This document lists 37 secret codes that can be entered on an Android device to access diagnostic tests and system information. Some of the codes test hardware components like the touchscreen, Bluetooth, GPS and WiFi. Other codes display information like the IMEI number, RAM version, and phone lock status. Several codes allow access to service menus or initiate factory resets to restore default settings.
This document lists 37 secret codes that can be entered on an Android device to access diagnostic tests and system information. Some of the codes test hardware components like the touchscreen, Bluetooth, GPS and WiFi. Other codes display information like the IMEI number, RAM version, and phone lock status. Several codes allow access to service menus or initiate factory resets to restore default settings.
This document lists 37 secret codes that can be entered on an Android device to access diagnostic tests and system information. Some of the codes test hardware components like the touchscreen, Bluetooth, GPS and WiFi. Other codes display information like the IMEI number, RAM version, and phone lock status. Several codes allow access to service menus or initiate factory resets to restore default settings.
This document lists 37 secret codes that can be entered on an Android device to access diagnostic tests and system information. Some of the codes test hardware components like the touchscreen, Bluetooth, GPS and WiFi. Other codes display information like the IMEI number, RAM version, and phone lock status. Several codes allow access to service menus or initiate factory resets to restore default settings.
2. For RAM Memory version: *#*#3264#*#* 3. For FTA SW version: *#*#1111#*#* 4. For FTA HW version: *#*#2222#*#* 5. For Touchscreen version: *#*#2663#*#* 6. To test Bluetooth: *#*#232331#*#* 7. To display Bluetooth Physic Address: #*#232337#*# 8. To test secret GPS: *#*#1472365#*#* 9. To test other GPS: *#*#1575#*#* 10. To test WiFi/Wireless LAN of phone: *#*#232339#*#* or *#*#528#*#* or *#*#526#*#* 11. To display Wi-Fi MAC Address: *#*#232338#*#* 12. To test Vibration and Back-light of device: *#*#0842#*#* 13. To test Proximity/Distance Sensor: *#*#0588#*#* 14. To test Touchscreen: *#*#2663#*#* 15. For Audio Test: *#*#0289#*#* or *#*#0673#*#* 16. To launch Service Mode: *#*#197328640#*#* 17. Hidden Service Menu (Motorola Droid): ##7764726 18. Field Test: *#*#7262626#*#* 19. To format the phone: *2767*3855# 20. To Restore Factory Settings: *#*#7780#*#* 21. To create Immediate backup of your multimedia files: *#*#273282*255*663282*#*#* 22. To display Phone Information: *#*#4636#*#* 23. To get detailed Camera Information: *#*#34971539#*#* 24. For Software & Hardware Information: *#12580*369# 25. To display HSDPA/HSUPA Control Menu: *#301279# 26. To start GTalk Monitoring: *#*#8255#*#* 27. To get PDA, Phone, H/W and RF Call Date: *#*#4986*2650468#*#* 28. Displays Build Time and Change List number: *#*#44336#*#* 29. Packet Loopback Test: *#*#0283#*#* 30. LCD Display Test: *#*#0*#*#* 31. Enter Service Menu (on New Phones): *#0*# 32. Diagnostic Configuration: *#9090# USEFUL ANDROID SECRET CODES
Making A Bootable High Sierra USB Installer Entirely From Scratch in Windows or Linux Mint (Without Access To Mac or App Store Installer - App) - Tutorials (The Genius Bar) - InsanelyMac Forum