在 VMware 虚拟机上安装黑苹果(Hackintosh):免费 macOS ISO 镜像下载及安装教程

您所在的位置:网站首页 苹果电脑装虚拟机教程 在 VMware 虚拟机上安装黑苹果(Hackintosh):免费 macOS ISO 镜像下载及安装教程

在 VMware 虚拟机上安装黑苹果(Hackintosh):免费 macOS ISO 镜像下载及安装教程

2024-07-11 07:38| 来源: 网络整理| 查看: 265

在 VMware 虚拟机上安装黑苹果(Hackintosh):免费 macOS ISO 镜像下载及安装教程 VMware 虚拟机解锁 macOS 安装选项使用 macOS iso 系统镜像安装使用 OpenCore 做引导程序安装 在 VMware 虚拟机上安装黑苹果(Hackintosh):免费 macOS ISO 镜像下载及安装教程

当涉及在 VMware 虚拟机上安装黑苹果(Hackintosh)时,有两种主要方法:

使用 macOS iso 镜像安装。使用 OpenCore 作引导程序安装。

本文重点介绍使用 macOS ISO 黑苹果镜像的安装方法,并提供免费的 macOS Monterey (12.7) 系统镜像资源下载链接。 从设置 VMware 到安装过程,一步步指导安装黑苹果,让你轻松体验 macOS 虚拟化环境。

OpenCore 的使用方式,请参考:https://dortania.github.io/OpenCore-Install-Guide/

解锁工具 csdn: https://download.csdn.net/download/cheungxiongwei/88639281?spm=1001.2014.3001.5503

VMware 虚拟机解锁 macOS 安装选项

Monterey (12.7) 镜像资源下载:zip压缩分卷合集,全部下载下来,解压即可。 免费下载,无任何下载积分,全部下载完成后,打开 Monterey.zip 文件即可解压 macOS iso 系统镜像文件。

https://download.csdn.net/download/cheungxiongwei/88639279 https://download.csdn.net/download/cheungxiongwei/88639037?spm=1001.2014.3001.5503 https://download.csdn.net/download/cheungxiongwei/88639076?spm=1001.2014.3001.5503 https://download.csdn.net/download/cheungxiongwei/88639196?spm=1001.2014.3001.5503 https://download.csdn.net/download/cheungxiongwei/88639202?spm=1001.2014.3001.5503 https://download.csdn.net/download/cheungxiongwei/88639210?spm=1001.2014.3001.5503 https://download.csdn.net/download/cheungxiongwei/88639215?spm=1001.2014.3001.5503 https://download.csdn.net/download/cheungxiongwei/88639220?spm=1001.2014.3001.5503 https://download.csdn.net/download/cheungxiongwei/88639227?spm=1001.2014.3001.5503 https://download.csdn.net/download/cheungxiongwei/88639234?spm=1001.2014.3001.5503 https://download.csdn.net/download/cheungxiongwei/88639253?spm=1001.2014.3001.5503 https://download.csdn.net/download/cheungxiongwei/88639260?spm=1001.2014.3001.5503 https://download.csdn.net/download/cheungxiongwei/88639270?spm=1001.2014.3001.5503

VMware macOS

黑苹果 为了让 VMware 可以创建 macOS 虚拟机,需要下载 unlock.exe 工具, 并以管理员权限运行 unlock.exe 工具,给 VMware 打上 macOS 补丁。

下载地址:从 https://github.com/DrDonk/unlocker 下载 unlocker 工具。

在这里插入图片描述

unlock.exe 工具输出内容如下:

