34f80d5b7
It doesn't work for my dsi (1.4.6k)
Checking NAND file...
Downloading latest HiyaCFW release...
Extracting ARM7/ARM9 BIOS from NAND...
Patching ARM7/ARM9 BIOS...
Prepending data to ARM9 BIOS...
Generating new bootloader...
Decrypting NAND...
Extracting files from NAND...
Downloading KOR launcher... ERROR: Could not download KOR launcher
Cleaning... Done
my ofw version 1.4.6k
kor luncher Works very very gooooooooooooooooooooooooooooooooood
=========Progress was successful===========
I was busy and now I have to check. I'm very sorry. Thank you so much for your hard work.
console log
Opening HiyaCFW Helper... Initializing GUI... Searching for 7-Zip in the Windows registry... Searching for 7-Zip in the 32-bit Windows registry... 7-Zip not found. Will use fatcat for extraction. TWLTool v1.6.1 by WulfyStylez Special thanks to CaitSith2
CTR: 000000: 00 66 02 00 00 9a fd ff ff 99 fd ff 00 00 00 00 .f.............. Normalkey: 000000: 98 ee 80 80 00 6c b4 f6 3a c2 6e 62 f9 ec 34 ad .....l..:.nb..4. CTR: 000000: 00 76 02 00 00 8a fd ff ff 89 fd ff 00 00 00 00 .v.............. Normalkey: 000000: 98 ee 80 80 00 6c b4 f6 3a c2 6e 62 f9 ec 34 ad .....l..:.nb..4. Nintendo DS rom tool 1.24 - Nov 2 2005 00:24:53 by Rafael Vuijk (aka DarkFader) TWLTool v1.6.1 by WulfyStylez Special thanks to CaitSith2
reading consoleid/CID from nocashinfo block Processing twln... 0.00 % complete. 12.14 % complete. 24.28 % complete. 36.42 % complete. 48.56 % complete. 60.70 % complete. 72.84 % complete. 84.98 % complete. 97.11 % complete. 100.00% complete. Processing twlp... 0.00 % complete. 76.42 % complete. 100.00% complete. Crypt complete!
Extracting /sys/log/product.log to C:/test/output/sys/log/product.log Extracting /sys/log/sysmenu.log to C:/test/output/sys/log/sysmenu.log Extracting /sys/log/shop.log to C:/test/output/sys/log/shop.log Extracting /sys/HWINFO_S.dat to C:/test/output/sys/HWINFO_S.dat Extracting /sys/HWINFO_N.dat to C:/test/output/sys/HWINFO_N.dat Extracting /sys/cert.sys to C:/test/output/sys/cert.sys Extracting /sys/HWID.sgn to C:/test/output/sys/HWID.sgn Extracting /sys/TWLFontTable.dat to C:/test/output/sys/TWLFontTable.dat Extracting /sys/dev.kp to C:/test/output/sys/dev.kp Extracting /title/00030017/484e414b/data/private.sav to C:/test/output/title/00030017/484e414b/data/private.sav Extracting /title/00030017/484e414b/content/title.tmd to C:/test/output/title/00030017/484e414b/content/title.tmd Extracting /title/00030017/484e414b/content/00000005.app to C:/test/output/title/00030017/484e414b/content/00000005.app Extracting /title/00030015/484e4f4b/data/ec.cfg to C:/test/output/title/00030015/484e4f4b/data/ec.cfg Extracting /title/00030015/484e4f4b/content/00000000.app to C:/test/output/title/00030015/484e4f4b/content/00000000.app Extracting /title/00030015/484e4f4b/content/title.tmd to C:/test/output/title/00030015/484e4f4b/content/title.tmd Extracting /title/00030015/484e424b/content/title.tmd to C:/test/output/title/00030015/484e424b/content/title.tmd Extracting /title/00030015/484e424b/content/00000001.app to C:/test/output/title/00030015/484e424b/content/00000001.app Extracting /title/00030015/484e464b/data/private.sav to C:/test/output/title/00030015/484e464b/data/private.sav Extracting /title/00030015/484e464b/data/ec.cfg to C:/test/output/title/00030015/484e464b/data/ec.cfg Extracting /title/00030015/484e464b/content/title.tmd to C:/test/output/title/00030015/484e464b/content/title.tmd Extracting /title/00030015/484e464b/content/00000006.app to C:/test/output/title/00030015/484e464b/content/00000006.app Extracting /title/0003000f/484e4341/content/00000002.app