Welcome to PlayStationHaX

Register now to gain access to all of our features. Once registered and logged in, you will be able to contribute to this site by submitting your own content or replying to existing content. You'll be able to customize your profile, receive reputation points as a reward for submitting content, while also communicating with other members via your own private inbox, plus much more! This message will be removed once you have signed in.

  • Announcements

    • GregoryRasputin

      Say Hello, Make An Introduction Thread :)   11/20/2015

      We love having new members join the forum, what we like more is them being productive people and contributing a little bit to the forum. So if you are a new member, let us know who you are by saying hi in an introduction thread, you can find the forum section here: http://playstationhax.xyz/forums/forum/15-member-introduction/
    • GregoryRasputin

      Henkaku Section Now Open   07/28/2016

      PlayStationHaX now has its own dedicated Henkaku section: http://playstationhax.xyz/forums/forum/129-ps-vita-henkaku/
Sign in to follow this  
Followers 0
zecoxao

How to read and write to process memory using proc_rwmem

Credits(these go first):
Original authors: wskeu(for the reading part), wildcard (for the writing part)


Requirements:
* 1.76 console
* elf-loader
* ps4-sdk
* the payload source
* a brain

 

Steps:
1. Compile the payload. Specifically to what you want to patch, the size, etc. So, this:
 

/* set variables for reading and writing mem */
size_t dumphexsize = 0x200;
size_t dumpsize = 0x1; // size that you want to read
size_t writesize = 0x1; // size of the data you are overwriting
uint64_t base = start[0]; // use the number of the mapping you want to write to, starting with 0
size_t intoBase = 0x465FC9; // relative position of base

and this:

char *target = "SceShellCore";

2. Load elf-loader. Let it stabilize on stage 5. (To increase success rate, clear cookies, cache and history)
3. Load the payload. Specifically:

#listener
socat - TCP:my.ps4.ip:5052

#sender
socat -u FILE:path/to/rwmem TCP:my.ps4.ip:5053

4. This payload will take a while to listen to logs. Be patient. After a while it'll show log output with the memory before and memory after.

Notes: this is process peek and poke (reading and writing to process memory) using proc_rwmem, which is more efficient than the old method.

 

6

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!


Register a new account

Sign in

Already have an account? Sign in here.


Sign In Now
Sign in to follow this  
Followers 0