Unlocker 4.2.7 for VMware Workstation/Player ============================================ VMware is installed at: C:\Program Files (x86)\VMware\VMware Workstation\ VMware version: 20800274 Stopping VMware services and tasks... Stopping service VMUSBArbService Stopping service VMAuthdService Stopping service VmwareAutostartService Stopping task vmware-tray.exe Installing unlock patches Patching... Patching C:\Program Files (x86)\VMware\VMware Workstation\vmwarebase.dll C:\Program Files (x86)\VMware\VMware Workstation\vmwarebase.dll -> C:\Users\root\Downloads\unlocker427\backup\17.0.0.20800274\vmwarebase.dll Flag patched @ offset: 0x004e85e0 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x004e8620 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x004e8660 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x004e86a0 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x004e86e0 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x004e8720 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x004e8760 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x004e87a0 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x004e87e0 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x004e8820 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x004e8860 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x004e88a0 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x004e88e0 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x004e8920 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x004e8960 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x004e89a0 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x004e89e0 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x004e8a20 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x0059e1a0 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x0059e1e0 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x0059e220 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x0059e260 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x0059e2a0 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x0059e2e0 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x0059e320 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x0059e360 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x0059e3a0 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x0059e3e0 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x0059e420 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x0059e460 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x0059e4a0 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x0059e4e0 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x0059e520 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x0059e560 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x0059e5a0 Flag: 0x3e -> 0x3f Flag patched @ offset: 0x0059e5e0 Flag: 0x3e -> 0x3f Patched 36 flags Patching C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx.exe C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx.exe -> C:\Users\root\Downloads\unlocker427\backup\17.0.0.20800274\vmware-vmx.exe appleSMCTableV0 (smc.version = '0') File Offset : 0x00cd6300 Keys Address : 0x140cd7b20 Public Keys : 0x00f0/0240 Private Keys : 0x00f2/0242 Table Offset : 0x00cd6320 Getting +LKS: 0x00cd6368 +LKS 01 flag 0x90 0x1401f8ec0 07 Patching OSK0: 0x00cda6a0 OSK0 32 ch8* 0x80 0x1401f8f40 0000000000000000000000000000000000000000000000000000000000000000 0x00cda6a0 OSK0 32 ch8* 0x80 0x1401f8ec0 6f757268617264776f726b62797468657365776f72647367756172646564706c Patching OSK1: 0x00cda6e8 OSK1 32 ch8* 0x80 0x1401f8f40 0000000000000000000000000000000000000000000000000000000000000000 0x00cda6e8 OSK1 32 ch8* 0x80 0x1401f8ec0 65617365646f6e74737465616c2863294170706c65436f6d7075746572496e63 appleSMCTableV1 (smc.version = '1') File Offset : 0x00cda730 Keys Address : 0x140cdbf50 Public Keys : 0x01b0/0432 Private Keys : 0x01b4/0436 Table Offset : 0x00cda750 Getting +LKS: 0x00cda828 +LKS 01 flag 0x90 0x1401f8ec0 01 Patching OSK0: 0x00ce2160 OSK0 32 ch8* 0x90 0x1401f8f40 0000000000000000000000000000000000000000000000000000000000000000 0x00ce2160 OSK0 32 ch8* 0x90 0x1401f8ec0 6f757268617264776f726b62797468657365776f72647367756172646564706c Patching OSK1: 0x00ce21a8 OSK1 32 ch8* 0x90 0x1401f8f40 0000000000000000000000000000000000000000000000000000000000000000 0x00ce21a8 OSK1 32 ch8* 0x90 0x1401f8ec0 65617365646f6e74737465616c2863294170706c65436f6d7075746572496e63 Patching C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx-debug.exe C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx-debug.exe -> C:\Users\root\Downloads\unlocker427\backup\17.0.0.20800274\vmware-vmx-debug.exe appleSMCTableV0 (smc.version = '0') File Offset : 0x00f99010 Keys Address : 0x140f9ac30 Public Keys : 0x00f0/0240 Private Keys : 0x00f2/0242 Table Offset : 0x00f99030 Getting +LKS: 0x00f99078 +LKS 01 flag 0x90 0x140273520 07 Patching OSK0: 0x00f9d3b0 OSK0 32 ch8* 0x80 0x1402736f0 0000000000000000000000000000000000000000000000000000000000000000 0x00f9d3b0 OSK0 32 ch8* 0x80 0x140273520 6f757268617264776f726b62797468657365776f72647367756172646564706c Patching OSK1: 0x00f9d3f8 OSK1 32 ch8* 0x80 0x1402736f0 0000000000000000000000000000000000000000000000000000000000000000 0x00f9d3f8 OSK1 32 ch8* 0x80 0x140273520 65617365646f6e74737465616c2863294170706c65436f6d7075746572496e63 appleSMCTableV1 (smc.version = '1') File Offset : 0x00f9d440 Keys Address : 0x140f9f060 Public Keys : 0x01b0/0432 Private Keys : 0x01b4/0436 Table Offset : 0x00f9d460 Getting +LKS: 0x00f9d538 +LKS 01 flag 0x90 0x140273520 01 Patching OSK0: 0x00fa4e70 OSK0 32 ch8* 0x90 0x1402736f0 0000000000000000000000000000000000000000000000000000000000000000 0x00fa4e70 OSK0 32 ch8* 0x90 0x140273520 6f757268617264776f726b62797468657365776f72647367756172646564706c Patching OSK1: 0x00fa4eb8 OSK1 32 ch8* 0x90 0x1402736f0 0000000000000000000000000000000000000000000000000000000000000000 0x00fa4eb8 OSK1 32 ch8* 0x90 0x140273520 65617365646f6e74737465616c2863294170706c65436f6d7075746572496e63 Patching C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx-stats.exe C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx-stats.exe -> C:\Users\root\Downloads\unlocker427\backup\17.0.0.20800274\vmware-vmx-stats.exe appleSMCTableV0 (smc.version = '0') File Offset : 0x00d32a30 Keys Address : 0x140d34a50 Public Keys : 0x00f0/0240 Private Keys : 0x00f2/0242 Table Offset : 0x00d32a50 Getting +LKS: 0x00d32a98 +LKS 01 flag 0x90 0x140208340 07 Patching OSK0: 0x00d36dd0 OSK0 32 ch8* 0x80 0x1402083c0 0000000000000000000000000000000000000000000000000000000000000000 0x00d36dd0 OSK0 32 ch8* 0x80 0x140208340 6f757268617264776f726b62797468657365776f72647367756172646564706c Patching OSK1: 0x00d36e18 OSK1 32 ch8* 0x80 0x1402083c0 0000000000000000000000000000000000000000000000000000000000000000 0x00d36e18 OSK1 32 ch8* 0x80 0x140208340 65617365646f6e74737465616c2863294170706c65436f6d7075746572496e63 appleSMCTableV1 (smc.version = '1') File Offset : 0x00d36e60 Keys Address : 0x140d38e80 Public Keys : 0x01b0/0432 Private Keys : 0x01b4/0436 Table Offset : 0x00d36e80 Getting +LKS: 0x00d36f58 +LKS 01 flag 0x90 0x140208340 01 Patching OSK0: 0x00d3e890 OSK0 32 ch8* 0x90 0x1402083c0 0000000000000000000000000000000000000000000000000000000000000000 0x00d3e890 OSK0 32 ch8* 0x90 0x140208340 6f757268617264776f726b62797468657365776f72647367756172646564706c Patching OSK1: 0x00d3e8d8 OSK1 32 ch8* 0x90 0x1402083c0 0000000000000000000000000000000000000000000000000000000000000000 0x00d3e8d8 OSK1 32 ch8* 0x90 0x140208340 65617365646f6e74737465616c2863294170706c65436f6d7075746572496e63 Patching Complete! Copying VMware Tools... C:\Users\root\Downloads\unlocker427\iso\darwinPre15.iso -> C:\Program Files (x86)\VMware\VMware Workstation\darwinPre15.iso C:\Users\root\Downloads\unlocker427\iso\darwin.iso -> C:\Program Files (x86)\VMware\VMware Workstation\darwin.iso Starting VMware services and tasks... Starting service VMAuthdService Starting service VMUSBArbService Starting service VmwareAutostartService Starting task C:\Program Files (x86)\VMware\VMware Workstation\vmware-tray.exe Press Enter key to continue...

