You can use DSIHaxInjector for seedminer instead of this program. This is a cloud based version of TADpole and it's easier to use because of its user-friendly web interface.
- Windows - adapting to Linux is possible
- Python 2.x.x or 3.x.x - official download
- Pycryptodomex - install with
pip install pycryptodomex
- A DSiWare export from your target console - must be DSihax injectable (see list of injectable games). EA Sudoku is recommended for US/EU -- if you don't have one already on the list.
- A
movable.sed
from your target console - see README in latest seedminer release - A valid
ctcert.bin
with private key attached from a CFW console - see instructions below for guidance. You might also be able to find one online, but it may not be valid. I can confirm the one with SHA256 dc2a92d2c2f7cf444ff1343ecf1224c4e9e49daff79ae02d72585b850af0ad4e is valid, though. - Sudokuhax injection files for TADpole - download appropriate set from this link
Basic Command Line usage is:
Dump
python TADpole.py (8-digit hex).bin d
Rebuild
python TADpole.py (8-digit hex).bin r
Seedminer Instructions:
- Download and extract latest release of TADpole
- Copy the injectable DSiWare game from System Memory to your SD card via 3DS System Settings
- Copy the exported DSiWare game from your SD card (in
your-sd-card/Nintendo 3DS/ID0/ID1/Nintendo DSiWare/
) to the extracted TADpole folder on your PC. It might look like4b4c4455.bin
, for example. The hex number will be different of course. - Place
movable.sed
in.../TADpole/resources/
- Place
ctcert.bin
in.../TADpole/resources/
- Dump the exported DSiWare .bin by drag n dropping it on dump.bat.
- Place both sudokuhax injection files (
public.sav.inject
andsrl.nds.inject
) inside the generated game folder - Rebuild the modified game folder by drag n dropping the DSiWare .bin on rebuild.bat
- Copy the built
.patched
file to the.../Nintendo DSiWare/
folder in your SD card and replace the original DSiWare export with it by removing.patched
from the filename - Proceed to import the DSiWare to your system memory from your SD card
- Download b9sTool and place the boot.nds on your SD root
- Proceed with steps in Section VI of 3ds.guide
Note: more detailed instructions with screenshots can be found here (may be deprecated)
Warning: the following steps require access to a 3DS with Custom Firmware (an already hacked 3DS)
- Install the
seedstarter.cia
found in the seedminer release section - Place
ctcertifier.firm
in/luma/payloads/
of your SD card if you have Luma3DS installed or else somewhere where you can execute it via a chainloader - Turn on your 3DS and run
seedstarter.cia
- Press
Y
to dumpctcert.bin
(missing private key) tosdmc:/seedstarter/ctcert.bin
- Turn off your 3DS
- Run
ctcertifier.firm
by holdingStart
and turning the 3DS on when you have Luma3DS installed - Copy
ctcert.bin
fromsdmc:/seedstarter/ctcert.bin
to your TADpole location, and put it in theresources/
folder - Done
- If you perform a System Transfer from console A to console B, the
movable.sed
from console A (pre-transfer) will be identical to themovable.sed
for console B (post-transfer). - The release archives include an
.exe
if you want to avoid installing python2, python3, or python in general.
- yellows8 for ctr-dsiwaretool and 3dbrew documentation
- d0k3 for inspiring the creation of this tool with this commit