An open API service indexing awesome lists of open source software.

https://github.com/therealdreg/patchpae2_patchpae3

PatchPae2 by wj32 and PatchPae3 by evgeny
https://github.com/therealdreg/patchpae2_patchpae3

pae patcher patchpae2 patchpae3 windows

Last synced: 3 months ago
JSON representation

PatchPae2 by wj32 and PatchPae3 by evgeny

Awesome Lists containing this project

README

          

PatchPae2 by wj32 + PatchPae3 evgen_b MOD

Plese, consider make a donation: https://github.com/sponsors/therealdreg

Executable releases:

PatchPae3: PatchPAE3_2018_07_20.zip
PatchPae2: PatchPae2.zip

-
https://github.com/wj32/PatchPae2

https://wj32.org/wp/2016/02/01/pae-patch-updated-for-windows-10/
https://wj32.org/wp/2013/10/25/pae-patch-updated-for-windows-8-1/
https://wj32.org/wp/2012/12/26/pae-patch-updated-for-windows-8/
https://wj32.org/wp/2011/02/23/pae-patch-updated-for-windows-7-sp1/
-

PatchPae (v2) by wj32.
Tested on: Windows Vista SP2, Windows 7 SP0, Windows 7 SP1, Windows 8, Windows 8.1, Windows 10 (builds 10240, 10586, 14393, 23569)

== Installation ==
1. Open an elevated Command Prompt window.

2. cd C:\Windows\system32.
Make sure the current directory is in fact system32.

[[ For Windows 8, Windows 8.1 and Windows 10: ]]
3. C:\WherePatchPaeIs\PatchPae2.exe -type kernel -o ntoskrnx.exe ntoskrnl.exe
This will patch the kernel to enable a maximum of 128GB of RAM.
[[ For Windows Vista and Windows 7: ]]
3. C:\WherePatchPaeIs\PatchPae2.exe -type kernel -o ntkrnlpx.exe ntkrnlpa.exe
This will patch the kernel to enable a maximum of 128GB of RAM.

4. C:\WherePatchPaeIs\PatchPae2.exe -type loader -o winloadp.exe winload.exe
This will patch the loader to disable signature verification.

5. bcdedit /copy {current} /d "Windows (PAE Patched)"
This will create a new boot entry. A message should appear:
The entry was successfully copied to {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx}.

[[ For Windows 8, Windows 8.1 and Windows 10: ]]
6. bcdedit /set {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx} kernel ntoskrnx.exe
This will set our boot entry to load our patched kernel.
[[ For Windows Vista and Windows 7: ]]
6. bcdedit /set {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx} kernel ntkrnlpx.exe
This will set our boot entry to load our patched kernel.

7. bcdedit /set {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx} path \Windows\system32\winloadp.exe
This will set our loader to be our patched loader.

8. bcdedit /set {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx} nointegritychecks 1
This will disable verification of the loader.

9. bcdedit /set {bootmgr} default {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx}
This will set our boot entry to be the default.

10. bcdedit /set {bootmgr} timeout 2
This will set the timeout to be shorter.
Note: you can change this timeout to whatever you like.

11. Restart the computer and enjoy.

== Removal ==
To remove the patch:
* Run msconfig, click Boot, highlight the entry named "Windows (PAE Patched)", and click Delete.
* Delete the files ntoskrnx.exe (or ntkrnlpx.exe) and winloadp.exe from C:\Windows\system32.

== Updates ==
When Windows Update installs new updates on your computer, you should run Step 3 again to ensure
that you have the latest version of the kernel.

== Compiling ==
To compile PatchPae2, you need to get Process Hacker and build it.
The directory structure should look like this:
* ...\ProcessHacker2\lib\...
* ...\ProcessHacker2\phlib\...
* ...\src\PatchPae2.sln