现在可以打开 VMware 虚拟机软件,就可以创建 macOS 虚拟机了。

在这里插入图片描述

使用 macOS iso 系统镜像安装

在执行该步骤之前,确保 VMware 已解锁成功。

下载 macOS 系统镜像

创建 macOS 虚拟机

这里选择 macOS 12

在这里插入图片描述

选择 macOS Monterey (12.7) 镜像,提示以下内容:

在这里插入图片描述

这是因为你使用的是 AMD CPU (注:intel CPU 直接安装就行,不用添加下面内容,当然可以也添加产品型号),此时关闭虚拟机,然后编辑 macOS 12 虚拟机 macOS 12.vmx 配置文件。

为了在 AMD CPU 上安装该系统,需要在文件末尾添加以下内容:

cpuid.0.eax = "0000:0000:0000:0000:0000:0000:0000:1011" cpuid.0.ebx = "0111:0101:0110:1110:0110:0101:0100:0111" cpuid.0.ecx = "0110:1100:0110:0101:0111:0100:0110:1110" cpuid.0.edx = "0100:1001:0110:0101:0110:1110:0110:1001" cpuid.1.eax = "0000:0000:0000:0001:0000:0110:0111:0001" cpuid.1.ebx = "0000:0010:0000:0001:0000:1000:0000:0000" cpuid.1.ecx = "1000:0010:1001:1000:0010:0010:0000:0011" cpuid.1.edx = "0000:0111:1000:1011:1111:1011:1111:1111" vhv.enable = "FALSE" vpmc.enable = "FALSE" vvtd.enable = "FALSE"

Note: 确保 vmx 配置文件中,不存在重复的键

[非必须选项] 当然也可以继续添加以下内容,给系统镜像自定义产品型号,例如 iMac 、MacBookPro 等。

iMac

hw.model = "iMac20,2" board-id = "Mac-AF89B6D9451A490B"

MacBookPro

hw.model = "MacBookPro16,4" board-id = "Mac-A61BADE1FDAD7B05"

具体对应关系表格如下:

MacBook Pro

Model IdentifierMachine ModelBoard IDMacBookPro16,4(16-inch, AMD Radeon Pro 5600M)Mac-A61BADE1FDAD7B05MacBookPro16,3(13-inch 2020)Mac-5F9802EFE386AA28MacBookPro16,2(13-inch 2020)Mac-E7203C0F68AA0004

iMac

Model IdentifierMachine ModelBoard IDiMac20,2(Retina 5K, 27-Inch, 2020)Mac-AF89B6D9451A490B

在这里插入图片描述

在这里插入图片描述

在这里插入图片描述

使用 OpenCore 做引导程序安装

在这里插入图片描述

上图 macOS Sonoma 14.1 是使用 OpenCore 的方式这些安装.

安装时需要注意以下问题:

创建虚拟机时,选择使用现有虚拟磁盘,然后选择 OpenCore 核心引导文件。

在这里插入图片描述

确保 OpenCore 引导程序文件使用 SATA 0:0 启动。

然后添加第二个硬盘,添加 mac iso 系统镜像,启动虚拟机安装即可。



【本文地址】


今日新闻


推荐新闻


CopyRight 2018-2019 办公设备维修网 版权所有 豫ICP备15022753号-3