Credits(these go first):
Original authors: wskeu(for the reading part), wildcard (for the writing part)
* 1.76 console
* the payload source
* a brain
1. Compile the payload. Specifically to what you want to patch, the size, etc. So, this:
/* set variables for reading and writing mem */ size_t dumphexsize = 0x200; size_t dumpsize = 0x1; // size that you want to read size_t writesize = 0x1; // size of the data you are overwriting uint64_t base = start; // use the number of the mapping you want to write to, starting with 0 size_t intoBase = 0x465FC9; // relative position of base
char *target = "SceShellCore";
2. Load elf-loader. Let it stabilize on stage 5. (To increase success rate, clear cookies, cache and history)
3. Load the payload. Specifically:
#listener socat - TCP:my.ps4.ip:5052 #sender socat -u FILE:path/to/rwmem TCP:my.ps4.ip:5053
4. This payload will take a while to listen to logs. Be patient. After a while it’ll show log output with the memory before and memory after.
Notes: this is process peek and poke (reading and writing to process memory) using proc_rwmem, which is more efficient than the old method.