在 VMware 虚拟机上安装黑苹果(Hackintosh):免费 macOS ISO 镜像下载及安装教程

2024-06-04 6334阅读
  • 在 VMware 虚拟机上安装黑苹果(Hackintosh):免费 macOS ISO 镜像下载及安装教程
    • VMware 虚拟机解锁 macOS 安装选项
    • 使用 macOS iso 系统镜像安装
    • 使用 OpenCore 做引导程序安装

      在 VMware 虚拟机上安装黑苹果(Hackintosh):免费 macOS ISO 镜像下载及安装教程

      当涉及在 VMware 虚拟机上安装黑苹果(Hackintosh)时,有两种主要方法:

      1. 使用 macOS iso 镜像安装。
      2. 使用 OpenCore 作引导程序安装。

      本文重点介绍使用 macOS ISO 黑苹果镜像的安装方法,并提供免费的 macOS Monterey (12.7) 系统镜像资源下载链接。

      从设置 VMware 到安装过程,一步步指导安装黑苹果,让你轻松体验 macOS 虚拟化环境。

      OpenCore 的使用方式,请参考:https://dortania.github.io/OpenCore-Install-Guide/

      解锁工具 csdn:

      https://download.csdn.net/download/cheungxiongwei/88639281?spm=1001.2014.3001.5503

      VMware 虚拟机解锁 macOS 安装选项

      Monterey (12.7) 镜像资源下载:zip压缩分卷合集,全部下载下来,解压即可。

      免费下载,无任何下载积分,全部下载完成后,打开 Monterey.zip 文件即可解压 macOS iso 系统镜像文件。

      https://download.csdn.net/download/cheungxiongwei/88639279

      https://download.csdn.net/download/cheungxiongwei/88639037?spm=1001.2014.3001.5503

      https://download.csdn.net/download/cheungxiongwei/88639076?spm=1001.2014.3001.5503

      https://download.csdn.net/download/cheungxiongwei/88639196?spm=1001.2014.3001.5503

      https://download.csdn.net/download/cheungxiongwei/88639202?spm=1001.2014.3001.5503

      https://download.csdn.net/download/cheungxiongwei/88639210?spm=1001.2014.3001.5503

      https://download.csdn.net/download/cheungxiongwei/88639215?spm=1001.2014.3001.5503

      https://download.csdn.net/download/cheungxiongwei/88639220?spm=1001.2014.3001.5503

      https://download.csdn.net/download/cheungxiongwei/88639227?spm=1001.2014.3001.5503

      https://download.csdn.net/download/cheungxiongwei/88639234?spm=1001.2014.3001.5503

      https://download.csdn.net/download/cheungxiongwei/88639253?spm=1001.2014.3001.5503

      https://download.csdn.net/download/cheungxiongwei/88639260?spm=1001.2014.3001.5503

      https://download.csdn.net/download/cheungxiongwei/88639270?spm=1001.2014.3001.5503

      VMware macOS

      在 VMware 虚拟机上安装黑苹果(Hackintosh):免费 macOS ISO 镜像下载及安装教程 第1张

      为了让 VMware 可以创建 macOS 虚拟机,需要下载 unlock.exe 工具, 并以管理员权限运行 unlock.exe 工具,给 VMware 打上 macOS 补丁。

      下载地址:从 https://github.com/DrDonk/unlocker 下载 unlocker 工具。

      在 VMware 虚拟机上安装黑苹果(Hackintosh):免费 macOS ISO 镜像下载及安装教程 第2张

      unlock.exe 工具输出内容如下:

