Just install USB drivers, open maui meta, click connect and plug powered off phone.How enable meta mode and use maui meta in ROM 12.0.4 China (Redmi 10x 4G)? Thanks pro.
Just install USB drivers, open maui meta, click connect and plug powered off phone.How enable meta mode and use maui meta in ROM 12.0.4 China (Redmi 10x 4G)? Thanks pro.
Thanks pro,Just install USB drivers, open maui meta, click connect and plug powered off phone.
Good job, my friend.Thanks pro,
In Engineer mode, I can repair IMEI, and fix null NVRAM. Then, I readback nvram, nvdata... by SPFT. Then, I flash ROM Stock, and backup nvram,nvdata... But my devices is brick. Now, i return to ROM Engineer.
Good work, my friend.
Obviously, you can NOT.Newbie question - since we can run su commands trough adb shell on this rom, does anyone have idea how to try to install twrp (or some other custom recovery) with locked bootloader? I tried dd few different twrp.img's to /dev/block/mmcblk0p1 but that just gives bootloops.
Works with:
- Xiaomi Redmi Note 9
- Xiaomi Redmi 10X 4G
Build Date:
2020/05/13
Android Version:
QP1A.190711.020
Display ID:
AL2522-Merlin-V039-Q-0513
Build Fingerprint:
Redmi/merlin/merlin:10/QP1A.190711.020/258:userdebug/test-keys
Security Patch:
2019/12/05
Radio/Modem/Baseband Version:
MOLY.LR12A.R3.MP.V94.3
Kernel Version:
4.14.141-gf3c3c7a
Wed May 13 12:49:46 CST 2020
Download:
https://www.mediafire.com/file/lon7...V039-Q-0513_QP1A.190711.020_by-VD171.zip/file
Password:
Pass is in the attached file: PASSWORD_by_VD171.txt
How to flash it?
Use any scatter file specific for MERLIN.
Radio/Modem/Baseband properties:
Code:md1_dbginfodsp=DbgInfo_DSP_MT6768_MOLY_LR12A_R3_MP_V94_3_2019_12_31_16_23.xz md1_dbginfo=DbgInfo_LR12A.R3.MP_HUAQIN_Q0MP1_MT6769_SP_MOLY_LR12A_R3_MP_V94_3_2020_03_26_19_19.xz md1_mddbmeta=MDDB.META_MT6768_S00_MOLY_LR12A_R3_MP_V94_3.EDB md1_mddbmetaodb=MDDB.META.ODB_MT6768_S00_MOLY_LR12A_R3_MP_V94_3.XML.GZ md1_mddb=MDDB_InfoCustomAppSrcP_MT6768_S00_MOLY_LR12A_R3_MP_V94_3.EDB
Prop.default:
Code:ro.build.version.incremental=258 ro.odm.build.version.incremental=258 ro.vendor.build.version.incremental=258 ro.build.version.security_patch=2019-12-05 ro.vendor.build.security_patch=2019-12-05 ro.build.display.id=AL2522-Merlin-V039-Q-0513 ro.vendor.mediatek.version.release=alps-mp-q0.mp1.tc8sp2-V1.4_huaqin.q0mp1.k69v1.64_P1 ro.build.product=merlin ro.product.board=merlin ro.product.odm.device=merlin ro.product.odm.model=merlin ro.product.odm.name=merlin ro.product.product.device=merlin ro.product.product.model=merlin ro.product.product.name=merlin ro.product.system.device=merlin ro.product.system.model=merlin ro.product.system.name=merlin ro.product.vendor.device=merlin ro.product.vendor.model=merlin ro.product.vendor.name=merlin ro.build.flavor=merlin-userdebug ro.build.description=merlin-userdebug 10 QP1A.190711.020 258 test-keys ro.board.platform=mt6768 ro.build.id=QP1A.190711.020 ro.odm.build.id=QP1A.190711.020 ro.product.build.id=QP1A.190711.020 ro.system.build.id=QP1A.190711.020 ro.vendor.build.id=QP1A.190711.020 ro.bootimage.build.fingerprint=Redmi/merlin/merlin:10/QP1A.190711.020/258:userdebug/test-keys ro.odm.build.fingerprint=Redmi/merlin/merlin:10/QP1A.190711.020/258:userdebug/test-keys ro.product.build.fingerprint=Redmi/merlin/merlin:10/QP1A.190711.020/258:userdebug/test-keys