Hardmod Downgrade

An excellent guide to getting a hardmod can be found here. If you are on a New 3DS, read this before hardmodding.

This is a currently working implementation of the “FIRM partitions known-plaintext” exploit detailed here.

This will work on New 3DS, Old 3DS, and 2DS.

What you need


Section I - NAND modification
  1. Extract the autofirm .zip to a folder called autofirm
  2. Place a copy of your NAND backup (named nand.bin) in /autofirm/ folder
  3. Copy the contents of the NFIRM .zip to the /autofirm/source/firmwares/ folder
  4. Run autofirm.bat and select which device and version the NAND backup is for
  5. Wait while the script runs
  6. If everything worked, then your original NAND will have been renamed to nand.bin and you will have a modified nand_patched.bin containing the 10.4.0 NATIVE_FIRM
    • Keep nand.bin, it will be used later
  7. Flash this nand_patched.bin to your device with your hardmod
Section II - Exploit verification
  1. Copy and merge the 3ds folder from the 3DSident .zip to your device’s SD card
  2. Reinsert your SD card into your 3DS
  3. Use Homebrew Launcher (SoundHax) to launch the Homebrew Launcher on the device
  4. Launch 3DSident
  5. Verify that the following:
    • Kernel version: 2.50-11
    • FIRM version: 2.50-11
    • If either of these do not display the versions above, something has gone wrong and you should try again from the beginning

Your version number will not have changed in the settings.

Continue to Decrypt9 (Homebrew Launcher).

For support in English, ask for help at either #3dshacks on Rizon IRC or 3DS Hacking on Discord.
If you appreciate this guide, I accept Donations through both Bitcoin and PayPal.
If you would like to support me by using my Amazon referral links, you can find those here.
United States - Canada - United Kingdom -  Germany -  Spain -  France