![american megatrends bios update msi gt70 american megatrends bios update msi gt70](https://www.ecomputerz.com/images/american-megatrends-bios-update-cpu-z-tool.jpg)
- #AMERICAN MEGATRENDS BIOS UPDATE MSI GT70 SERIAL#
- #AMERICAN MEGATRENDS BIOS UPDATE MSI GT70 SOFTWARE#
- #AMERICAN MEGATRENDS BIOS UPDATE MSI GT70 PC#
- #AMERICAN MEGATRENDS BIOS UPDATE MSI GT70 DOWNLOAD#
One of the YELLOW ones had some MX IC markings, and while this chip is mentioned in several forums, it didn’t seem to be the BIOS one. Nonetheless, before bricking anything else, let’s check the markings on those chips 2. However, there are some other chips (highlighted in YELLOW) that are probably other SPIflashes (with other responsibilities). Typically, this chip is physically close to the CMOS battery, so there’s a candidate with high probability highlighted in RED in the board picture.
#AMERICAN MEGATRENDS BIOS UPDATE MSI GT70 PC#
The process seems rather simple: open the laptop, remove every power source (including the CMOS), find the BIOS chip, connect the clip and the clip to the CH341A, connect to the PC and use one of the available tools to flash with the new firmware from the MSI website.įirst thing first, let’s identify the BIOS SPIflash. So, why not trying to fix the laptop? At least it can’t get any worse. With some further reading, I found out that this device was pretty known among the BIOS modding community, and, although the lack of official documentation, an extensive amount of community-based documentation is available.
#AMERICAN MEGATRENDS BIOS UPDATE MSI GT70 SERIAL#
With this device, I could dump the firmware from a wide range of different serial flash memories (SPIflash) such as the ones typically used to “store” the BIOS program on PC. Among those tools was a CH341A Mini Programmer which costs around 4€ and comes already with some helpful auxiliary tools such as an 8 Pin test clip.ĬH341A is a USB interface chip that can emulate UART communication, standard parallel port, memory parallel port and synchronous serial (I2C, SPI). Some time ago, due to my interest in starting to reverse engineering IoT stuff, I began to look around for some cheap tools that I could use to get their firmware out from the chips and understand what the devices are doing. With no prospects of finding any repair stores that could fix my issue I gave up (for a while), and I brought a new PC along the way. The same notification also stated that no reparation had been done since they could not fix nor find the issue. After three weeks, they notified me to pick up the PC in the store. The other store stated that they needed to do some diagnostic to state if they were able to fix the issue ( this gave me some hope). I thought that was no solution, so I refused the proposal. One store stated (with no diagnostic procedure) that the only way to fix the issue was to replace the whole motherboard (approximated cost of 80€). With no other tools to proceed to the BIOS recovery, and, also, already starting to doubt if that BIOS was really the issue, I took the PC to two different hardware repair stores. However, my warranty was long gone, so that was a no-go. Tried to flash it again by connecting a USB flash drive with every possible BIOS recovery nomenclature ( SUPPER.ROM, *.BIO, AMIBIOS.ROM, …), which yield nothing.Īll the MSI forums pointed out that the only solution was to ship the PC to be repaired in their repair centres. Installed the battery again and no sign of life. Removed the CMOS battery (CR2032) and power-cycled the PC (by trying to turn it on with the battery and charger unplugged). However, from that point on, the PC never booted again. The process went as expected with an “Updated Successfully” message at the end.
#AMERICAN MEGATRENDS BIOS UPDATE MSI GT70 DOWNLOAD#
The process to update the BIOS seemed pretty straightforward: download the BIOS file, put the file on a USB drive, enter BIOS, update, confirm. This Intel-powered vulnerability could allow an attacker to grab information currently being processed on the computer by running a malicious program to get data from other running programs ( which is not supposed to happen). The machine was pretty reliable for all its life however, its processor, a 6th-generation Skylake-H Intel® Core™ i7-6700HQ, was amongst the ones affected with the Meltdown and Spectre vulnerabilities. As a result, back in 2016, I brought a 17.3’’ war machine, a MSI PE70 6QE which resulted in sacrificing my back once again.
#AMERICAN MEGATRENDS BIOS UPDATE MSI GT70 SOFTWARE#
So, after carrying an Asus machine for some years, the low screen resolution – 1366x768 – on a 15.6’’ screen became a pain to develop software with. So, I typically tend (and try) to buy machines that seem pretty reliable and easy to repair even if that comes with sacrificing my back a little. So here’s the story of bringing it back from the dead. As you can imagine doing the typical BIOS reset procedures did not work. So, after the update, the PC did not turn on again (with only the fans and the keyboard backlight turning on). Why update the BIOS since it’s a process well-known for bricking computers? Well, because of Intel and their wonderful speculative execution vulnerabilities. My long-term laptop, which accompanied me for some years, died some time ago while proceeding a BIOS update.