ro.system.build.fingerprint=Redmi/merlin/merlin:10/QP1A.190711.020/258:userdebug/test-keys ro.vendor.build.fingerprint=Redmi/merlin/merlin:10/QP1A.190711.020/258:userdebug/test-keys ro.build.tags=test-keys ro.odm.build.tags=test-keys ro.system.build.tags=test-keys ro.vendor.build.tags=test-keys ro.build.type=userdebug ro.odm.build.type=userdebug ro.system.build.type=userdebug ro.vendor.build.type=userdebug ro.bootimage.build.date=Wed May 13 12:41:51 CST 2020 ro.build.date=Wed May 13 12:41:51 CST 2020 ro.odm.build.date=Wed May 13 12:41:51 CST 2020 ro.product.build.date=Wed May 13 12:41:51 CST 2020 ro.system.build.date=Wed May 13 12:41:51 CST 2020 ro.vendor.build.date=Wed May 13 12:41:51 CST 2020
MD5 hashes:
Code:APDB_MT6768_S01__W1953 -> 3adfe0c4e41828cd51ed783da774bd08 boot-debug.img -> e9dfb7dde67795157a871bc14b490054 boot.img -> d6e19a30d85a27379d91072665ad43c9 cache.img -> c40c137a18a26980d406d4ef0ccd7e61 cust.img -> e8c4e9f4ee0fe5052cf0dc356aedd8de DbgInfo_LR12A.R3.MP_HUAQIN_Q0MP1_MT6769_SP_MOLY_LR12A_R3_MP_V94_3_2020_03_26_19_19_1_ulwctg_n -> b5bf654ddaacfd61e78c131f721974af dtb.img -> ec4b37b164f1bd9ce6f2b1b911ac0872 dtbo-verified.img -> 9b0fa19089a0310325b88eebc8e41ae7 dtbo.img -> 9b0fa19089a0310325b88eebc8e41ae7 efuse.img -> 421f2cead0fbea555680b96136555941 exaid.img -> e8c4e9f4ee0fe5052cf0dc356aedd8de lk-verified.img -> 0ba475d8c216b2613815b59e3db8da2b lk.img -> 0ba475d8c216b2613815b59e3db8da2b logo.bin -> 257508aa9cdeb690e4a4ed038c91ff76 md1arm7.img -> a0453e723dc84255940d7791740d06db md1img-verified.img -> 27cd78644df092ade4ca03799dc3c2a3 md1img.img -> 27cd78644df092ade4ca03799dc3c2a3 md3img.img -> 9a9c185e3f6234103e5949716b9962d2 MDDB.META.ODB_MT6768_S00_MOLY_LR12A_R3_MP_V94_3_1_ulwctg_n.XML.GZ -> 4e040508c1878706a428c54ef0844e0f MDDB.META_MT6768_S00_MOLY_LR12A_R3_MP_V94_3_1_ulwctg_n.EDB -> 7c1ecfd4e3d626957b6655f107824649 MDDB_InfoCustomAppSrcP_MT6768_S00_MOLY_LR12A_R3_MP_V94_3_1_ulwctg_n.EDB -> b24757bd125ad435bd2d26575b5c1d75 MT6768_Android_scatter.txt -> 0a8f16b2276ee9c37337a3937f71a7c8 preloader.img -> dbc21da31860042674fab69d07444e95 preloader_emmc.img -> dbc21da31860042674fab69d07444e95 preloader_merlin.bin -> bc7ebc0c2ca06b0d99856d595949e215 preloader_ufs.img -> 29ef0e631a45bf14555fd6b7adb7a7bf product.img -> 7ec4f1ffd2b49d7c5b4f1bb5d3ba0dc6 ramdisk-debug.img -> b6048055b240d3c9f6933544b86416b5 ramdisk-recovery.img -> 77de275ef543e46bbedfd53b7e36f945 ramdisk.img -> 545ec84cf25662d1e4f4cf7e496fa56e recovery.img -> 6362f1beb617572680f3fc91640d3767 scp-verified.img -> 2cac6177dc7eec82421cb3f4a2776aff scp.img -> 2cac6177dc7eec82421cb3f4a2776aff secro.img -> 096587b863e1252d67b1b8307291db09 spmfw-verified.img -> 40345cc1edec88bcd510fa62eac01739 spmfw.img -> 40345cc1edec88bcd510fa62eac01739 sspm-verified.img -> 0ceaf392e89bf70c9a52a5c91cc75865 sspm.img -> 0ceaf392e89bf70c9a52a5c91cc75865 super.img -> 542873466ecc6603c81758cf6a000390 super_empty.img -> a6d56d7a12d989bf31511d866449291d system.img -> 27976b65c09bd01e7963a5f3db563fc7 tee-verified.img -> 4f2fdf78d5be3a5de0154c46af69d476 tee.img -> 4f2fdf78d5be3a5de0154c46af69d476 userdata.img -> 802561cd4739f2f0aae7a51890a5866f vbmeta.img -> 31da88d4a00b99b36081f859f17f808a vbmeta_system.img -> a6b560b53a42c98fba204f2b69e70fd7 vbmeta_vendor.img -> 86fae46d211bdedcb49bd08e901d4d3f vendor.img -> 1a15f790bf6c32fb959da9bc4dfce6e4
Do you need help with your MERLIN device ?
