You can use DSIHaxInjector for seedminer instead of this program. This is a cloud based version of TADpole and it's easier to use because of its user-friendly web interface.
- Windows - adapting to Linux is possible
- Python 2.x.x or 3.x.x - official download
- Pycryptodomex - install with
pip install pycryptodomex - A DSiWare export from your target console - must be DSihax injectable (see list of injectable games). EA Sudoku is recommended for US/EU -- if you don't have one already on the list.
- A
movable.sedfrom your target console - see README in latest seedminer release - A valid
ctcert.binwith private key attached from a CFW console - see instructions below for guidance. You might also be able to find one online, but it may not be valid. I can confirm the one with SHA256 dc2a92d2c2f7cf444ff1343ecf1224c4e9e49daff79ae02d72585b850af0ad4e is valid, though. - Sudokuhax injection files for TADpole - download appropriate set from this link
Basic Command Line usage is:
Dump
python TADpole.py (8-digit hex).bin d
Rebuild
python TADpole.py (8-digit hex).bin r
Seedminer Instructions:
- Download and extract latest release of TADpole
- Copy the injectable DSiWare game from System Memory to your SD card via 3DS System Settings
- Copy the exported DSiWare game from your SD card (in
your-sd-card/Nintendo 3DS/ID0/ID1/Nintendo DSiWare/) to the extracted TADpole folder on your PC. It might look like4b4c4455.bin, for example. The hex number will be different of course. - Place
movable.sedin.../TADpole/resources/ - Place
ctcert.binin.../TADpole/resources/ - Dump the exported DSiWare .bin by drag n dropping it on dump.bat.
- Place both sudokuhax injection files (
public.sav.injectandsrl.nds.inject) inside the generated game folder - Rebuild the modified game folder by drag n dropping the DSiWare .bin on rebuild.bat
- Copy the built
.patchedfile to the.../Nintendo DSiWare/folder in your SD card and replace the original DSiWare export with it by removing.patchedfrom the filename - Proceed to import the DSiWare to your system memory from your SD card
- Download b9sTool and place the boot.nds on your SD root
- Proceed with steps in Section VI of 3ds.guide
Note: more detailed instructions with screenshots can be found here (may be deprecated)
Warning: the following steps require access to a 3DS with Custom Firmware (an already hacked 3DS)
- Install the
seedstarter.ciafound in the seedminer release section - Place
ctcertifier.firmin/luma/payloads/of your SD card if you have Luma3DS installed or else somewhere where you can execute it via a chainloader - Turn on your 3DS and run
seedstarter.cia - Press
Yto dumpctcert.bin(missing private key) tosdmc:/seedstarter/ctcert.bin - Turn off your 3DS
- Run
ctcertifier.firmby holdingStartand turning the 3DS on when you have Luma3DS installed - Copy
ctcert.binfromsdmc:/seedstarter/ctcert.binto your TADpole location, and put it in theresources/folder - Done
- If you perform a System Transfer from console A to console B, the
movable.sedfrom console A (pre-transfer) will be identical to themovable.sedfor console B (post-transfer). - The release archives include an
.exeif you want to avoid installing python2, python3, or python in general.
- yellows8 for ctr-dsiwaretool and 3dbrew documentation
- d0k3 for inspiring the creation of this tool with this commit