Checked 15 ways from Sunday, - mempodroid exploit using mem address 0xd6c4 0xad33 DOES NOT WORK on Droid RAZR with 4.0.3 version 6.7.1-68_DHD-15_M4-17 (.)
My guess is that this update change the mapping of the MEM point used in the exploit.
Anyone know how did saurik determine the MEM location? Or if there is a potential update location we can try?
May help to add pause at the end of the script so when it fail you can see what steps did not work....
Its time to share the love