Nintendo 3DS emulators
|Type||Handheld game console|
The Nintendo 3DS is an eighth-generation handheld game console by Nintendo, released on March 27, 2011 for $249. The original model and the 2DS had a dual-core ARM11 MPCore at 268 MHz and a single-core ARM9, 128MB of RAM and 6MB of VRAM, and a DMP PICA200 GPU. The New 3DS and New 2DS XL models upgrade this to an 804 MHz quad-core ARM11 and 256MB of RAM, along with an extra pair of shoulder buttons and a right analogue stick.
The most notable feature of this console is the use of autostereoscopic (i.e. without glasses) 3D, which can be configured using a slider. This was omitted on the cost-reduced 2DS and New 2DS XL models, which was released due to eye health concerns with children whom Nintendo advised not to use the 3DS's stereoscopic mode (though it is speculated that said advisories were more for liability reasons in case of a health-related lawsuit).
|Name||Platform(s)||Latest Version||Open-Source||Libretro Core||Active||Recommended|
|PC / x86|
|Mobile / ARM|
|Citra-MMJ (Unofficial)||Git (WIP)||✓||✗||✓||~|
- An open-source Nintendo 3DS emulator made by experienced emulator developers. The devs insist that it's still experimental, but as of mid-2019 around half of all games are fully playable with minor or no issues. An official Android version was released in May of 2020.
- Another open-source Nintendo 3DS emulator, made by experienced developers in the DS hacking scene. It was released shortly after Citra and received similar progress for a few months, but was eventually aborted by its authors after a while.
- A closed-source Nintendo 3DS emulator, presumably made by the iDeaS author. Little is known about it other than that it can run simple homebrew. It cannot be used for playing games.
- An unique 3DS emulator designed for macOS systems. Its GitHub activity started on May 5, 2019. Main programmer is a self-proclaimed dog lover and has previously created CorgiDS and DobieStation, though the former seemed to be abandoned. Corgi3DS is mainly indigenous but the preliminary Wi-Fi code was ported from melonDS' code.
- A commercial, Android-exclusive 3DS emulator optimized for smartphones and other mobile devices. Made by a former author of Citra and other emulators. On an indefinite hiatus.
Citra currently can't emulate any of the 3DS's online features aside from LAN multiplayer.
3DS vs. CIA
There are two big types of 3DS game images currently:
- Includes .CCI (CTR Cart Image), aka .3DS - data on physical carts, can be executed right off the bat, not used much since no one bothered to develop a CFW solution to load them yet (besides converting them to CIA) and only overpriced flashcarts (Gateway/Sky3DS) can load them.
- Includes .CIA (CTR Importable Archive) and .CXI - installers that unpack game data to the SD card or the 3DS NAND memory. Some homebrew apps (FBI, DevMenu) can install CIA files on 3DS systems with CFW installed. Digital games are often distributed as CIAs.
- Note that CTR (Citrus) is the internal code names for the 3DS.
Due to one format being so far restricted to overpriced flashcarts and the very slow Citra development (meaning playing on a real 3DS is still the preferred way to go), the CIA format is preferred in many sharing websites, downloader tools and even tools to dump your own games.
However, converting a CIA image to 3DS format (and vice-versa) is still possible with no loss of content. Read the Encryption section below for a guide.
Some outdated dumping utilities intended for use with Citra (like braindump) produce damaged decrypted 3DS images that can't be easily converted back. No known solution exists so far to fix those dumps.
Most dumps online are also encrypted. This encryption poses no problem for playing game images on a real 3DS since it can deal with that encryption with internal keys included in the bootrom, but becomes a problem when trying to emulate them on PC. Citra cannot play encrypted games, only decrypted games will work. A solution to load encrypted images is for the moment on the back burner and there's not much developer interest for it. If you want to play games on Citra, you'll have to convert your game images to that format.
Formerly, decrypting those ROMs used to require real 3DS hardware (bafflingly enough, Citra devs still ask users to do this even nowadays). It required files generated by a real 3DS called xorpads unique to that game version, using the encryption engine within the 3DS. After this part, these xorpads (which are big) can be used with PC tools (or other 3DS-based homebrew) to produce the decrypted game image. After that, some 3DS homebrew (Decrypt9, GodMode9) included tools to directly convert encrypted images to decrypted images with a single button press, but those still require a real 3DS.
But now this new feature was added to citra enables the user to play encrypted games without decrypting them. Read this page 
Then, go to this reddit page and copy the code from second comment (credit floppydoppy2)  copy it ,make a new .TXT file names 'aes_keys.txt' Then you might have that user folder for citra, then open it go to sysdata , assuming that you have a shared font.bin file there paste this AES keys.txt there. Now user folder is what is the system archive of 3ds you need it to display video Now put user folder in folder of citra or in c: drive (see some YouTube videos , read some reddit posts you will understand it) For user folder:- [
(This is a ogl 3.3 fix using mesa driver). Then extract this archive using 7-zip (don't use this as your citra this is an old version. Compatibility is very low and speed may be terrible in your device). Copy the 'user' folder you see on that folder, download the latest citra version on to your desktop then paste this user folder there.
The game changer was the sighax exploit, allowing to dump the 3DS bootrom which includes these encryption keys. This file can be downloaded from the Emulator Files page. You can then use a program like fuse-3ds to decrypt games using this file. Simply place boot9.bin in the same folder, run the program, mount the encrypted .cia or .3ds, and find the decrypted.cxi file inside (usually in the first folder). Citra should be able to load this file without issues.