https://github.com/therealdreg/patchpae2_patchpae3
PatchPae2 by wj32 and PatchPae3 by evgeny
https://github.com/therealdreg/patchpae2_patchpae3
pae patcher patchpae2 patchpae3 windows
Last synced: 3 months ago
JSON representation
PatchPae2 by wj32 and PatchPae3 by evgeny
- Host: GitHub
- URL: https://github.com/therealdreg/patchpae2_patchpae3
- Owner: therealdreg
- Created: 2018-11-12T08:23:05.000Z (about 7 years ago)
- Default Branch: master
- Last Pushed: 2023-08-11T06:21:23.000Z (over 2 years ago)
- Last Synced: 2025-04-10T06:14:22.910Z (9 months ago)
- Topics: pae, patcher, patchpae2, patchpae3, windows
- Language: C
- Homepage: https://rootkit.es/
- Size: 261 KB
- Stars: 22
- Watchers: 4
- Forks: 7
- Open Issues: 1
-
Metadata Files:
- Readme: readme.txt
- Funding: .github/FUNDING.yml
Awesome Lists containing this project
README
PatchPae2 by wj32 + PatchPae3 evgen_b MOD
Plese, consider make a donation: https://github.com/sponsors/therealdreg
Executable releases:
PatchPae3: PatchPAE3_2018_07_20.zip
PatchPae2: PatchPae2.zip
-
https://github.com/wj32/PatchPae2
https://wj32.org/wp/2016/02/01/pae-patch-updated-for-windows-10/
https://wj32.org/wp/2013/10/25/pae-patch-updated-for-windows-8-1/
https://wj32.org/wp/2012/12/26/pae-patch-updated-for-windows-8/
https://wj32.org/wp/2011/02/23/pae-patch-updated-for-windows-7-sp1/
-
PatchPae (v2) by wj32.
Tested on: Windows Vista SP2, Windows 7 SP0, Windows 7 SP1, Windows 8, Windows 8.1, Windows 10 (builds 10240, 10586, 14393, 23569)
== Installation ==
1. Open an elevated Command Prompt window.
2. cd C:\Windows\system32.
Make sure the current directory is in fact system32.
[[ For Windows 8, Windows 8.1 and Windows 10: ]]
3. C:\WherePatchPaeIs\PatchPae2.exe -type kernel -o ntoskrnx.exe ntoskrnl.exe
This will patch the kernel to enable a maximum of 128GB of RAM.
[[ For Windows Vista and Windows 7: ]]
3. C:\WherePatchPaeIs\PatchPae2.exe -type kernel -o ntkrnlpx.exe ntkrnlpa.exe
This will patch the kernel to enable a maximum of 128GB of RAM.
4. C:\WherePatchPaeIs\PatchPae2.exe -type loader -o winloadp.exe winload.exe
This will patch the loader to disable signature verification.
5. bcdedit /copy {current} /d "Windows (PAE Patched)"
This will create a new boot entry. A message should appear:
The entry was successfully copied to {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx}.
[[ For Windows 8, Windows 8.1 and Windows 10: ]]
6. bcdedit /set {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx} kernel ntoskrnx.exe
This will set our boot entry to load our patched kernel.
[[ For Windows Vista and Windows 7: ]]
6. bcdedit /set {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx} kernel ntkrnlpx.exe
This will set our boot entry to load our patched kernel.
7. bcdedit /set {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx} path \Windows\system32\winloadp.exe
This will set our loader to be our patched loader.
8. bcdedit /set {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx} nointegritychecks 1
This will disable verification of the loader.
9. bcdedit /set {bootmgr} default {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx}
This will set our boot entry to be the default.
10. bcdedit /set {bootmgr} timeout 2
This will set the timeout to be shorter.
Note: you can change this timeout to whatever you like.
11. Restart the computer and enjoy.
== Removal ==
To remove the patch:
* Run msconfig, click Boot, highlight the entry named "Windows (PAE Patched)", and click Delete.
* Delete the files ntoskrnx.exe (or ntkrnlpx.exe) and winloadp.exe from C:\Windows\system32.
== Updates ==
When Windows Update installs new updates on your computer, you should run Step 3 again to ensure
that you have the latest version of the kernel.
== Compiling ==
To compile PatchPae2, you need to get Process Hacker and build it.
The directory structure should look like this:
* ...\ProcessHacker2\lib\...
* ...\ProcessHacker2\phlib\...
* ...\src\PatchPae2.sln