Read this FAQ: https://forum.xda-developers.com/t/...for-merlin-redmi-note-9-redmi-10x-4g.4225163/
Password:
Hello, sir! Sorry to impose but can you please help me with 1 file from halabtech?YES, this is leaked but it is OFFICIAL developed and signed by xiaomi.
Only Xiaomi can sign images with xiaomi signature.
Are you insane?
Do you mean halabtech has any developer on its team?
LOL, LOL, LOL.
Halabtech is just a (good) copier.
I've never seen anything developed by halabtech team.
Except some bat files compiled to exe... LOL, LOL, LOL.
( IF ANYBODY NEEDS ANY FILE UPLOAED TO halabtech, JUST TELL ME AND I WILL PROVIDE THIS FILE TO YOU FOR FREE ! )
Read this: https://forum.xda-developers.com/t/...dmi-note-9-redmi-10x-4g.4227933/post-84441883
Hello,Hello, sir! Sorry to impose but can you please help me with 1 file from halabtech?
It's this one: https://support.halabtech.com/index.php?a=downloads&b=file&id=417200
What a bummer. So it's just a SCAM/CLICKBAIT.Hello,
I downloaded the file.
But it just contain the same content of this bypass:
![]()
[GUIDE] How to bypass authentication and flash in EDL with NO auth for FREE
Thanks to: chaosmaster / k4y0z: GitHub / XDA xyzz / xyz`: GitHub / XDA Dinolek: GitHub / XDA How to install: 1. Download the attached file: VD171_MTK-bypass.zip. 2. Extract the file and open the folder. 3. Run and install python...forum.xda-developers.com
Basically, yes.
Does an engineering firmware/rom even exist for the Redmi 10X 5G? Is there any site where I can get/download it for free (no scam/clickbait)? I really need it badly.
I have no ideia.Does an engineering firmware/rom even exist for the Redmi 10X 5G? Is there any site where I can get/download it for free (no scam/clickbait)? I really need it badly.![]()
If you want to use pixelplusui, you can write both imei by yourself.I installed pixelplusui on miui 12.0.1 android 11 and I lost both imei, I made a backup of nvram and nvdata but when restoring them my imei is not repaired, this method can work for me?
I followed the tutorial to repair the imei using the engineer rom, but when I started the rom after flashing with spflashtool I surprisingly recovered the imei and the mobile network so I think it is a problem with the latest version of pixelplusiu or I just made a mistake in it installation process. Is there a problem if I install a custom rom on miui 12.0.1 android 11?If you want to use pixelplusui, you can write both imei by yourself.
If you want to use stock MIUI, just restore original nvram and erase nvdata.
I'm not sure, my friend.I followed the tutorial to repair the imei using the engineer rom, but when I started the rom after flashing with spflashtool I surprisingly recovered the imei and the mobile network so I think it is a problem with the latest version of pixelplusiu or I just made a mistake in it installation process. Is there a problem if I install a custom rom on miui 12.0.1 android 11?
First off thanks for your effort and support for this device, I want to ask you in case you know a few things:I'm not sure, my friend.
I don't like custom roms, I prefer stock roms
So, I don't know the answer.
