HackMii Installer

From WiiBrew
Jump to navigation Jump to search
HackMii Installer
TypeSystem tool
Wiimote1.svg Loads files from the Front SD slot Loads files from SDHC cards in the Front SD slot
This homebrew application makes permanent changes to the Wii's NAND, thus, this application should be used with caution.

The HackMii Installer is the tool used to install the Homebrew Channel and BootMii (including mini and CEIL1NG_CAT). It used to support the installation of DVDx as well, but that was removed due to the Homebrew channel taking its features.

It is obfuscated with WiiPax, which prevented it from being loaded in Dolphin until a recent update; Dolphin also previously detected it as a GameCube ELF, leading to repeated invalid memory access errors. In the latest Dolphin version, the installer gets up to the scam screen, but then Dolphin itself crashes with a segmentation fault.

Scam Warning

Numerous clones of the HackMii Installer exist, often coming in paid bundles. The HackMii Installer is free software; if you paid for it, you were scammed, and should demand your money back and report the scam site. Visit https://hbc.hackmii.com/scam/ for more info.


See also: Homebrew status

READ THE DISCLAIMER! In the VERY unlikely case that your Wii gets bricked by the installer, this will let you know where you stand in regards to Team Twiizers.

A more in-depth guide can be found at Homebrew setup.

Using an exploit

The most common way of launching the HackMii Installer is via an exploit. Some of these are specific to certain versions of the System Menu, while others are not but require you to own a certain Wii game in order to use them.

2.0 - 3.4 3.0 - 4.2 4.3
TwilightHack 0.1beta1.png
Template:Letterbomb logo
2.0 - 4.3 2.0 - 4.3 2.0 - 4.3
Indiana pwns.png

(NTSC-U/J use Yu-Gi-Vah)

2.0 - 4.3 2.0 - 4.3 2.0 - 4.3 (Includes K Wiis)
Return of the Jodi.png


2.2 - 4.3 (Requires Internet Channel) 2.0rev02 - 4.3 (Requires internet connection) 2.0 - 4.3 and Wii Mini
vWii only 3.0 - 4.3

Using a previous unsigned code-loading method

If you already have a homebrew loader capable of running unsigned code (Homebrew Channel, HomebrewFilter, etc.), you can use it to load the HackMii Installer.

  1. Download the HackMii Installer.
  2. Extract the HackMii Installer to find the boot.elf
  3. Place the boot.elf file in the location of your SD card that the loader specifies.
  4. Boot the loader that will work for your System Menu.
  5. Wait for the Hackmii Installer to run tests on your Wii
  6. Press Wiimote 1 Button when told to continue installing HBC and BootMii.

The installation should be automatic from this point on, and your Wii will reboot.

Using BootMii

If you already have BootMii installed, then you can use the SD loader to load the HackMii Installer.

  1. Download the HackMii Installer.
  2. Extract the HackMii Installer and copy boot.elf and bootmini.elf to your SD card.
  3. Load BootMii.
  4. Navigate to the SD card button and press it.
  5. Move through the filesystem to reach bootmini.elf.
  6. Open bootmini.elf. A proper IOS should now be launched, and the Wiimote can now connect.


When the HackMii Installer is launched, a scam warning should appear. If you have followed these steps correctly you should not have paid for any software. While this screen is being shown, the installer will perform tests on the Wii, checking whether each component can be installed. At the latest version, Homebrew channel can be installed on all Wiis, while BootMii can only be fully installed on some Wiis. Once the installer exits, you will be dumped to the Homebrew channel if it is present, otherwise to the System menu.

BootMii installation

The menu for BootMii contains multiple options. The "Prepare the SD card" button simply loads the necessary files onto the SD card, useful for preparing the SD card for another Wii or if the old files were lost. There are also two buttons for installing BootMii; one for installing as boot2, and one as IOS, the former being unavailable on some Wiis. To learn more about the difference, visit BootMii.

The lack of an uninstall button for BootMii as boot2 may cause some to believe that BootMii as boot2 cannot be uninstalled. This is not the case; an uninstall button will appear once BootMii is installed. The uninstall button for BootMii as IOS is a bug, as previous versions of the HackMii Installer always installed BootMii as IOS on launch, and removed it on quit unless the Install BootMii as IOS button was pressed, as that was necessary for its exploit.

Version history

Version Homebrew Channel version DVDX version BootMii version Changelog
1.2 1.1.2 N/A 1.5
  • Now works with Wii MotionPlus.
  • Further improvements to the overall stability of the boot1 safety checking code
1.1 1.1.1
  • Added a new exploit for vWii compatibility (ES_GetTicketViews integer overflow)
  • No longer installs BootMii as IOS, as BootMii does not work on the vWii.
1.0 1.1.0 1.4
0.8 1.0.8 1.3
0.7b 1.0.7 1.2
  • Further improvements to the overall stability
  • Added a new exploit for 4.3 (DVDLowOpenPartitionWithTmdAndTicket/DVDLowNoDiscOpenPartition GID switching with Wii Backup Disc TMD and ticket)
  • bootmini.elf was added for users with BootMii but not HBC.
  • Rewritten to use BootMii as IOS so all of bootmini.elf can be used for the normal installer as well
    • Previous versions used a patched /dev/flash to install BootMii-boot2
  • DVDX has been removed due to HBC now allowing full hardware access.
    • DVDX can still be uninstalled.[check]
  • Korean Wiis are now supported.
0.6 1.0.6 7 1.1
0.5 1.0.5
  • Added a new userland exploit (SDI unbounded register index) for compatibility with 4.2
  • Further improvements to the overall stability
0.4 1.0.4 6 1.0
0.3 1.0.3
  • Better IOS selection.
  • BootMii-boot2 installation now works when the beginning blocks of the NAND are bad
  • Other improvements to the overall stability
0.2 1.0.3 beta2
  • No longer gets stuck on boot2v4, due to a mini update
  • BootMii can now be uninstalled
0.1 1.0.2 5 beta1
  • Initial release with code merged from the Homebrew Channel installer and DVDX installer
  • Added STM release buffer overflow (not to be confused with STM Release Exploit) userland exploit
  • Added free_iobuf unchecked pointer syscall exploit