![]() Type Offset VirtAddr PhysAddr FileSiz MemSiz Flg Align There is 1 program header, starting at offset 52 I assume you don't just write that in Windows CMD and it works : )) For example, this Tetris homebrew just uses 0x00100000 - 0x0017a940: You can run readelf -l to verify your executable satisfies this requirement. I will probably remove this limitation in the future, but all ELFs I could find were fine with this limitation. Place it as OPL.ELF or rename it to VTS_02_0.IFO ?įor the initial release, I didn't bother to reimplement a couple of functions used by the loader, so it requires that the ELF you load doesn't overwrite those functions I use (those are around 0x84000 - 0x85fff and 0x250000 - 0x29ffff). It presents a menu which allows you to select any of the homebrew programs you chose to include on the disc (and also allows booting from USB).Īlternatively, if you would rather just boot into a single homebrew application, the initial program the exploit attempts to boot is located at VIDEO_TS/VTS_02_0.IFO, replace it with your desired ELF file, with the below caveat that compatibility might be lower than if you booted a program through uLaunchELF I've included uLaunchELF recompiled with DVD support as the default initial program. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |