There are reports that some Nintendo Wii U systems out in the wild are falling victim to mysterious failures. As is so often the case, certain error codes have been found in common across failed units out in the community, and [Voultar] decided to investigate to see if he could fix this problem with a little hacking.
[Voultar] wasn’t able to source a Wii U with the much-discussed NAND failure mode, but he was able to source a number of supposedly bricked Wii U systems displaying the error codes 160-0101 and 160-0103. The hack is achieved with an exploit in the Wii U’s USB Host Stack descriptor parsing module, developed by [GaryOderNichts]. It allows the injection of a payload that lets one run unsigned code on the Wii U, achieved via a Raspberry Pi Pico. The Pico is ultimately used to boot off an SD card running a recovery program for the Wii U. By resetting the Wii U’s “coldboot title ID”, it solves the error and gets the console booting properly, as per normal.
[Voultar] was able to fix five consoles displaying the common error messages, which we’d call a win. It’s not going to be a fix for every failed Wii U out there, but if you’ve got the dreaded 160-0101 or -0103 errors, it might be worth a shot.
Continue reading “Resurrecting A Bricked Wii U With A Raspberry Pi Pico”
With the release of Smash Ultimate fast approaching for the Nintendo Switch, [Patrick Hess] wanted to get ahead of the game and make sure his squad had the equipment they’d need. Namely, support for the GameCube controllers that serious Smash Bros players demand. But it wasn’t enough to have one or two of them hooked up, or even four. Not even six GameCube controllers could satiate his desire. No, he needed to have support for eight simultaneous GameCube controllers, and he wanted to look good doing it too.
Enter his meticulously designed eight player GameCube to USB adapter. Made out of dual official Nintendo GameCube to USB adapters (intended for the Wii U) merged together in a 3D printed case, the final result looks like something that could earn the coveted Nintendo Seal of Approval. Or at least, something that might pop up on the import sites in the next month or two for a few bucks.
[Patrick] started the project by recreating the official adapter PCBs and their housings in 3D using a pair of calipers. After a couple of test prints to make sure he had all the dimensions right, he could then move on to designing his final enclosure knowing he had accurate data to model around.
In addition to the two adapter boards, there’s also a four port USB hub inside the device’s case. Each adapter has two USB leads, here shortened to fit inside the case, which connect up to the hub. The integrated hub allows connecting all eight GameCube controllers through only a single USB connection. All controllers worked as expected during intense testing on the Wii U’s version of Smash Bros, though at this point [Patrick] can only assume it will work when the Switch version is released.
If there’s a downside to this project, it’s that the design for the 3D printed case is so intricate that [Patrick] was only able to print it on a machine that supported water-soluble PVA supports. A somewhat tall order for the average hacker; it would be interesting to see if somebody could make a second pass on the enclosure that is geared more towards printability than aesthetics.
While the design of the GameCube controller remains somewhat controversial after all these years, there’s no denying it retains an impressive following. Whether turning them into USB devices, shrinking them to preposterously small dimensions, or just finding increasingly creative ways to use them on Nintendo’s latest console, hackers are definitely in love with the gonzo little controller that’s now pushing 20 years old.
Legendary sudomod forum user [banjokazooie] has once again demonstrated their prowess in Wii U console modification — this time by transforming it into a powerhouse portable computer!
We loved [banjokazooie]’s RetroPie Wii U mod, and happy to see them back again with this build. What’s in this thing this time around? Buckle up ’cause it’s a ride: an Intel M5 processor core M on their Compute Stick, 4GBs RAM, a 64GB solid-state drive, a 2K LCD touchscreen, Bluetooth, WiFi, a 128GB SD card slot, two 3.7V 4000 mAh batteries, a Pololu 5V,6A step-down voltage regulator, a Teensy 2.0++ dev board, a battery protection PCB, a USB DAC sound card, stereo amp, a USB hub for everything to plug into, and a TP5100 battery charging board. Check it out!
Continue reading “A Wii U That Is Both Computer And Console.”
For some reason, a lot of hackers seem to have an obsession with jamming video game consoles into smaller boxes with screens. It’s more portable yes, but be honest — how much use is it actually going to get? Regardless, [RedmagnusX] has just finished up what might be the first Wii U laptop.
