Dumping Nintendo 3DS System Files
ARM9 BootROM & OTP
ARM9 BootROM contains various encryption keys. OTP is used for encryption of console-unique data, such as NAND partitions.
Using GodMode9
This requires GodMode9 v1.1.8 or newer, started through boot9strap.
- Start GodMode9.
- Navigate to
[M:] MEMORY VIRTUAL
. - Press L on
boot9.bin
andotp.mem
to select both. - Press A to select, then choose "Copy to 0:/gm9/out".
- Turn off the system.
- Check inside
/gm9/out
on the SD card. The filesboot9.bin
andotp.bin
should be created.
Using fastboot3DS
This requires fastboot3DS v1.1 or newer installed to FIRM.
- While holding HOME, press POWER to boot into the fastboot3DS menu.
- Choose "Miscellaneous..." -> "Dump bootroms & OTP".
- Check that all steps show "success", then press B to power off.
- Check inside
/3ds
on the SD card. The filesboot9.bin
andotp.bin
should be created.
Using boot9strap before 1.4
This is the default setup when using 3DS Hacks Guide. This does not work when using boot9strap through ntrboot. If ntrboot is used, use the GodMode9 section above.
This option no longer works for boot9strap 1.4.
- While holding START + SELECT + X, press POWER.
- Check for
/boot9strap
on the SD card. The filesboot9.bin
andotp.bin
should be created inside.
movable.sed
movable.sed
contains KeyY for SD data encryption for all files under /Nintendo 3DS/<id0>/<id1>
. The file is located in CTRNAND at /private/movable.sed
.
If there is an essentials backup (essential.exefs
) created by GodMode9, the file is available inside as "movable
".
Using GodMode9
The drive depends on the source. SysNAND is at [1:] SYSNAND CTRNAND
and is most likely the one you want. EmuNAND/RedNAND is at [4:] EMUNAND CTRNAND
. A mounted NAND backup is at [7:] IMGNAND CTRNAND
.
- Start GodMode9.
- Navigate to the source drive ->
private
. - Select movable.sed, then choose "Copy to 0:/gm9/out".
- Turn off the system.
- Check inside
/gm9/out
on the SD card. The filemovable.sed
should be created.