Search This thread

ATDteam

Member
May 3, 2014
31
12
Oppo Realme 3
In this tutorial we are going to Repair Realme 3 (RMX1821) MT6771 Chipset.
from being hard bricked (no charge, no recovery, no fastboot) using SP Flashtool.
with the help of Bypass Utility "MTK-bypass" to disable bootrom protection(sla and daa).
MTK-bypass credits to @k4y0z

, @chaosmaster and @xyzz on github.

REQUIREMENTS:
• Python
libusb-win32
Sp Flashtool
• Bypass Utility Compiled


---------------------------------------------------------------
• Bypass Utility Latest Releases

• Exploits Latest Releases

• Realme 3 (rmx1821) Flashtool Firmware link soon
> I will upload the realme 3 firmware with Scatter File and Auth File for Third Party Flashtool like SP Flashtool soon, but if you have an official firmware of realme 3 with Scatter and Auth File you can use it no matter what version it is.

> If you know how to extract an OFP file, you can download this realme 3|3i firmware and extract the OFP file.

https://fileload.coloros.com/30842RMX1821EX_11_C.17_201117_cb5665f2.zip

> Video Tutorial on how to Extract OPPO | REALME firmware (OFP file)





VIDEO TUTORIAL






TEXT TUTORIAL

INSTALLATION:

Install Python (tick checkbox "Add Python X.X to PATH") and proceed.
( if you are using windows 10, Download and Install Python 3.9 through Microsoft Store )


• Install lib-usb_win32

1.jpg

Click Next>Next> until you see the next image

2.jpg

Click Finish and Launch Lunch Filter Wizard

3.jpg

Choose the "Install a device filter" and click next

4.jpg

You will see this device selection.

Now you will need to connect you phone with power off to computer.
> Hold all the buttons and connect to the computer
(wait until you see Mediatek USB Port in libusb Device selection and Install)
(note: you have to select and install it very quick, because the phone disconnect in just a few seconds)

5.jpg


> Wait until it shows this (Click OK and close libusb and Disconnect your phone)
6.jpg



INITIALIZATION:
• Extract Bypass Utility, and go to extracted folder

> type "cmd" in the address bar and hit enter
8_cmd.jpg

> in cmd console install (Install pyusb, pyserial, json5)
by typing: pip install pyusb pyserial json5

> after that bypass mtk
by typing: python main.py

bypass1.jpg


> when you see "Waiting for bootrom" , you need to connect your phone again (Holding all button and plug it into your computer and wait until it recognized.)
you should have this following output. do not close this window and remember the Found port of you phone
as you can see my port is = COM7
bypass2.jpg


DO NOT DISCONNECT YOUR PHONE FROM COMPUTER THIS TIME

FLASHING FIRMWARE:

• Extract SP Flashtool and Realme 3 Firmware

• Open flashtool.exe and click Options>Connection
and tick AURT instead of USB.
Select the COM port of the phone which is
COM7 in my case
then close Option Window
sp1.jpg


• Now In Flashtool choose Scatter-File from the Extracted Firmware of Realme 3
sp2.jpg
sp3.jpg

(wait until it finished the Processing)

• After that choose
Authentication File
sp4.jpg


• After loading Scatter and Auth File Click Download
download.jpg


It should start downloading the firmware to you phone now without any error.
(wait until it finished the download.)
sp5.jpg


When finished downloading you get a check windows indicating that the flash was successful!
sp6.jpg


Thats it Congratulations! You may now disconnect your phone from your computer and POWER ON.
your DEAD [HardBricked] Realme 3 is now Alive!

(Note: This method is applicable to any MTK devices with SoC
mt6735, mt6750, mt6765, mt6771, mt6785, mt8127, mt8163, mt8173, mt8695)
For more updates about MTK-Bypass visit the official github page @

all the tools and utility is not mine. credits to the developer.


