Views: 1,185,296 Main | Rules/FAQ | Memberlist | Active users | Last posts | Calendar | Stats | Online users | Search 06-14-21 03:50 AM

0 users reading Unlaunch.dsi released - DSi bootcode hack | 1 bot

Main - Reverse-engineering - Unlaunch.dsi released - DSi bootcode hack New reply

Pages: 1 2 3
Posted on 07-05-18 11:23 PM Link | #1162
Ok we worked around the secure area by just loading arm9 to a higher ram address and moving it back to 0x2000800 and having arm9 jump to it. I just compile a simple bootstub that does this for me using existing code Fix94 made for me some time back. (originally meant for moving arm7 code before starting it for using old homebrew as DSiWare on 3DS. But this works for a similar purpose on arm9. :D ) I don't know why I didn't think to just do this when Unlaunch 0.9 first came out, but now that I have my DSi XL back, that idea came back to me. :P

So I suppose for now you don't really need to do anything now unless you decide to fix booting Launcher SRL as bootcode.dsi. That would get rid of the need to use HiyaCFW's launcher entirely. But for now I have a solution for booting HiyaCFW in a way that doesn't break auto booting into things with Launcher. I confirmed if I load arm9 to a higher address, Unlaunch doesn't touch the first part of 0x2000000 at all so soft reset data isn't destroyed. :D

Posted on 07-24-18 07:14 PM Link | #1163
Released unlaunch v1.0, and, moved to yet another forum:
http://forums.nesdev.com/viewtopic.php?f=23&t=17581 (see there for details).
Pages: 1 2 3

Main - Reverse-engineering - Unlaunch.dsi released - DSi bootcode hack New reply

Page rendered in 0.014 seconds. (2048KB of memory used)
MySQL - queries: 28, rows: 67/67, time: 0.012 seconds.
[powered by Acmlm] Acmlmboard 2.064 (2018-07-20)
© 2005-2008 Acmlm, Xkeeper, blackhole89 et al.