Dumping Nintendo 3DS System Files


ARM9 BootROM & OTP

ARM9 BootROM contains various encryption keys. OTP is used for encryption of console-unique data, such as NAND partitions.

Using boot9strap

This is the default setup when using 3DS Hacks Guide. This does not work when using boot9strap through ntrboot. If ntrboot is used, use the GodMode9 section below.

  1. While holding START + SELECT + X, press POWER.
  2. Check for /boot9strap on the SD card. The files boot9.bin and otp.bin should be created inside.

Using fastboot3DS

This requires fastboot3DS v1.1 or newer installed to FIRM.

  1. While holding HOME, press POWER to boot into the fastboot3DS menu.
  2. Choose "Miscellaneous..." -> "Dump bootroms & OTP".
  3. Check that all steps show "success", then press B to power off.
  4. Check inside /3ds on the SD card. The files boot9.bin and otp.bin should be created.

Using GodMode9

This requires GodMode9 v1.1.8 or newer, started through boot9strap.

  1. Start GodMode9.
  2. Navigate to [M:] MEMORY VIRTUAL.
  3. Press L on boot9.bin and otp.mem to select both.
  4. Press A to select, then choose "Copy to 0:/gm9/out".
  5. Turn off the system.
  6. Check inside /gm9/out on the SD card. The files boot9.bin and otp.mem should be created.

movable.sed

movable.sed contains KeyY for SD data encryption for all files under /Nintendo 3DS/<id0>/<id1>. The file is located in CTRNAND at /private/movable.sed.

If you have an essentials backup (essential.exefs) created by GodMode9, the file is available inside as "movable".

Using GodMode9

The drive depends on the source. SysNAND is at [1:] SYSNAND CTRNAND. EmuNAND/RedNAND is at [4:] EMUNAND CTRNAND. A mounted NAND backup is at [7:] IMGNAND CTRNAND.

  1. Start GodMode9.
  2. Navigate to the source drive -> private.
  3. Select movable.sed, then choose "Copy to 0:/gm9/out".
  4. Turn off the system.
  5. Check inside /gm9/out on the SD card. The file movable.sed should be created.