Original Bypass Tool xdaThread


special thanks to @popoff-r for mentioning about a thread of repairing MTK devices.
 
Last edited:

fawazahmed0

Senior Member
Jan 31, 2015
337
264
so its you , i thought the two in the credits in your github bypass_utility is one who develop it. im sorry sir. im not really familliar where to see the owner of the work it github. im really sorry for not mentioning your name in this. gotta edit now. You are Great sir!
Thank you for putting this altogether, this should speed up the development work for this phone(kernel etc), as people don't have to go to service center for hard brick.

Also I want to tell you, I shouldn't get the credits for bypass_utility, the two people you mentioned should be getting the credits, I just forked(copy/cloned) the repository.

I assume you are new to github, anyone can fork(copy/clone) a repository by clicking on fork button
Screenshot (1).png


You can differentiate whether a repository is forked(copied) or original by seeing on the top left side.



Screenshot (2).png


Thanks
 
  • Love
Reactions: ATDteam

ATDteam

Member
May 3, 2014
31
12
Oppo Realme 3
Thank you for putting this altogether, this should speed up the development work for this phone(kernel etc), as people don't have to go to service center for hard brick.

Also I want to tell you, I shouldn't get the credits for bypass_utility, the two people you mentioned should be getting the credits, I just forked(copy/cloned) the repository.

I assume you are new to github, anyone can fork(copy/clone) a repository by clicking on fork button
View attachment 5205247

You can differentiate whether a repository is forked(copied) or original by seeing on the top left side.



View attachment 5205251

Thanks
Thank you so much that was a very helpful information. 😍
 
  • Like
Reactions: fawazahmed0

ATDteam

Member
May 3, 2014
31
12
Oppo Realme 3
What Error?, please provide screenshot of the error, if you can't explain it.

try to uninstall python and reinstall again, also download the bypass_utility, the one that i attached in this thread.
and try again. make sure your usb cable is working properly, it seems that your device does not read properly by the utility. change your cable if posible. Download python 3.9, if still doest work. try using windows 10 OS.

 

Al Djufri

Member
Jun 16, 2016
6
1
What Error?, please provide screenshot of the error, if you can't explain it.


try to uninstall python and reinstall again, also download the bypass_utility, the one that i attached in this thread.
and try again. make sure your usb cable is working properly, it seems that your device does not read properly by the utility. change your cable if posible. Download python 3.9, if still doest work. try using windows 10 OS.



Reinstalling python
Reinstalling lib libusb
Changing usb cable
Changing port usb
Change pc, i mean borrow a pc from my friend
Changing spflashtool, same problem sir?

Do you have telegram account
IMG_20210203_130437_558.jpg
 

ATDteam

Member
May 3, 2014
31
12
Oppo Realme 3
Its not the same in your first screenshot you reach "Disabling protection" but in the 2nd one only the utility found your phone..., did you release all the buttons emmidiately after your computer detects your phone phone? It is important that you release emmidiately. Did you try to use windows 10.? Sorry I dont have telegram.

Reinstalling python
Reinstalling lib libusb
Changing usb cable
Changing port usb
Change pc, i mean borrow a pc from my friend
Changing spflashtool, same problem sir?

Do you have telegram accountView attachment 5208303
 

Al Djufri

Member
Jun 16, 2016
6
1

Its not the same in your first screenshot you reach "Disabling protection" but in the 2nd one only the utility found your phone..., did you release all the buttons emmidiately after your computer detects your phone phone? It is important that you release emmidiately. Did you try to use windows 10.? Sorry I dont have telegram.


I'm trying to with my friend pc(windows 10) using latest python and same error sir..

