Stolen from udk's Jade Dumping thread
First all, thanks to Pof, here his original thread and cmonex for her orginal post here.
Download itsme's utils: http://nah6.com/~itsme/itsutilsbin-20080923.zip
List NAND Partitions
Dump Them!
The most important files are part01 (XIP) and part02 (ROM).
Dumping the SPL
As monx points out below you may need to "App Unlock" your device before pdocread will work.
Either follow his reg hack, or just use this CAB by Chainfire : http://xdaforums.com/showthread.php?p=3973249#post3973249.
Have fun.
Thanks to d474rpr for testing SPL dumping
Dave
First all, thanks to Pof, here his original thread and cmonex for her orginal post here.
Download itsme's utils: http://nah6.com/~itsme/itsutilsbin-20080923.zip
List NAND Partitions
Code:
pdocread.exe -l
210.38M (0xd260000) [COLOR="DarkOrchid"]FLASHDR[/COLOR]
| 3.12M ([COLOR=DarkRed][B]0x31f000[/B][/COLOR]) Part00
| 3.50M ([COLOR=DarkOrange][B]0x380000[/B][/COLOR]) Part01
| 69.38M ([COLOR=Olive][B]0x4560000[/B][/COLOR]) Part02
| 134.38M ([COLOR=Teal][B]0x8660000[/B][/COLOR]) Part03
STRG handles:
handle e7489c1a134.38M (0x8660000)
handle 474960e6 69.38M (0x4560000)
handle c74b0fda 3.50M (0x380000)
handle 074b0eee 3.12M (0x31f000)
disk e7489c1a
0 partitions, 0 binary partitions
customerid=00000000 uniqueid= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
disk 474960e6
0 partitions, 0 binary partitions
customerid=00000000 uniqueid= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
disk c74b0fda
0 partitions, 0 binary partitions
customerid=00000000 uniqueid= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
disk 074b0eee
0 partitions, 0 binary partitions
customerid=00000000 uniqueid= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Code:
pdocread -w -d [COLOR="DarkOrchid"]FLASHDR [/COLOR]-b 0x800 -p Part00 0 [COLOR=DarkRed][B]0x31f000[/B][/COLOR] Part00.raw
pdocread -w -d [COLOR="DarkOrchid"]FLASHDR [/COLOR]-b 0x800 -p Part01 0 [COLOR=DarkOrange][B]0x380000[/B][/COLOR] Part01.raw
pdocread -w -d [COLOR="DarkOrchid"]FLASHDR [/COLOR]-b 0x800 -p Part02 0 [COLOR=Olive][B]0x4560000[/B][/COLOR] Part02.raw
pdocread -w -d [COLOR="DarkOrchid"]FLASHDR [/COLOR]-b 0x800 -p Part03 0 [COLOR=Teal][B]0x8660000[/B][/COLOR] Part03.raw
Dumping the SPL
Code:
pmemdump 0x9a000000 0x80000 spl.nb
As monx points out below you may need to "App Unlock" your device before pdocread will work.
Either follow his reg hack, or just use this CAB by Chainfire : http://xdaforums.com/showthread.php?p=3973249#post3973249.
Have fun.
Thanks to d474rpr for testing SPL dumping
Dave
Last edited: