![]() That's the header we'll need to locate for the next part. You'll need to search for the string "NCCH", or in bytes 0x4E, 0x43, 0x43, 0x48. So we need to get our hands dirty and grab an hex editor to cut out the actual ROM from all that junk. Next, the tools currently available won't be able to extract the rom from the ".cia", or at least, I wasn't able to.(Careful because a lot of 3ds roms floating around are just useless encrypted wastes of spaces ) If its encrypted, you won't find it, as it will be scrambled. You'll know that its decrypted if you find the string "paradise" in the cia file, by doing a a string search in an hex editor. I got a decrypted eshop package, as a ".cia". First you need to get a decrypted ROM.I'm fairly sure this is not the best way to do it, but I haven't found an easier way. Oh, and I kinda forgot to specify how to extract the rom's data ^^ So having someone with one willing to try things out would be nice! (EDIT: Actually,thanks to ironhax I can run homebrew on it now But not much else ) No way to test modifications/investigate on a 3DS/emulator. ![]() Here are some of the things that are currently holding us back right now: Here are some utilities for dealing with the file formats in PSMD/PMD:GTI : Here are some links to notes, or to the wiki on the various file formats and etc of the games. Lua 5.1 experimental sandbox escape exploit. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |