PatchPae2_PatchPae3 icon indicating copy to clipboard operation
PatchPae2_PatchPae3 copied to clipboard

PatchPae2 by wj32 and PatchPae3 by evgeny

PatchPae2 by wj32 + PatchPae3 evgen_b MOD

Plese, consider make a donation: https://github.com/sponsors/therealdreg

Executable releases:

PatchPae3: PatchPAE3_2018_07_20.zip PatchPae2: PatchPae2.zip

https://github.com/wj32/PatchPae2

https://wj32.org/wp/2016/02/01/pae-patch-updated-for-windows-10/ https://wj32.org/wp/2013/10/25/pae-patch-updated-for-windows-8-1/ https://wj32.org/wp/2012/12/26/pae-patch-updated-for-windows-8/ https://wj32.org/wp/2011/02/23/pae-patch-updated-for-windows-7-sp1/

PatchPae (v2) by wj32. Tested on: Windows Vista SP2, Windows 7 SP0, Windows 7 SP1, Windows 8, Windows 8.1, Windows 10 (builds 10240, 10586, 14393, 23569)

== Installation ==

  1. Open an elevated Command Prompt window.

  2. cd C:\Windows\system32. Make sure the current directory is in fact system32.

[[ For Windows 8, Windows 8.1 and Windows 10: ]] 3. C:\WherePatchPaeIs\PatchPae2.exe -type kernel -o ntoskrnx.exe ntoskrnl.exe This will patch the kernel to enable a maximum of 128GB of RAM. [[ For Windows Vista and Windows 7: ]] 3. C:\WherePatchPaeIs\PatchPae2.exe -type kernel -o ntkrnlpx.exe ntkrnlpa.exe This will patch the kernel to enable a maximum of 128GB of RAM.

  1. C:\WherePatchPaeIs\PatchPae2.exe -type loader -o winloadp.exe winload.exe This will patch the loader to disable signature verification.

  2. bcdedit /copy {current} /d "Windows (PAE Patched)" This will create a new boot entry. A message should appear: The entry was successfully copied to {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx}.

[[ For Windows 8, Windows 8.1 and Windows 10: ]] 6. bcdedit /set {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx} kernel ntoskrnx.exe This will set our boot entry to load our patched kernel. [[ For Windows Vista and Windows 7: ]] 6. bcdedit /set {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx} kernel ntkrnlpx.exe This will set our boot entry to load our patched kernel.

  1. bcdedit /set {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx} path \Windows\system32\winloadp.exe This will set our loader to be our patched loader.

  2. bcdedit /set {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx} nointegritychecks 1 This will disable verification of the loader.

  3. bcdedit /set {bootmgr} default {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx} This will set our boot entry to be the default.

  4. bcdedit /set {bootmgr} timeout 2 This will set the timeout to be shorter. Note: you can change this timeout to whatever you like.

  5. Restart the computer and enjoy.

== Removal == To remove the patch:

  • Run msconfig, click Boot, highlight the entry named "Windows (PAE Patched)", and click Delete.
  • Delete the files ntoskrnx.exe (or ntkrnlpx.exe) and winloadp.exe from C:\Windows\system32.

== Updates == When Windows Update installs new updates on your computer, you should run Step 3 again to ensure that you have the latest version of the kernel.

== Compiling == To compile PatchPae2, you need to get Process Hacker and build it. The directory structure should look like this:

  • ...\ProcessHacker2\lib...
  • ...\ProcessHacker2\phlib...
  • ...\src\PatchPae2.sln