Always Immediately release my button when pc detection my device.. but same error
 

Al Djufri

Member
Jun 16, 2016
6
1
( SOLVED )

you must be use windows 10
Use latest python version
Use latest SpFlash tool version
And don't forget to chek libusb instalation
Check via cmd "pip install libusb" and "pip install libusb1"
And try to use command "python main.py"

Sorry for my English..
Thanks sir..
IMG_20210203_221014_169.jpg
 
  • Love
Reactions: ATDteam

ATDteam

Member
May 3, 2014
31
12
Oppo Realme 3
( SOLVED )

you must be use windows 10
Use latest python version
Use latest SpFlash tool version
And don't forget to chek libusb instalation
Check via cmd "pip install libusb" and "pip install libusb1"
And try to use command "python main.py"

Sorry for my English..
Thanks sir..
View attachment 5208681
Nice thats great! sometimes you really need to be on Trial and Error before you achieve what you want. happy for you. Thank you for using my thread as guide, Credits to the developers of the utility. and you have a good english. mine is bad. :-D
 

dr.rom

Member
Jun 3, 2019
10
4
Xiaomi Poco X2
Anyone who facing problem when bootrom check, you have to flash first time or it will show error. Otherwise you have to uninstall and reinstall libusb.exe and others.
 
  • Like
Reactions: Ank Sak

Ank Sak

Senior Member
Nov 15, 2020
178
9
Lenovo K8 Note
Oppo Realme 3
Ok, thanks to ATDTEAM, very much, I bricked by patching boot image with magisk and flashing it, successfully flashed stock rom .ofp with SP Flash tool, not only this , I itentionally flashed another version , and it worked to, thnx to the bypass utility, it generates questions, the realme provides ozip files, so where are .ofp files coming from, or where we can get it, and... Fawazahmed0 , I am unable to flash twrp, I tried everything I could, I am on updated Android 10 c.19 now, so I can't flash custom recovery or root it... I can't even rollback bcoz I unable to find the older version ofp files, the ozip files just don't install, so please help for rooting Android 10, You have solved a major hurdle by introducing the method of bypass sp tool flashing but, the next step of flashing custom recovery and then rooting awaits... Pls help/ guide, Thnx...
 

Top Liked Posts

  • There are no posts matching your filters.
  • 8
    In this tutorial we are going to Repair Realme 3 (RMX1821) MT6771 Chipset.
    from being hard bricked (no charge, no recovery, no fastboot) using SP Flashtool.
    with the help of Bypass Utility "MTK-bypass" to disable bootrom protection(sla and daa).
    MTK-bypass credits to @k4y0z

    , @chaosmaster and @xyzz on github.

    REQUIREMENTS:
    • Python
    libusb-win32
    Sp Flashtool
    • Bypass Utility Compiled


    ---------------------------------------------------------------
    • Bypass Utility Latest Releases

    • Exploits Latest Releases

    • Realme 3 (rmx1821) Flashtool Firmware link soon
    > I will upload the realme 3 firmware with Scatter File and Auth File for Third Party Flashtool like SP Flashtool soon, but if you have an official firmware of realme 3 with Scatter and Auth File you can use it no matter what version it is.

    > If you know how to extract an OFP file, you can download this realme 3|3i firmware and extract the OFP file.

    https://fileload.coloros.com/30842RMX1821EX_11_C.17_201117_cb5665f2.zip

    > Video Tutorial on how to Extract OPPO | REALME firmware (OFP file)





    VIDEO TUTORIAL






    TEXT TUTORIAL

    INSTALLATION:

    Install Python (tick checkbox "Add Python X.X to PATH") and proceed.
    ( if you are using windows 10, Download and Install Python 3.9 through Microsoft Store )


    • Install lib-usb_win32

    1.jpg

    Click Next>Next> until you see the next image

    2.jpg

    Click Finish and Launch Lunch Filter Wizard

    3.jpg

    Choose the "Install a device filter" and click next

    4.jpg

    You will see this device selection.

