some changes

This commit is contained in:
Plailect 2017-05-20 00:47:54 -04:00 committed by Plailect
parent 85984bd013
commit 16e0124f1b
No known key found for this signature in database
GPG key ID: F8A415C5EA602A41

View file

@ -36,8 +36,8 @@ Note that `secret_sector.bin` is needed to revert the arm9loaderhax exploit, whi
1. Power off your device
1. Insert your SD card into your computer
1. Create a folder named `boot9strap` on the root of your SD card
1. Copy `boot.firm` from the Luma3DS `.7z` to the root of your SD card
1. Create a folder named `boot9strap` on the root of your SD card
1. Copy `GodMode9.firm` from the GodMode9 `.zip` to the `/luma/payloads/` folder on your SD card
1. Delete any existing `.bin` payloads in the `/luma/payloads/` folder on your SD card as they will not be compatible with boot9strap compatible Luma3DS versions
1. Copy `SafeB9SInstaller.bin` from the SafeB9SInstaller `.zip` to the `/luma/payloads/` folder on your SD card
@ -101,6 +101,9 @@ ___
You can now remove any arm9loaderhax related files from your SD card, such as `arm9loaderhax.bin` on the root of your SD card and the `files9` folder on your SD card.
{: .notice--info}
Note that `firm0firm1.bak` and `sector0x96.bak` in the `/boot9strap/` folder on your SD card are only needed in the event of a failed boot9strap install. Once you have installed successfully, you can delete these two files.
{: .notice--info}
{% capture notice-6 %}
You can now hold (Select) on boot to launch the Luma3DS configuration menu.
You can now hold (Start) on boot to launch the Luma3DS chainloader menu (note that the Luma3DS chainloader menu is only displayed if there is more than one payload detected).