This commit is contained in:
Devon Maloney 2018-03-03 23:55:37 -05:00
parent a17c0a37ac
commit 281f67e0b0

View file

@ -148,6 +148,7 @@ Use a [save manager](https://github.com/BernardoGiordano/Checkpoint/releases/lat
1. Copy the 11.4.0 / 11.5.0 / 11.6.0 `.firm` corresponding to **the target 3DS** to the `boot9strap` folder on the root of **the target 3DS**'s SD card
1. Copy `boot9strap.firm` from the boot9strap `.zip` to the `/boot9strap/` folder on your SD card
1. Launch b9sTool by starting your DSiWare game on **the target 3DS**
+ If prompted, you may have to tap the screen to trigger the exploit
1. Select "Dump F0F1" to backup **the target 3DS**'s FIRM
1. Exit b9sTool
+ You may have to force power off by holding the power button