- Oct 30, 2019
- 45
- 15
Redmi Note 8 Pro "This MIUI version can't be installed" One Click Fix With DTPro...!!!
Checkout this Video For Tutorials-->ClickMe
Screenshot
LOGS
Checkout this Video For Tutorials-->ClickMe
Screenshot
LOGS
14-04-2022 3:34:23 - Operation : Unlock Bootloader
14-04-2022 3:34:24 - MTK Flash/AMAT Client
Preloader - Status: Waiting for PreLoader VCOM, please connect mobile
14-04-2022 3:35:13 - Port - Device detected
Preloader - CPU: MT6785(Helio G90)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0xa
Preloader - Disabling Watchdog...
Preloader - HW code: 0x813
Preloader - Target config: 0xe7
Preloader - SBC enabled: True
Preloader - SLA enabled: True
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
14-04-2022 3:35:13 - Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: A8C828C819BCA2E1E3EC2B3387456463
Preloader - SOC_ID: 59A0439A54574CF031D5F84EC349584E703317964D22DEEBB4A052641954C8B1
DTpro - Loading payload from mt6785_payload.bin, 0x264 bytes
DTpro - Authorization / Service
Kamakiri - Writing Keys...
Kamakiri - Authorizing the device Ok...
14-04-2022 3:35:13 - DTpro - Successfully sent payload: D:\DTPro\Mediatek _v4.0.0.000013EXT\File\mtkclient\payloads\mt6785_payload.bin
Port - Device detected
Main - Device is protected.
Main - Device is in BROM mode. Trying to dump preloader.
14-04-2022 3:35:15 - Successfully extracted preloader for this device to: D:\DTPro\Mediatek _v4.0.0.000013EXT\File\mtkclient\Loader\Preloader\preloader_begoniain.bin
DAXFlash - Uploading stage 1 from MTK_AllInOne_DA_5.1420.bin
14-04-2022 3:35:16 - DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x200000
Preloader - Jumping to 0x200000: ok.
14-04-2022 3:35:16 - DAXFlash - Successfully received DA sync
DAXFlash - UFS FWVer: 0x0
DAXFlash - UFS Blocksize:0x1000
DAXFlash - UFS ID: H9HQ53AECMMDAR
DAXFlash - UFS CID: ad014839485135334145434d4d444152
DAXFlash - UFS LU0 Size: 0xee5800000
DAXFlash - UFS LU1 Size: 0x400000
DAXFlash - UFS LU2 Size: 0x400000
DAXFlash - DRAM config needed for : ad014839485135334145434d4d444152
DAXFlash - Sending emi data ...
14-04-2022 3:35:16 - DAXFlash - Sending emi data succeeded.
DAXFlash - Uploading stage 2...
14-04-2022 3:35:17 - DAXFlash - Successfully uploaded stage 2
DAXFlash - UFS FWVer: 0x0
DAXFlash - UFS Blocksize:0x1000
DAXFlash - UFS ID: H9HQ53AECMMDAR
DAXFlash - UFS CID: ad014839485135334145434d4d444152
DAXFlash - UFS LU0 Size: 0xee5800000
DAXFlash - UFS LU1 Size: 0x400000
DAXFlash - UFS LU2 Size: 0x400000
DAXFlash - DA-CODE : 0x131B0
14-04-2022 3:35:18 - DAXFlash - DA Extensions successfully added
14-04-2022 3:35:18 - sej - HACC init
sej - HACC run
sej - HACC terminate
sej - HACC init
sej - HACC run
14-04-2022 3:35:18 - sej - HACC terminate
sej - HACC init
sej - HACC run
sej - HACC terminate
Done |--------------------------------------------------| 0.0% Write (Sector 0x0 of 0x1) 0.00 MB/s
Progress: |GûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûêGûê| 100.0% Write (Sector 0x1 of 0x1, ) 0.06 MB/s
xflashext - |--------------------------------------------------|
14-04-2022 3:35:18 - Unlock bootloader done!