I'm sorry.
md1_dbginfodsp=DbgInfo_DSP_MT6768_MOLY_LR12A_R3_MP_V94_3_2019_12_31_16_23.xz
md1_dbginfo=DbgInfo_LR12A.R3.MP_HUAQIN_Q0MP1_MT6769_SP_MOLY_LR12A_R3_MP_V94_3_2020_03_26_19_19.xz
md1_mddbmeta=MDDB.META_MT6768_S00_MOLY_LR12A_R3_MP_V94_3.EDB
md1_mddbmetaodb=MDDB.META.ODB_MT6768_S00_MOLY_LR12A_R3_MP_V94_3.XML.GZ
md1_mddb=MDDB_InfoCustomAppSrcP_MT6768_S00_MOLY_LR12A_R3_MP_V94_3.EDB
ro.build.version.incremental=258
ro.odm.build.version.incremental=258
ro.vendor.build.version.incremental=258
ro.build.version.security_patch=2019-12-05
ro.vendor.build.security_patch=2019-12-05
ro.build.display.id=AL2522-Merlin-V039-Q-0513
ro.vendor.mediatek.version.release=alps-mp-q0.mp1.tc8sp2-V1.4_huaqin.q0mp1.k69v1.64_P1
ro.build.product=merlin
ro.product.board=merlin
ro.product.odm.device=merlin
ro.product.odm.model=merlin
ro.product.odm.name=merlin
ro.product.product.device=merlin
ro.product.product.model=merlin
ro.product.product.name=merlin
ro.product.system.device=merlin
ro.product.system.model=merlin
ro.product.system.name=merlin
ro.product.vendor.device=merlin
ro.product.vendor.model=merlin
ro.product.vendor.name=merlin
ro.build.flavor=merlin-userdebug
ro.build.description=merlin-userdebug 10 QP1A.190711.020 258 test-keys
ro.board.platform=mt6768
ro.build.id=QP1A.190711.020
ro.odm.build.id=QP1A.190711.020
ro.product.build.id=QP1A.190711.020
ro.system.build.id=QP1A.190711.020
ro.vendor.build.id=QP1A.190711.020
ro.bootimage.build.fingerprint=Redmi/merlin/merlin:10/QP1A.190711.020/258:userdebug/test-keys
ro.odm.build.fingerprint=Redmi/merlin/merlin:10/QP1A.190711.020/258:userdebug/test-keys
ro.product.build.fingerprint=Redmi/merlin/merlin:10/QP1A.190711.020/258:userdebug/test-keys
ro.system.build.fingerprint=Redmi/merlin/merlin:10/QP1A.190711.020/258:userdebug/test-keys
ro.vendor.build.fingerprint=Redmi/merlin/merlin:10/QP1A.190711.020/258:userdebug/test-keys
ro.build.tags=test-keys
ro.odm.build.tags=test-keys
ro.system.build.tags=test-keys
ro.vendor.build.tags=test-keys
ro.build.type=userdebug
ro.odm.build.type=userdebug
ro.system.build.type=userdebug
ro.vendor.build.type=userdebug
ro.bootimage.build.date=Wed May 13 12:41:51 CST 2020
ro.build.date=Wed May 13 12:41:51 CST 2020
ro.odm.build.date=Wed May 13 12:41:51 CST 2020
ro.product.build.date=Wed May 13 12:41:51 CST 2020
ro.system.build.date=Wed May 13 12:41:51 CST 2020
ro.vendor.build.date=Wed May 13 12:41:51 CST 2020
APDB_MT6768_S01__W1953 -> 3adfe0c4e41828cd51ed783da774bd08
boot-debug.img -> e9dfb7dde67795157a871bc14b490054
boot.img -> d6e19a30d85a27379d91072665ad43c9
cache.img -> c40c137a18a26980d406d4ef0ccd7e61
cust.img -> e8c4e9f4ee0fe5052cf0dc356aedd8de
DbgInfo_LR12A.R3.MP_HUAQIN_Q0MP1_MT6769_SP_MOLY_LR12A_R3_MP_V94_3_2020_03_26_19_19_1_ulwctg_n -> b5bf654ddaacfd61e78c131f721974af
dtb.img -> ec4b37b164f1bd9ce6f2b1b911ac0872
dtbo-verified.img -> 9b0fa19089a0310325b88eebc8e41ae7
