|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
08-15-2015, 06:35 | #1 (permalink) |
Freak Poster Join Date: May 2013 Location: Nigeria
Posts: 435
Member: 1931004 Status: Offline Sonork: 100.1662382 Thanks Meter: 85 | [MTK 6571 EMMC theftlock reset] MerapiTool v1.3.0 Saved the day After 1M of Waiting Phone Brand: enet Phone Model: N6 Phone CPU: MTK 6571 EMMC: 2GB The phone is not supported in Merapi and VolcanoUtility last versions but was supported facially in VolcanoUtility v2.9.2 which means you can only read full info in that var. ====read info with MerapiTool_v1.2.6/v1.2.8 & VolcanoUtility_v3.0.4/v3.0.5/v2.9.7 etc==== Code: >>Analysis of USB port,Please insert phone USB cable. 15:25:34 > Connecting... 15:25:34 > CPU TYPE:MT6571 15:25:34 > Hardware version:CA00 15:25:34 > Software version:0000 15:25:34 > SecCfgVal :0x00000000 15:25:34 > BromVersion :0xFF 15:25:34 > BLVersion :0x01 >>Boot downloading complete! Code: Analysis of USB port,Please insert phone USB cable. Connecting... CPU TYPE:MT6571 Hardware version:CA00 Software version:0000 Boot downloading complete! EMMC_ID:0x1501004E3958524D42002688D6F7A1B7 EMMC_PRODUCT_NAME: SAMSUNG :0x4E3958524D42 EMMC_BOOT1_SIZE: 0x00200000 EMMC_BOOT2_SIZE: 0x00200000 EMMC_PRMB_SIZE: 0x00020000 EMMC_GP1_SIZE: 0x00000000 EMMC_GP2_SIZE: 0x00000000 EMMC_GP3_SIZE: 0x00000000 EMMC_GP4_SIZE: 0x00000000 EMMC_USER_SIZE: 0x070000000(1.75 G) Analysis of system files... PRELOADER: addr:0x000000 --length:0x1400000 MBR: addr:0x1400000 --length:0x080000 EBR1: addr:0x1480000 --length:0x080000 PRO_INFO: addr:0x1500000 --length:0x300000 NVRAM: addr:0x1800000 --length:0x500000 PROTECT_F: addr:0x1D00000 --length:0xA00000 PROTECT_S: addr:0x2700000 --length:0xA00000 SECCFG: addr:0x3100000 --length:0x020000 UBOOT: addr:0x3120000 --length:0x080000 BOOTIMG: addr:0x31A0000 --length:0x600000 RECOVERY: addr:0x37A0000 --length:0x600000 SEC_RO: addr:0x3DA0000 --length:0x040000 MISC: addr:0x3DE0000 --length:0x080000 LOGO: addr:0x3E60000 --length:0x300000 EXPDB: addr:0x4160000 --length:0xA00000 ANDROID: addr:0x4B60000 --length:0x25800000 CACHE: addr:0x2A360000 --length:0x8000000 USRDATA: addr:0x32360000 --length:0x25800000 FAT: addr:0x57B60000 --length:0x173C0000 BMTPOOL: addr:0xFFFF00A8 --length:0x000000 Format addr:0x36360000 --Format length:0x21800000 >>Read phone information success. Code: Thanks to zoneofash, Faisal_Computer & laxmi kamlesh for trying to help, although no success but i have gain a lot of experience from them. and promise me that they will fix the issue in the next updates as they will forward the logs to the coder's. Its MerapiTool Ver 1.3.0 that do the job am Angry with volcano team for not informing me that MT1.3.0 can support my phone and also for not including Improved "And" "OR" Bugs Solved in some MTK6571 EMMC or even mentioning the name MTK6571 in the features of this update which put me in conundrum. Any way here is the log report that the phone theft lock is reset successfully. Code: Analysis of USB port,Please insert phone USB cable. Analysis of USB port,Please insert phone USB cable. Connecting... CPU TYPE:MT6571 Hardware version:CA00 Software version:0000 SecCfgVal :0x00000000 BromVersion :0xFF BLVersion :0x01 Boot downloading complete! EMMC_ID:0x1501004E3958524D42002688D6F7A1B7 EMMC_PRODUCT_NAME: SAMSUNG :0x4E3958524D42 EMMC_BOOT1_SIZE: 0x00200000 EMMC_BOOT2_SIZE: 0x00200000 EMMC_PRMB_SIZE: 0x00020000 EMMC_GP1_SIZE: 0x00000000 EMMC_GP2_SIZE: 0x00000000 EMMC_GP3_SIZE: 0x00000000 EMMC_GP4_SIZE: 0x00000000 EMMC_USER_SIZE: 0x070000000(1.75 G) Analysis of system files... PRELOADER: addr:0x000000 --length:0x1400000 MBR: addr:0x1400000 --length:0x080000 EBR1: addr:0x1480000 --length:0x080000 PRO_INFO: addr:0x1500000 --length:0x300000 NVRAM: addr:0x1800000 --length:0x500000 PROTECT_F: addr:0x1D00000 --length:0xA00000 PROTECT_S: addr:0x2700000 --length:0xA00000 SECCFG: addr:0x3100000 --length:0x020000 UBOOT: addr:0x3120000 --length:0x080000 BOOTIMG: addr:0x31A0000 --length:0x600000 RECOVERY: addr:0x37A0000 --length:0x600000 SEC_RO: addr:0x3DA0000 --length:0x040000 MISC: addr:0x3DE0000 --length:0x080000 LOGO: addr:0x3E60000 --length:0x300000 EXPDB: addr:0x4160000 --length:0xA00000 ANDROID: addr:0x4B60000 --length:0x25800000 CACHE: addr:0x2A360000 --length:0x8000000 USRDATA: addr:0x32360000 --length:0x25800000 FAT: addr:0x57B60000 --length:0x173C0000 BMTPOOL: addr:0xFFFF00A8 --length:0x000000 Format addr:0x32360000 --Format length:0x25800000 Read phone information success. >>Successfully reset anti-theft lock |
The Following 3 Users Say Thank You to binadam23 For This Useful Post: |
Bookmarks |
| |
|