Noted for Xiaomi Redmi Note 11S 5G (mt6886
, codename: opal
).
python mtk.py da peek 0x48090000 0xe0000 --filename pstore.bin
- Ghidra/
strings
can be later used to read text insidepstore.bin
after peeking
Achieved by running strings
against a pulled expdb
partition, and searching the cmdline for ramoops
address and length:
ramoops.mem_address=0x48090000 ramoops.mem_size=0xe0000 ramoops.console_size=0x40000
I have made an automation for this here along with more info:
https://github.com/chickendrop89/mtk-log-util