Xiaomi Redmi Note 9 (Merlin) Repair IMEI successfully done by Hydra Tool
1. Run Hydra Tool MTK Module.
2. Choose Brand and Module.
3. Go to "Servic"--> "IMEI Repair"
4. Tick on "IMEI changing...........is illigal......"
5. Choose "Xiaomi Flash Mode" from drop down menu
6. Type IMEI from the Device Battery Housing (Original IMEI)
7. Tick "Auto Reboot"
8. Click on "Repair IMEI"
9. Connect cellphone to computer using USB Data Cable.
10. Wait until the operation is completed.
2. Choose Brand and Module.
3. Go to "Servic"--> "IMEI Repair"
4. Tick on "IMEI changing...........is illigal......"
5. Choose "Xiaomi Flash Mode" from drop down menu
6. Type IMEI from the Device Battery Housing (Original IMEI)
7. Tick "Auto Reboot"
8. Click on "Repair IMEI"
9. Connect cellphone to computer using USB Data Cable.
10. Wait until the operation is completed.
Screen Shorts
Logs
=====================================
***IMEI REPAIR FUNCTION****
Xiaomi Flashmode
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM3)
Device :5&3985650a&0&4
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&3985650a&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2
Handshaking...Ok
Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SB : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking...Ok
Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
NORMAL BOOT
Preparing Download Agent..
DA : MT6768_Xiaomi_New.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/07/07.10:10_513994
Init : Loader [1]
Sending : Accepted
Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_merlin.bin
Init : Accepted
Execute Secondary Loader
Init : Loader [2]
Executing : SYNC
Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 743FFA0899C5A818D66FA492BF28405F
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116,484 GB
eMMC CID : 13014E47314A3953391008311C287793 - G1J9S9
DA Speed : high-speed
Reading GPT-EMMC [0x00008000] 130 Items
Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_merlin.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707__052021103639\MT6768_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05508000]1024 KB ->frp.bin...Ok
-nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok
-persist[0x104A2000]48 MB ->persist.bin...Ok
-protect1[0x164A2000]8 MB ->protect1.bin...Ok
-protect2[0x16CA2000]11,367 MB ->protect2.bin...Ok
-nvram[0x19F00000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0707__052021103639
MTK Phone Loader is NOW RUNNING.
Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 743FFA0899C5A818D66FA492BF28405F
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116,484 GB
eMMC CID : 13014E47314A3953391008311C287793 - G1J9S9
Reading GPT-EMMC [0x00008000] 130 Items
IMEI INFO..
IMEI1 : *************48
IMEI2 : *************55
IMEI INFO..
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : *************83
Rebooting Device [Reboot To Normal]
Reboot Done!!
Elapsed Time : 00:01:19
BR
Mount Everest