Join Us and become a Member for a Verified Badge to access private areas with the latest PS4 PKGs.
PS4 Jailbreaking       Thread starter g991       Start date Feb 9, 2018 at 6:21 PM       183      
Status
Not open for further replies.
Process Memory View is a cool little memory tool! Do not press backspace in the Hex View, it will delete a byte so when you poke it messes it all up.. idrc to fix it. If anyone wants it, I can make a much much better tool later.

Edit the ip file and change it to your PlayStation's ip address, make sure you have jkpatch loaded first. If your console goes into rest mode, then doing anything with RPC may crash it.

Download: memview-r4.zip (45.57 KB)

Look at the release page for payload.bin and kpayload.bin!

Use the send.sh bash script to easily send it to the console!

To be honest, this is not about the Memory View tool... This is about jkpatch! A little project I have been working on. I want the community to help me develop this, so please send some pull requests or open an issue!

The RPC networking is light speed! On LAN there is basically no latency.

Please help commit to my project!

https://github.com/xemio/jkpatch

And from the README.md: Jailbreak Kernel Patches

Spoiler

:arrow: Update: Here is a new version with a reboot function, peek/poke unlimited length, and save view bytes to file. Also the hex view will now prevent you from inserting/deleting bytes. Oh also the memory map view looks 100x better, and you can see all the mappings now.

JKPatch PS4 4.05 Jailbreak Kernel Patches, Process Memory View Tool.png


I have also build the latest version of librpc and jkpatch for you all:
https://github.com/xemio/jkpatch/releases/tag/1

golden <3

JKPatch PS4 4.05 Jailbreak Kernel Patches, Process Memory View Tool.jpg
 

Comments

You would rather use an ftp that decrypts it for you. Dumping it would take longer and you need to dump all the regions for data etc..
 
Random question,
Can this tool be used to see any signing of the game or decryption keys?

Can a lock psn game be loaded and with the tool see what keys is it asking for to unlock (or when it ask for a key we can inject a fake pkg signature?).

Sorry for the noob question, trying to understand what can the tool do.
 
@g991 Have you updated the memview perhaps?

With the memview-r3 and the last payload.bin, kpayload.bin and librpc.dll I always get exception in every function (Refresh, Show Memory Map)
 
Is is just me or did the latest payload update break poking? I can peak an address just fine but when i poke the new value it seems to just input a random value. Works fine when I switch back to the previous payload build.
 
Yeah the payload broke. I already created an issue on github.

And because of that I tried the whole day until I noticed it wasn't actually my code breaking it and had no time to make that offset list. Expect it tomorrow!

Also got that baby pretty much ready now, just waiting for the payload fix...
 
Status
Not open for further replies.
Back
Top