He’s using a 17″ laptop screen from a Dell XPS M1730, which he’s combined with a case of his own design that fits the Wii U’s guts. To interface the screen from the Wii, he picked up a driver-board from NJYtouch. He’s also managed to cram the power regulator into the laptop, and a few small speakers for audio output. He also integrated the sensor bar into the top of the unit. Not too shabby!
It reminds us a lot of this older Xbox 360 laptop mod, and looks surprisingly similar. However our favorite case mod still has to be the PlayBox — [Eddie Zarick’s] beautiful combination unit featuring an Xbox One and the PS4 in a single 22″ box.
[Thanks for the tip Jon!]
It’s been just a bit over a year since the Wii U was released along with the extremely impressive Wii U controller. With a D-pad, analog sticks, accelerometer, gyroscope, magnetometer, camera and 6.2 inch touchscreen, this controller is ripe for a million and one projects ranging from FPV quadcopters and robots to things we can’t even think of yet. At this year’s Chaos Communication Congress, [booto], [delroth], and [shuffle2] demonstrated how they cracked open the Wii U controller’s encryption allowing for Wii U controller ’emulation’ and giving us full documentation on how the whole thing works.
The guys started on their reverse engineering journey by dumping all the flash chips found on the controller’s board. In those binary blobs, they found Nintendo used a truly ingenious way of obfuscating the WiFi keys used to connect the controller to the Wii: rotate left by three. To be fair to Nintendo engineers, it was secure until someone figured it out.
Connecting the controller to a PC over WiFi is only half the battle, though. Initial information from the Wii U launch suggested Nintendo used Miracast for all the I/O between the controller and the console. This isn’t the case; instead the video, audio, camera, and button input are non-standard but very simple protocols. The hardest to break into was the video display for the touchscreen, but the guys discovered it’s pretty much H.264. After getting around some Nintendo weirdness, it’s possible to display video on the controller.
The guys have put together a small, extremely alpha library that comes with all the demos, documentation, and reverse engineering information. There’s a large wish list of what this library should include, but now that the information is public, it might be the time to pick up a Wii U.
Video of the talk below, here’s the presentation slides, and a demo of emulating a Wii U game pad on a PC.
Continue reading “Using The Wii U Controller With Everything”
With the release of the Wii U last weekend we knew it wouldn’t be long before we saw those glorious gut shots on the Internet. The folks at iFixit have torn down a Wii U, and the insides look somewhat promising for a potential hack to take control of the Wii U Game Pad.
The components in the Wii U console aren’t terribly surprising; a few wireless controllers, HDMI adapters, Flash memory chips, and the IBM Power CPU make up most of the interesting components. The insides of the GamePad, though, look pretty interesting. It appears the Wii U GamePad is powered by an ARM Cortex microcontroller built by STMicroelectronics, but the part numbers for the major ICs on the GamePad board are impervious to Googling.
Of course there’s still the question of how video is transmitted wirelessly from the Wii U console to the GamePad. iFixit found a Broadcom BCM4319XKUBG Wireless module that operates on normal WiFi frequencies. This module has been used in a few other pieces of video gear, most notably the Boxee Box, so there is some possibility of intercepting the video signal transmitted to the GamePad and figuring out the protocol.
The long and short of iFixit’s teardown, at least from the hacker perspective, is that all the interesting parts use hardware similar to what you’d find on any other eminently hackable device. Here’s to hoping we get an open Wii U GamePad before the year is out.
With the launch of the Wii U yesterday, we were wondering exactly how long it would take for this new console to be broken wide open allowing for the execution of homebrew code. Technically, it only took a day, as [wraggster] shows us, but the results aren’t what you would expect. Right now, he’s using methods meant for the classic Wii to open his system up; probably not the best way to open up the Wii U, but a start nonetheless.
This hack revolves around the Super Smash Bros. Brawl exploit that allows for the execution of unsigned code. It’s called Smash Stack and is one of the more popular ways of getting homebrew code running on the old, last-gen Wii.
Of course [wraggster]’s hack is dependent on the fact the classic Wii has been open for homebrew development for years now, and only works because of the Wii U’s ability to play classic Wii games. This probably isn’t the direction Wii U hackers want to go into, but it does provide a way for anyone to get into the Wii U system without using any new tricks.