Thanks for clearing that up about the free space on the "TWL", what confused me about the name was how the dev unit handled ds games. You know how the 3ds's code name is CTR(we don't know what that stands for yet) and the ds's code name is NTR which mean Nitro. When a 3DS game is inserted, the dev menu says a "CTR CARD" is inserted, but when a DS game is inserted it says a "TWL CARD" is inserted instead of what I expected which would be "NTR CARD". I still do not understand this. - 3dsguy

DS=NTR, DSLite=USG (japanese for thin..), DSi=TWL(Twelve), DSiXL=UTL, 3DS=CTR... DS (on the 3DS) is usually associated with DSi.. --Elisherer 02:32, 19 October 2011 (CEST)
3dsguy, that game you inserted was released *long* before DSi right?(also, sign your comments with the signature button) --Yellows8 04:02, 19 October 2011 (CEST)
Elisherer thanks for clearing that up :).--3dsguy 09:46, 19 October 2011 (CEST)
Yellows8, no that game was not, but just now i tryed it with a game released in 2006 and it still said 'TWL CARD', but what Elisherer said explained this.--3dsguy 09:46, 19 October 2011 (CEST)


DS = NTR/Nitro
DSi = TWL/Twilight
3DS = CTR/Horizon
Wii = RVL/Revolution


Yellows8 - if you have DS/Nitro code running on a DSi system, can you escalate to DSi/TWL mode or load a TWL/DSi binary or similar. Jl12
No, that's impossible. When DSi launcher/sysmenu switches to DS-mode, launcher clears the MSB of a DSi register disabling access to the registers controlling what hw is enabled and the clock rate etc. Once those regs are disabled, it's impossible to re-enable them again without resetting the system via I2C etc.(Also, by the time any exploited title is running homebrew code, those regs are already disabled too.) --Yellows8 19:53, 7 November 2011 (CET)
Is the NAND encrypted as it is on 3DS? Also, does DSi use DLP [for TWL games] at all? Jl12
Yes, DSi NAND is encrypted with AES-CTR. DSiWare uses download-play but the WMB/dlp binaries are DS-mode only.--Yellows8 06:27, 14 November 2011 (CET)

@Yellows8 - I'm sorry for asking this so late, but what does NUS stand for in this context "redistributing copyrighted content, in this case NUS content, is *not* allowed here.". I do not understand why you deleted my page: Update Data

NUS = Nintendo Update Servers. Those archive(s) you linked to contained files you downloaded from NUS, all of which are copyrighted. Besides, mirroring NUS content without any decryption done at all is *completely* pointless. --Yellows8 16:41, 12 December 2011 (CET)
So would it be better to provide update logs, so it can point people to which update data is from which version as on the NUS the individual update data for each title is not stored the same way for all titles, providing people with further reference, so they know what they are using. You may ask me what would they use them for, they are still not decrypted and therefore pointless. ATM knowing which version is which on the NUS *maybe* very important, but I can't tell you more until later.--3dsguy 01:19, 13 December 2011 (CET)
Yeah a list of titleIDs and versions would be fine. One could grab that info from Title_list diffs, but that's not the best way to handle this. I have lists of updated titles for each 3DS system update, but of course I never bothered to document which version was from what sysupdate beyond just adding them to the title list page.(obtained from their system update SOAP) --Yellows8 02:20, 13 December 2011 (CET)

@Yellows8 - Thanks for your progress everyday, really. i have questions.. If feeling uneasy please tell me politely (and i will remove these).

  • Would you need a tool that can use specified patterns to mark the decrypted binary (certainly it can not be perfect) ? Or have you find a disassembler so powerful that you don't need that a tool any more? please tell me. if that is useful, let me and my friend make that.
The tool would have such ability in resolving the configuration file. Comment, Include, CmdID (with no params), CmdID (with specified params), CmdID (with no specified params). such as 80001000:0103:4,0102:4,Any:4. (ie this can mark 800010000102 out as a second type).
  • Just curious. It has been a long time since neimod's latest update. Have you got a board from him, or you are only using the exploit (not with the board). If the board is helpful, is there any access to get/purchase one? (if no i think i should learn how to diy one then)

it seems to be a long time for you to do all the documentations by yourself. (Orz i forgot my suggestion) --Syphurith 02:35, 15 April 2013 (CEST)

I don't have any 3DS ramhaxx, I use software savegame haxx of course. "is there any access to get/purchase one? (if no i think i should learn how to diy one then)" You should be asking neimod about that instead, but the soldering for 3DS ramhaxx would be *really* difficult. I'm not sure what you mean regarding that tool either, are you referring to a tool which would locate the code for service commands in a binary? --Yellows8 03:10, 15 April 2013 (CEST)
Thanks for reply. I will try to contact him for boards. About the tool, I hand you an example.
  • --Configuration
%This line is a comment. Supports ":",";","#","%"
%The line below would mark binary 800001000100 as type 01 of cmdid 01.
80000100:0100:4
%This can mark out a 80000200 (without params) as type 01 of cmdid 02
80000200:
%This can mark out a 800014F0****** (with 6 half-bytes param) as type 02 of cmdid 03
800014F0:1CD000:6,Any:6
  • --Example Binary
0140800002000156F30080000100010076EDD80000200
  • --Expected
0140800002000156F30080000100010076EDD80000200
  • --Expected Result File
0140<cmd_2 type_0>80000200</cmd_2>0156F300<cmd_1 type_1>80000100<param_type_1>0100</param_type_1></cmd_1>76EDD<cmd_2 type_0>80000200</cmd_2>
Then we can use CSS selector or other that correspondes to the format.
  • Exact output can be loaded in HTML or other UI that helps color the matched binary (To let you find some pattern that may not been identified). Users can adjust the Color setting themselves (including ForeGround and BackGround specified to any type of cmdid).
  • It can only mark out those you identified but it will leave the unknown code not colored. so i think that may help you find out new cmdid in the not-colored paras. also it will be designed to have the ability to load any size of file.
  • Cons: can not detect structures; may make mistake; need configuration file (can be made by writing the header code)
  • Pros: can visually color the matched patterns; can load unlimited size of file (result will be divided into segments of 1MB or other)
It would not be too difficult to make. However may take one or two weeks. --Syphurith 03:49, 15 April 2013 (CEST)
I have no need for a tool which searches for service commandIDs, when I can just search for commandIDs etc in my text-editor for disassembled code. --Yellows8 04:04, 15 April 2013 (CEST)