      Unlocker 4.2.7 for VMware Workstation/Player
      ============================================
      VMware is installed at:  C:\Program Files (x86)\VMware\VMware Workstation\
      VMware version:  20800274
      Stopping VMware services and tasks...
      Stopping service  VMUSBArbService
      Stopping service  VMAuthdService
      Stopping service  VmwareAutostartService
      Stopping task  vmware-tray.exe
      Installing unlock patches
      Patching...
      Patching C:\Program Files (x86)\VMware\VMware Workstation\vmwarebase.dll
      C:\Program Files (x86)\VMware\VMware Workstation\vmwarebase.dll -> C:\Users\root\Downloads\unlocker427\backup.0.0.20800274\vmwarebase.dll
      Flag patched @ offset: 0x004e85e0  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x004e8620  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x004e8660  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x004e86a0  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x004e86e0  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x004e8720  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x004e8760  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x004e87a0  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x004e87e0  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x004e8820  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x004e8860  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x004e88a0  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x004e88e0  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x004e8920  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x004e8960  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x004e89a0  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x004e89e0  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x004e8a20  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x0059e1a0  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x0059e1e0  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x0059e220  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x0059e260  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x0059e2a0  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x0059e2e0  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x0059e320  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x0059e360  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x0059e3a0  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x0059e3e0  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x0059e420  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x0059e460  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x0059e4a0  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x0059e4e0  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x0059e520  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x0059e560  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x0059e5a0  Flag: 0x3e -> 0x3f
      Flag patched @ offset: 0x0059e5e0  Flag: 0x3e -> 0x3f
      Patched 36 flags
      Patching C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx.exe
      C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx.exe -> C:\Users\root\Downloads\unlocker427\backup.0.0.20800274\vmware-vmx.exe
      appleSMCTableV0 (smc.version = '0')
      File Offset  : 0x00cd6300
      Keys Address : 0x140cd7b20
      Public Keys  : 0x00f0/0240
      Private Keys : 0x00f2/0242
      Table Offset : 0x00cd6320
      Getting +LKS:
      0x00cd6368 +LKS 01  flag 0x90 0x1401f8ec0 07
      Patching OSK0:
      0x00cda6a0 OSK0 32  ch8* 0x80 0x1401f8f40 0000000000000000000000000000000000000000000000000000000000000000
      0x00cda6a0 OSK0 32  ch8* 0x80 0x1401f8ec0 6f757268617264776f726b62797468657365776f72647367756172646564706c
      Patching OSK1:
      0x00cda6e8 OSK1 32  ch8* 0x80 0x1401f8f40 0000000000000000000000000000000000000000000000000000000000000000
      0x00cda6e8 OSK1 32  ch8* 0x80 0x1401f8ec0 65617365646f6e74737465616c2863294170706c65436f6d7075746572496e63
      appleSMCTableV1 (smc.version = '1')
      File Offset  : 0x00cda730
      Keys Address : 0x140cdbf50
      Public Keys  : 0x01b0/0432
      Private Keys : 0x01b4/0436
      Table Offset : 0x00cda750
      Getting +LKS:
      0x00cda828 +LKS 01  flag 0x90 0x1401f8ec0 01
      Patching OSK0:
