Join Us and become a Member for a Verified Badge to access private areas with the latest PS4 PKGs.
PS4 Jailbreaking       Thread starter g991       Start date Feb 9, 2018 at 6:21 PM       183      
Status
Not open for further replies.
Process Memory View is a cool little memory tool! Do not press backspace in the Hex View, it will delete a byte so when you poke it messes it all up.. idrc to fix it. If anyone wants it, I can make a much much better tool later.

Edit the ip file and change it to your PlayStation's ip address, make sure you have jkpatch loaded first. If your console goes into rest mode, then doing anything with RPC may crash it.

Download: memview-r4.zip (45.57 KB)

Look at the release page for payload.bin and kpayload.bin!

Use the send.sh bash script to easily send it to the console!

To be honest, this is not about the Memory View tool... This is about jkpatch! A little project I have been working on. I want the community to help me develop this, so please send some pull requests or open an issue!

The RPC networking is light speed! On LAN there is basically no latency.

Please help commit to my project!

https://github.com/xemio/jkpatch

And from the README.md: Jailbreak Kernel Patches

Spoiler

:arrow: Update: Here is a new version with a reboot function, peek/poke unlimited length, and save view bytes to file. Also the hex view will now prevent you from inserting/deleting bytes. Oh also the memory map view looks 100x better, and you can see all the mappings now.

JKPatch PS4 4.05 Jailbreak Kernel Patches, Process Memory View Tool.png


I have also build the latest version of librpc and jkpatch for you all:
https://github.com/xemio/jkpatch/releases/tag/1

golden <3

JKPatch PS4 4.05 Jailbreak Kernel Patches, Process Memory View Tool.jpg
 

Comments

This is simply an all in one program for your jailbroken PS4. It lets you run fake pkgs, fake selfs, do RPC (i.e. modding games from computer and remotely controlling your PS4). In the future, it may include FTP etc...

The thing that makes jkpatch special is that it runs in the kernel. No usermode processes, not the web browser, but in its own kernel memory and thread. So that means, if you close the web browser, you can still executing RPC commands.
 
Write your own RPC tool, the memview RPC library is now actually out of date from the master git library. I have added more features. Or just try pressing refresh...

Also anyone thats wants to help, look at the git issues. I need help solving some stuff and implementing RPC function calling.

Was my fault, works fine and show all the process

The max length that peek is 0x1000 ??

Thanks a lot
 
Yeah I kind of need to fix that. In librpc I should do a recursive call to ReadMemory when length > RPC_MAX_DATA_LEN. Open an issue on github and I will fix it today.
 
Now im hyped:bananaman: .. and thanks for the replay .. i'll try to read more about it in other places so i can understand it more and more and more :D
and hope you find the committers to help out on it
 
Can someone tell me what you use to inject the two payloads?

Whenever I try to inject kpayload.elf as my 2nd payload I just get a system memory error.
 
just wanted to say thank you very much for your work @g991!!
Thanks very much for sharing and for being so engaged and aproachable!! What you and others are releasing and doing is extremely appreciated!!

@DeathRGH what are you doing when you first start the console? Are you booting from a shutdowned system or doing a restart after you get the error and going through the rebuild database, etc, etc?

I find unless you boot from a completely powered-down system, you will run into those mem errors.
 
While waiting for the message delay I re-read through the pages and it now got clear that the first payload only is a listener for the kpayload... Someone should add that to op!
 
Status
Not open for further replies.
Back
Top