dtbo.img -> 9b0fa19089a0310325b88eebc8e41ae7
efuse.img -> 421f2cead0fbea555680b96136555941
exaid.img -> e8c4e9f4ee0fe5052cf0dc356aedd8de
lk-verified.img -> 0ba475d8c216b2613815b59e3db8da2b
lk.img -> 0ba475d8c216b2613815b59e3db8da2b
logo.bin -> 257508aa9cdeb690e4a4ed038c91ff76
md1arm7.img -> a0453e723dc84255940d7791740d06db
md1img-verified.img -> 27cd78644df092ade4ca03799dc3c2a3
md1img.img -> 27cd78644df092ade4ca03799dc3c2a3
md3img.img -> 9a9c185e3f6234103e5949716b9962d2
MDDB.META.ODB_MT6768_S00_MOLY_LR12A_R3_MP_V94_3_1_ulwctg_n.XML.GZ -> 4e040508c1878706a428c54ef0844e0f
MDDB.META_MT6768_S00_MOLY_LR12A_R3_MP_V94_3_1_ulwctg_n.EDB -> 7c1ecfd4e3d626957b6655f107824649
MDDB_InfoCustomAppSrcP_MT6768_S00_MOLY_LR12A_R3_MP_V94_3_1_ulwctg_n.EDB -> b24757bd125ad435bd2d26575b5c1d75
MT6768_Android_scatter.txt -> 0a8f16b2276ee9c37337a3937f71a7c8
preloader.img -> dbc21da31860042674fab69d07444e95
preloader_emmc.img -> dbc21da31860042674fab69d07444e95
preloader_merlin.bin -> bc7ebc0c2ca06b0d99856d595949e215
preloader_ufs.img -> 29ef0e631a45bf14555fd6b7adb7a7bf
product.img -> 7ec4f1ffd2b49d7c5b4f1bb5d3ba0dc6
ramdisk-debug.img -> b6048055b240d3c9f6933544b86416b5
ramdisk-recovery.img -> 77de275ef543e46bbedfd53b7e36f945
ramdisk.img -> 545ec84cf25662d1e4f4cf7e496fa56e
recovery.img -> 6362f1beb617572680f3fc91640d3767
scp-verified.img -> 2cac6177dc7eec82421cb3f4a2776aff
scp.img -> 2cac6177dc7eec82421cb3f4a2776aff
secro.img -> 096587b863e1252d67b1b8307291db09
spmfw-verified.img -> 40345cc1edec88bcd510fa62eac01739
spmfw.img -> 40345cc1edec88bcd510fa62eac01739
sspm-verified.img -> 0ceaf392e89bf70c9a52a5c91cc75865
sspm.img -> 0ceaf392e89bf70c9a52a5c91cc75865
super.img -> 542873466ecc6603c81758cf6a000390
super_empty.img -> a6d56d7a12d989bf31511d866449291d
system.img -> 27976b65c09bd01e7963a5f3db563fc7
tee-verified.img -> 4f2fdf78d5be3a5de0154c46af69d476
tee.img -> 4f2fdf78d5be3a5de0154c46af69d476
userdata.img -> 802561cd4739f2f0aae7a51890a5866f
vbmeta.img -> 31da88d4a00b99b36081f859f17f808a
vbmeta_system.img -> a6b560b53a42c98fba204f2b69e70fd7
vbmeta_vendor.img -> 86fae46d211bdedcb49bd08e901d4d3f
vendor.img -> 1a15f790bf6c32fb959da9bc4dfce6e4
If you want to use pixelplusui, you can write both imei by yourself.I installed pixelplusui on miui 12.0.1 android 11 and I lost both imei, I made a backup of nvram and nvdata but when restoring them my imei is not repaired, this method can work for me?
Good job, my friend.Thanks pro,
In Engineer mode, I can repair IMEI, and fix null NVRAM. Then, I readback nvram, nvdata... by SPFT. Then, I flash ROM Stock, and backup nvram,nvdata... But my devices is brick. Now, i return to ROM Engineer.
Just install USB drivers, open maui meta, click connect and plug powered off phone.How enable meta mode and use maui meta in ROM 12.0.4 China (Redmi 10x 4G)? Thanks pro.
I'm not a mod.Hello mod, if i flash this Rom, i may repair imei null for my device?