    Now you will need to connect you phone with power off to computer.
    > Hold all the buttons and connect to the computer
    (wait until you see Mediatek USB Port in libusb Device selection and Install)
    (note: you have to select and install it very quick, because the phone disconnect in just a few seconds)

    5.jpg


    > Wait until it shows this (Click OK and close libusb and Disconnect your phone)
    6.jpg



    INITIALIZATION:
    • Extract Bypass Utility, and go to extracted folder

    > type "cmd" in the address bar and hit enter
    8_cmd.jpg

    > in cmd console install (Install pyusb, pyserial, json5)
    by typing: pip install pyusb pyserial json5

    > after that bypass mtk
    by typing: python main.py

    bypass1.jpg


    > when you see "Waiting for bootrom" , you need to connect your phone again (Holding all button and plug it into your computer and wait until it recognized.)
    you should have this following output. do not close this window and remember the Found port of you phone
    as you can see my port is = COM7
    bypass2.jpg


    DO NOT DISCONNECT YOUR PHONE FROM COMPUTER THIS TIME

    FLASHING FIRMWARE:

    • Extract SP Flashtool and Realme 3 Firmware

    • Open flashtool.exe and click Options>Connection
    and tick AURT instead of USB.
    Select the COM port of the phone which is
    COM7 in my case
    then close Option Window
    sp1.jpg


    • Now In Flashtool choose Scatter-File from the Extracted Firmware of Realme 3
    sp2.jpg
    sp3.jpg

    (wait until it finished the Processing)

    • After that choose
    Authentication File
    sp4.jpg


    • After loading Scatter and Auth File Click Download
    download.jpg


    It should start downloading the firmware to you phone now without any error.
    (wait until it finished the download.)
    sp5.jpg


    When finished downloading you get a check windows indicating that the flash was successful!
    sp6.jpg


    Thats it Congratulations! You may now disconnect your phone from your computer and POWER ON.
    your DEAD [HardBricked] Realme 3 is now Alive!

    (Note: This method is applicable to any MTK devices with SoC
    mt6735, mt6750, mt6765, mt6771, mt6785, mt8127, mt8163, mt8173, mt8695)
    For more updates about MTK-Bypass visit the official github page @

    all the tools and utility is not mine. credits to the developer.


    Original Bypass Tool xdaThread


    special thanks to @popoff-r for mentioning about a thread of repairing MTK devices.
    2
    it works great, i used it multiple times. but i used the sp flashing tool, in an incorrect way.
    see there are 3 options in the main page of the sp flashing tool, 1: ''format all + download''
    2: ''firmware upgrade'' 3: ''download only''
    i chose format all (first option, instead of the third option (download only) :(
    it was an innocent mistake.
    but now when i turn realme 3 on, it shows this error, but its realme instead of oppo, the photo was taken from youtube. err code = => download not completed! please press volume+ and power key 10s to power off then download it again. otherwise will block here 60s untill shutdown automatically .error code: 0x992566 i dont have the phone rightnow. its in some repair service center.

    realme 3 err code.png
    1
    so its you , i thought the two in the credits in your github bypass_utility is one who develop it. im sorry sir. im not really familliar where to see the owner of the work it github. im really sorry for not mentioning your name in this. gotta edit now. You are Great sir!
    1
    In this tutorial we are going to Repair Realme 3 (RMX1821) MT6771 Chipset.
    from being hard bricked (no charge, no recovery, no fastboot) using SP Flashtool.
    with the help of Bypass Utility "MTK-bypass" to disable bootrom protection(sla and daa).
    MTK-bypass credits to @k4y0z

    , @chaosmaster and @xyzz on github.

    REQUIREMENTS:
    • Python
    libusb-win32
    Sp Flashtool
    • Bypass Utility Compiled


    ---------------------------------------------------------------
    • Bypass Utility Latest Releases

    • Exploits Latest Releases

    • Realme 3 (rmx1821) Flashtool Firmware link soon
    > I will upload the realme 3 firmware with Scatter File and Auth File for Third Party Flashtool like SP Flashtool soon, but if you have an official firmware of realme 3 with Scatter and Auth File you can use it no matter what version it is.

