Toggle menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

Eri Hakawai Wii

From GameBrew
Eri HaKawai
Erihakawaiwii2.png
General
Authordelroth
TypeExploits
Version1.0 + 2.0
LicenseGPL-2.0
Last Updated2011/03/27
Links
Website
1.0/2.0 Source

Eri HaKawai is a new exploit for PAL Wiis, which work for all currently released System Menu versions (<= 4.3). It works by using a bug in the savegame loading code of Tales of Symphonia: Dawn of the New World, the sequel to the Gamecube game Tales of Symphonia.

This is released it in a source format (no binary data.bin) under the GPLv2. You'll need a Broadway cross-compilation toolchain, as well as a checkout of Segher's Wii Git repository. You are free to use and modify the exploit as you wish (as long as it is allowed by the license, of course).

User guide

Prerequisites:

  • SD card (not SDHC) formatted as FAT16 or FAT32.
  • Some possibility to copy the savegame from the PC to the SD card (i.e. card reader).
  • "Tales of Symphonia: Dawn of the New World" game.
  • Some homebrew software to load, e.g. the HackMii Installer. Although this isn't necessary, it's highly recommended.

How to:

  • (Optional) If you have an existing ToS savegame. MOVE it to another SD CARD.
  • Copy the "private" folder to the root of your SD card.
  • Put the homebrew you want to load on the root of your SD card, named "boot.elf".
  • On your Wii, copy the save from the SD card to the internal memory.
  • Start the game and load the first save.
  • Press the PLUS button to enter the game menu.
  • Scroll to the STATUS button and press A.
  • Scroll to the monster named "Eri HaKawai" (NTSC version: "Giantpune") and press A.
  • The boot.elf file should be loaded from your SD card.

Media

Wii Eri HaKawai Exploit (softwii)

Credits

  • Team twiizers - savezelda elf loader.
  • Pierre "delroth" Bourdon - originally found the buffer overflow & managed to turn it into a working exploit (for the PAL version of the game). checksum code for PAL which was a great start when i was doing the USA checksum stuff.
  • giantpune - the USA version of this exploit. including - but not limited to - disassembling, poking, breakpointing, hex editing, checksumming, artworking, twintigging, tachtigging.

And big thanks to:

  • Segher - really useful save packing/unpacking tools.
  • nuke, link, dcx2, brkirch, Y.S, Frank Willie, et al - usb gecko, geckoOS, vdappc, geckoDotNET.
  • megazig, dcx2 - lots of useful knowledge concerning ASM, registers, PPC behavior, and other similar low-level stuff.

External links

Advertising: