PatchPae2_PatchPae3
PatchPae2_PatchPae3 copied to clipboard
PatchPae2 by wj32 and PatchPae3 by evgeny
PatchPae2 by wj32 + PatchPae3 evgen_b MOD
Plese, consider make a donation: https://github.com/sponsors/therealdreg
Executable releases:
PatchPae3: PatchPAE3_2018_07_20.zip PatchPae2: PatchPae2.zip
https://github.com/wj32/PatchPae2
https://wj32.org/wp/2016/02/01/pae-patch-updated-for-windows-10/ https://wj32.org/wp/2013/10/25/pae-patch-updated-for-windows-8-1/ https://wj32.org/wp/2012/12/26/pae-patch-updated-for-windows-8/ https://wj32.org/wp/2011/02/23/pae-patch-updated-for-windows-7-sp1/
PatchPae (v2) by wj32. Tested on: Windows Vista SP2, Windows 7 SP0, Windows 7 SP1, Windows 8, Windows 8.1, Windows 10 (builds 10240, 10586, 14393, 23569)
== Installation ==
-
Open an elevated Command Prompt window.
-
cd C:\Windows\system32. Make sure the current directory is in fact system32.
[[ For Windows 8, Windows 8.1 and Windows 10: ]] 3. C:\WherePatchPaeIs\PatchPae2.exe -type kernel -o ntoskrnx.exe ntoskrnl.exe This will patch the kernel to enable a maximum of 128GB of RAM. [[ For Windows Vista and Windows 7: ]] 3. C:\WherePatchPaeIs\PatchPae2.exe -type kernel -o ntkrnlpx.exe ntkrnlpa.exe This will patch the kernel to enable a maximum of 128GB of RAM.
-
C:\WherePatchPaeIs\PatchPae2.exe -type loader -o winloadp.exe winload.exe This will patch the loader to disable signature verification.
-
bcdedit /copy {current} /d "Windows (PAE Patched)" This will create a new boot entry. A message should appear: The entry was successfully copied to {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx}.
[[ For Windows 8, Windows 8.1 and Windows 10: ]] 6. bcdedit /set {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx} kernel ntoskrnx.exe This will set our boot entry to load our patched kernel. [[ For Windows Vista and Windows 7: ]] 6. bcdedit /set {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx} kernel ntkrnlpx.exe This will set our boot entry to load our patched kernel.
-
bcdedit /set {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx} path \Windows\system32\winloadp.exe This will set our loader to be our patched loader.
-
bcdedit /set {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx} nointegritychecks 1 This will disable verification of the loader.
-
bcdedit /set {bootmgr} default {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx} This will set our boot entry to be the default.
-
bcdedit /set {bootmgr} timeout 2 This will set the timeout to be shorter. Note: you can change this timeout to whatever you like.
-
Restart the computer and enjoy.
== Removal == To remove the patch:
- Run msconfig, click Boot, highlight the entry named "Windows (PAE Patched)", and click Delete.
- Delete the files ntoskrnx.exe (or ntkrnlpx.exe) and winloadp.exe from C:\Windows\system32.
== Updates == When Windows Update installs new updates on your computer, you should run Step 3 again to ensure that you have the latest version of the kernel.
== Compiling == To compile PatchPae2, you need to get Process Hacker and build it. The directory structure should look like this:
- ...\ProcessHacker2\lib...
- ...\ProcessHacker2\phlib...
- ...\src\PatchPae2.sln