    > If you know how to extract an OFP file, you can download this realme 3|3i firmware and extract the OFP file.

    https://fileload.coloros.com/30842RMX1821EX_11_C.17_201117_cb5665f2.zip

    > Video Tutorial on how to Extract OPPO | REALME firmware (OFP file)





    VIDEO TUTORIAL






    TEXT TUTORIAL

    INSTALLATION:

    Install Python (tick checkbox "Add Python X.X to PATH") and proceed.
    ( if you are using windows 10, Download and Install Python 3.9 through Microsoft Store )


    • Install lib-usb_win32

    View attachment 5200007
    Click Next>Next> until you see the next image

    View attachment 5200011
    Click Finish and Launch Lunch Filter Wizard

    View attachment 5200013
    Choose the "Install a device filter" and click next

    View attachment 5200019
    You will see this device selection.

    Now you will need to connect you phone with power off to computer.
    > Hold all the buttons and connect to the computer
    (wait until you see Mediatek USB Port in libusb Device selection and Install)
    (note: you have to select and install it very quick, because the phone disconnect in just a few seconds)

    View attachment 5200025


    > Wait until it shows this (Click OK and close libusb and Disconnect your phone)
    View attachment 5200027



    INITIALIZATION:
    • Extract Bypass Utility, and go to extracted folder

    > type "cmd" in the address bar and hit enter
    View attachment 5200031
    > in cmd console install (Install pyusb, pyserial, json5)
    by typing: pip install pyusb pyserial json5

    > after that bypass mtk
    by typing: python main.py

    View attachment 5200033

    > when you see "Waiting for bootrom" , you need to connect your phone again (Holding all button and plug it into your computer and wait until it recognized.)
    you should have this following output. do not close this window and remember the Found port of you phone
    as you can see my port is = COM7
    View attachment 5200035

    DO NOT DISCONNECT YOUR PHONE FROM COMPUTER THIS TIME

    FLASHING FIRMWARE:

    • Extract SP Flashtool and Realme 3 Firmware

    • Open flashtool.exe and click Options>Connection
    and tick AURT instead of USB.
    Select the COM port of the phone which is
    COM7 in my case
    then close Option Window
    View attachment 5200039


    • Now In Flashtool choose Scatter-File from the Extracted Firmware of Realme 3
    View attachment 5200045 View attachment 5200047

    (wait until it finished the Processing)

    • After that choose
    Authentication File
    View attachment 5200049


    • After loading Scatter and Auth File Click Download View attachment 5200053

    It should start downloading the firmware to you phone now without any error.
    (wait until it finished the download.)
    View attachment 5200055

    When finished downloading you get a check windows indicating that the flash was successful!
    View attachment 5200057

    Thats it Congratulations! You may now disconnect your phone from your computer and POWER ON.
    your DEAD [HardBricked] Realme 3 is now Alive!

    (Note: This method is applicable to any MTK devices with SoC
    mt6735, mt6750, mt6765, mt6771, mt6785, mt8127, mt8163, mt8173, mt8695)
    For more updates about MTK-Bypass visit the official github page @

    all the tools and utility is not mine. credits to the developer.


    Original Bypass Tool xdaThread


    special thanks to @popoff-r for mentioning about a thread of repairing MTK devices.
    Thank you very much.
    I got a little error while running the python code

    "python main.py"

    nothing happens after i run the code. I found a fix in case anyone needs it

    "py -3 main.py"

    It worked for me.
    In this tutorial we are going to Repair Realme 3 (RMX1821) MT6771 Chipset.
    from being hard bricked (no charge, no recovery, no fastboot) using SP Flashtool.
    with the help of Bypass Utility "MTK-bypass" to disable bootrom protection(sla and daa).
    MTK-bypass credits to @k4y0z

    , @chaosmaster and @xyzz on github.