to C:/test/output/title/0003000f/484e4341/content/00000002.app Extracting /title/0003000f/484e4341/content/title.tmd to C:/test/output/title/0003000f/484e4341/content/title.tmd Extracting /title/0003000f/484e4841/content/title.tmd to C:/test/output/title/0003000f/484e4841/content/title.tmd Extracting /title/0003000f/484e4841/content/00000006.app to C:/test/output/title/0003000f/484e4841/content/00000006.app Extracting /title/0003000f/484e4c4b/content/title.tmd to C:/test/output/title/0003000f/484e4c4b/content/title.tmd Extracting /title/0003000f/484e4c4b/content/00000006.app to C:/test/output/title/0003000f/484e4c4b/content/00000006.app Extracting /title/00030005/484e444b/content/00000000.app to C:/test/output/title/00030005/484e444b/content/00000000.app Extracting /title/00030005/484e444b/content/title.tmd to C:/test/output/title/00030005/484e444b/content/title.tmd Extracting /title/00030005/484e454b/content/00000000.app to C:/test/output/title/00030005/484e454b/content/00000000.app Extracting /title/00030005/484e454b/content/title.tmd to C:/test/output/title/00030005/484e454b/content/title.tmd Extracting /title/00030005/484e494b/data/private.sav to C:/test/output/title/00030005/484e494b/data/private.sav Extracting /title/00030005/484e494b/content/00000000.app to C:/test/output/title/00030005/484e494b/content/00000000.app Extracting /title/00030005/484e494b/content/title.tmd to C:/test/output/title/00030005/484e494b/content/title.tmd Extracting /title/00030005/484e4b4b/data/private.sav to C:/test/output/title/00030005/484e4b4b/data/private.sav Extracting /title/00030005/484e4b4b/content/00000000.app to C:/test/output/title/00030005/484e4b4b/content/00000000.app Extracting /title/00030005/484e4b4b/content/title.tmd to C:/test/output/title/00030005/484e4b4b/content/title.tmd Extracting /ticket/00030017/484e414b.tik to C:/test/output/ticket/00030017/484e414b.tik Extracting /ticket/00030015/484e4f4b.tik to C:/test/output/ticket/00030015/484e4f4b.tik Extracting /ticket/00030015/484e424b.tik to C:/test/output/ticket/00030015/484e424b.tik Extracting /ticket/00030015/484e464b.tik to C:/test/output/ticket/00030015/484e464b.tik Extracting /ticket/0003000f/484e4341.tik to C:/test/output/ticket/0003000f/484e4341.tik Extracting /ticket/0003000f/484e4841.tik to C:/test/output/ticket/0003000f/484e4841.tik Extracting /ticket/0003000f/484e4c4b.tik to C:/test/output/ticket/0003000f/484e4c4b.tik Extracting /ticket/00030005/484e444b.tik to C:/test/output/ticket/00030005/484e444b.tik Extracting /ticket/00030005/484e454b.tik to C:/test/output/ticket/00030005/484e454b.tik Extracting /ticket/00030005/484e494b.tik to C:/test/output/ticket/00030005/484e494b.tik Extracting /ticket/00030005/484e4b4b.tik to C:/test/output/ticket/00030005/484e4b4b.tik Extracting /shared1/TWLCFG0.dat to C:/test/output/shared1/TWLCFG0.dat Extracting /shared1/TWLCFG1.dat to C:/test/output/shared1/TWLCFG1.dat Extracting /shared2/launcher/wrap.bin to C:/test/output/shared2/launcher/wrap.bin Extracting /shared2/0000 to C:/test/output/shared2/0000
gui log
Checking NAND file...
Downloading latest HiyaCFW release...
Extracting ARM7/ARM9 BIOS from NAND...
Patching ARM7/ARM9 BIOS...
Prepending data to ARM9 BIOS...
Generating new bootloader...
Decrypting NAND...
Extracting files from NAND...
Downloading KOR launcher...
Copying HiyaCFW files...
Downloading latest TWiLight Menu++ release...
Copying TWiLightMenu files...
Cleaning... Done! Eject your SD card and insert it into your DSi
How can I use hiyacfw? hiyacfw run...... error : not supported region
You can also provide nand.bin.(1.4.6k) ....ㅠㅠㅋ help me..........