[Q] How to check if the exploit can run peek/poke syscalls
I'd really like to know if my HTC Hero with the updated PSFreedom is able to run peek/poke syscalls. New version came yesterday, tried different payloads but not able to run any firmware (even not the stock one) from USB.
It asks me everytime for the controller to connect and then that the firmware couldn't been loaded.
I've made an LV2 dump which is in HEX is:
Is anyone able to read the HEX if I've got Peek/Poke syscalls?