    REQUIREMENTS:
    • Python
    libusb-win32
    Sp Flashtool
    • Bypass Utility Compiled


    ---------------------------------------------------------------
    • Bypass Utility Latest Releases

    • Exploits Latest Releases

    • Realme 3 (rmx1821) Flashtool Firmware link soon
    > I will upload the realme 3 firmware with Scatter File and Auth File for Third Party Flashtool like SP Flashtool soon, but if you have an official firmware of realme 3 with Scatter and Auth File you can use it no matter what version it is.

    > If you know how to extract an OFP file, you can download this realme 3|3i firmware and extract the OFP file.

    https://fileload.coloros.com/30842RMX1821EX_11_C.17_201117_cb5665f2.zip

    > Video Tutorial on how to Extract OPPO | REALME firmware (OFP file)





    VIDEO TUTORIAL






    TEXT TUTORIAL

    INSTALLATION:

    Install Python (tick checkbox "Add Python X.X to PATH") and proceed.
    ( if you are using windows 10, Download and Install Python 3.9 through Microsoft Store )


    • Install lib-usb_win32

    View attachment 5200007
    Click Next>Next> until you see the next image

    View attachment 5200011
    Click Finish and Launch Lunch Filter Wizard

    View attachment 5200013
    Choose the "Install a device filter" and click next

    View attachment 5200019
    You will see this device selection.

    Now you will need to connect you phone with power off to computer.
    > Hold all the buttons and connect to the computer
    (wait until you see Mediatek USB Port in libusb Device selection and Install)
    (note: you have to select and install it very quick, because the phone disconnect in just a few seconds)

    View attachment 5200025


    > Wait until it shows this (Click OK and close libusb and Disconnect your phone)
    View attachment 5200027



    INITIALIZATION:
    • Extract Bypass Utility, and go to extracted folder

    > type "cmd" in the address bar and hit enter
    View attachment 5200031
    > in cmd console install (Install pyusb, pyserial, json5)
    by typing: pip install pyusb pyserial json5

    > after that bypass mtk
    by typing: python main.py

    View attachment 5200033

    > when you see "Waiting for bootrom" , you need to connect your phone again (Holding all button and plug it into your computer and wait until it recognized.)
    you should have this following output. do not close this window and remember the Found port of you phone
    as you can see my port is = COM7
    View attachment 5200035

    DO NOT DISCONNECT YOUR PHONE FROM COMPUTER THIS TIME

    FLASHING FIRMWARE:

    • Extract SP Flashtool and Realme 3 Firmware

    • Open flashtool.exe and click Options>Connection
    and tick AURT instead of USB.
    Select the COM port of the phone which is
    COM7 in my case
    then close Option Window
    View attachment 5200039


    • Now In Flashtool choose Scatter-File from the Extracted Firmware of Realme 3
    View attachment 5200045 View attachment 5200047

    (wait until it finished the Processing)

    • After that choose
    Authentication File
    View attachment 5200049


    • After loading Scatter and Auth File Click Download View attachment 5200053

    It should start downloading the firmware to you phone now without any error.
    (wait until it finished the download.)
    View attachment 5200055

    When finished downloading you get a check windows indicating that the flash was successful!
    View attachment 5200057

    Thats it Congratulations! You may now disconnect your phone from your computer and POWER ON.
    your DEAD [HardBricked] Realme 3 is now Alive!

    (Note: This method is applicable to any MTK devices with SoC
    mt6735, mt6750, mt6765, mt6771, mt6785, mt8127, mt8163, mt8173, mt8695)
    For more updates about MTK-Bypass visit the official github page @

    all the tools and utility is not mine. credits to the developer.


    Original Bypass Tool xdaThread


    special thanks to @popoff-r for mentioning about a thread of repairing MTK devices.
    Thank you very much.
    I got a little error while running the python code

    "python main.py"

    nothing happens after i run the code. I found a fix in case anyone needs it

    "py -3 main.py"

    It worked for me.