ojrengineering.blogg.se

Fairdell hexcmp2
Fairdell hexcmp2




Fairdell hexcmp2

Or pinmod via E.1 section in this thread, then dump FD as shown above, edit to unlock via info in same thread linked section B, spoiler 2, image one or two, then program back via FPTw.exe -desc -f fd.Fairdell Software is proud to present a new program HexCmp, which combines together the features of a binary file comparison application and a convenient hex editor. If anything, only the ME region would possibly be locked from reading, so he should be able to dump all but that without issue, and for that I can put back into a rebuilt BIOS for him and then he would have complete system specific backup.įPTw.exe -d SPI.bin << Entire BIOS, may error, or may only give partial dumpįPTw.exe -desc -d FD.bin << This will dump FD, then we can see what is locked for read/writeįPTw.exe -em -d ME.bin << This will dump ME Region, if allowed, if not errorįPTw.exe -gbe -d GBE.Bin << This will dump GbE region, if present, if not it will errorįPTw.exe -bios - d biosreg.bin << This will dump BIOS region only, largely what you have above via universal backup toolkit, since it skipped FD, ME, GbEįD can be unlocked with programmer dump, edit, program back. He needs to try, if not, then you never know. Locked FD general is only a write lockout, you can often dump all or at least most of the BIOS with FPT. Before starting to modify others BIOS, learn from this forum, search infos and then play.īIOS dump looks OK to me, but is only BIOS - you are right this is not usable to program back in with programmer, but could be used to rebuild base BIOS if he ever had to. With IFR extractor you will find offset of BIOS lock and SMI lock.Īdvice. Basically what is 01 mean that menu is visible, and what is 00 mean that menu is hidden.Īfter modify, save PE32 file, then REPLACE AS-IT-IS modified module inside BIOS file with UEFI tool. So… EE 2E 20 71 53 5F D9 40 AB 3D 9E 0C 26 D9 66 57 is so called “magic string”īefore this magic string there are some bytes that we need to change. "…it’s directly before EE 2E 20 71 53 5F D9 40 AB 3D 9E 0C 26 D9 66 57 which starts at starts at 0xFE4Ch of the extracted PE32 part of Setup So as our precious mate Lost_N_BIOS, share info to us, I prefer Fairdell HexCmp2 - because i open 2 files and see differences i made (a copy of original file that we modify vs original file).

Fairdell hexcmp2

Search inside for “magic string” (a hex string that is on zone we want to modify). Then edit PE32 image with Fairdell HexCmp2. Extract “PE32 image section” AS IT IS with UEFI tool. I use UEFI Tool, IFR Extractor, and Fairdell HexCmp2 (it is a hex comparer).Įxpand that GUID.






Fairdell hexcmp2