MAMEWorld >> News
Previous thread Previous  View all threads Index   Next thread Next   Threaded Mode Threaded  

Pages: 1

SmitdoggAdministrator
Reged: 09/18/03
Posts: 16877
Send PM


Dr. Decapitator Update: Double Dragon
#241881 - 12/24/10 06:55 PM


http://decap.mameworld.info/



Moose
Don't make me assume my ultimate form!
Reged: 05/03/04
Posts: 1483
Loc: Outback, Australia
Send PM


Re: Dr. Decapitator Update: Double Dragon new [Re: Smitdogg]
#241933 - 12/26/10 03:55 AM


> http://decap.mameworld.info/

Nice one. It's good to know the bootleg MCU contained identical data.



Moose



Foxhack
Furry guy
Reged: 01/30/04
Posts: 2409
Loc: Spicy Canada
Send PM


Re: Dr. Decapitator Update: Double Dragon new [Re: Moose]
#241936 - 12/26/10 04:44 AM


> > http://decap.mameworld.info/
>
> Nice one. It's good to know the bootleg MCU contained identical data.

Wow. I'd like to know how THEY managed to read the data!



Lord Nightmare
Speech Synth Berzerker
Reged: 03/08/04
Posts: 855
Loc: PA, USA
Send PM


Re: Dr. Decapitator Update: Double Dragon new [Re: Foxhack]
#242289 - 12/31/10 06:44 AM


> > > http://decap.mameworld.info/
> >
> > Nice one. It's good to know the bootleg MCU contained identical data.
>
> Wow. I'd like to know how THEY managed to read the data!

Dark secret about HD63701Y0 chips which Dr. Decap discovered by accident when probing before wiping the security bit:
This has not been proven to work but because the security bit glitched when Dr Decap was messing with it, it might really be feasible: Power the chip with 3.3v to VCC and VPP (and use 3.3v to drive the address lines) while hooking to the chip in the EPROM program/verify mode. The low voltage causes the protection bit to glitch and oscillate, allowing random bits of the ROM to be read out. Take about 50 of these readings and logical AND them all together and you should get the ROM contents, with no decapping at all.
Note this will only work on HD63701Y0 EPROM/OTPROM parts, not HD6301Y0 mask parts.

P.S. The HD63701Y0 datasheet says to program the same data twice to the part, from 0x0000-0x3fff and 0x4000-0x7fff. This is actually misleading: the real EPROM array lives at 0x0000-0x3fff (and appears at 0xc000-0xffff when chip is running), but writing ANYTHING (except for things with the low two bits set to 0bxxxxx10) to 0x4000 will set the security bit! Writing to 0x4001-0x7fff may or may not have any effect (and this area always reads as 0xFF), but 0x4000 definitely sets the security bit.

If the security bit is set, the part will read as all 0xFF *EXCEPT* for location 0x4000, which will read as 0xFD (or if the secondary security flag was not set, as 0xFC).
If the security bit is NOT set, 0x4000 will read as 0xFF, regardless of the secondary flag state.

LN



"When life gives you zombies... *CHA-CHIK!* ...you make zombie-ade!"


Pages: 1

MAMEWorld >> News
Previous thread Previous  View all threads Index   Next thread Next   Threaded Mode Threaded  

Extra information Permissions
Moderator:  John IV, Robbbert, Tafoid 
0 registered and 390 anonymous users are browsing this forum.
You cannot start new topics
You cannot reply to topics
HTML is enabled
UBBCode is enabled
Thread views: 2618