      0x00ce2160 OSK0 32  ch8* 0x90 0x1401f8f40 0000000000000000000000000000000000000000000000000000000000000000
      0x00ce2160 OSK0 32  ch8* 0x90 0x1401f8ec0 6f757268617264776f726b62797468657365776f72647367756172646564706c
      Patching OSK1:
      0x00ce21a8 OSK1 32  ch8* 0x90 0x1401f8f40 0000000000000000000000000000000000000000000000000000000000000000
      0x00ce21a8 OSK1 32  ch8* 0x90 0x1401f8ec0 65617365646f6e74737465616c2863294170706c65436f6d7075746572496e63
      Patching C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx-debug.exe
      C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx-debug.exe -> C:\Users\root\Downloads\unlocker427\backup.0.0.20800274\vmware-vmx-debug.exe
      appleSMCTableV0 (smc.version = '0')
      File Offset  : 0x00f99010
      Keys Address : 0x140f9ac30
      Public Keys  : 0x00f0/0240
      Private Keys : 0x00f2/0242
      Table Offset : 0x00f99030
      Getting +LKS:
      0x00f99078 +LKS 01  flag 0x90 0x140273520 07
      Patching OSK0:
      0x00f9d3b0 OSK0 32  ch8* 0x80 0x1402736f0 0000000000000000000000000000000000000000000000000000000000000000
      0x00f9d3b0 OSK0 32  ch8* 0x80 0x140273520 6f757268617264776f726b62797468657365776f72647367756172646564706c
      Patching OSK1:
      0x00f9d3f8 OSK1 32  ch8* 0x80 0x1402736f0 0000000000000000000000000000000000000000000000000000000000000000
      0x00f9d3f8 OSK1 32  ch8* 0x80 0x140273520 65617365646f6e74737465616c2863294170706c65436f6d7075746572496e63
      appleSMCTableV1 (smc.version = '1')
      File Offset  : 0x00f9d440
      Keys Address : 0x140f9f060
      Public Keys  : 0x01b0/0432
      Private Keys : 0x01b4/0436
      Table Offset : 0x00f9d460
      Getting +LKS:
      0x00f9d538 +LKS 01  flag 0x90 0x140273520 01
      Patching OSK0:
      0x00fa4e70 OSK0 32  ch8* 0x90 0x1402736f0 0000000000000000000000000000000000000000000000000000000000000000
      0x00fa4e70 OSK0 32  ch8* 0x90 0x140273520 6f757268617264776f726b62797468657365776f72647367756172646564706c
      Patching OSK1:
      0x00fa4eb8 OSK1 32  ch8* 0x90 0x1402736f0 0000000000000000000000000000000000000000000000000000000000000000
      0x00fa4eb8 OSK1 32  ch8* 0x90 0x140273520 65617365646f6e74737465616c2863294170706c65436f6d7075746572496e63
      Patching C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx-stats.exe
      C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx-stats.exe -> C:\Users\root\Downloads\unlocker427\backup.0.0.20800274\vmware-vmx-stats.exe
      appleSMCTableV0 (smc.version = '0')
      File Offset  : 0x00d32a30
      Keys Address : 0x140d34a50
      Public Keys  : 0x00f0/0240
      Private Keys : 0x00f2/0242
      Table Offset : 0x00d32a50
      Getting +LKS:
      0x00d32a98 +LKS 01  flag 0x90 0x140208340 07
      Patching OSK0:
      0x00d36dd0 OSK0 32  ch8* 0x80 0x1402083c0 0000000000000000000000000000000000000000000000000000000000000000
      0x00d36dd0 OSK0 32  ch8* 0x80 0x140208340 6f757268617264776f726b62797468657365776f72647367756172646564706c
      Patching OSK1:
      0x00d36e18 OSK1 32  ch8* 0x80 0x1402083c0 0000000000000000000000000000000000000000000000000000000000000000
      0x00d36e18 OSK1 32  ch8* 0x80 0x140208340 65617365646f6e74737465616c2863294170706c65436f6d7075746572496e63
      appleSMCTableV1 (smc.version = '1')
      File Offset  : 0x00d36e60
      Keys Address : 0x140d38e80
      Public Keys  : 0x01b0/0432
      Private Keys : 0x01b4/0436
      Table Offset : 0x00d36e80
      Getting +LKS:
      0x00d36f58 +LKS 01  flag 0x90 0x140208340 01
      Patching OSK0:
      0x00d3e890 OSK0 32  ch8* 0x90 0x1402083c0 0000000000000000000000000000000000000000000000000000000000000000
      0x00d3e890 OSK0 32  ch8* 0x90 0x140208340 6f757268617264776f726b62797468657365776f72647367756172646564706c
      Patching OSK1:
      0x00d3e8d8 OSK1 32  ch8* 0x90 0x1402083c0 0000000000000000000000000000000000000000000000000000000000000000
      0x00d3e8d8 OSK1 32  ch8* 0x90 0x140208340 65617365646f6e74737465616c2863294170706c65436f6d7075746572496e63
      Patching Complete!
      Copying VMware Tools...
      C:\Users\root\Downloads\unlocker427\iso\darwinPre15.iso -> C:\Program Files (x86)\VMware\VMware Workstation\darwinPre15.iso
      C:\Users\root\Downloads\unlocker427\iso\darwin.iso -> C:\Program Files (x86)\VMware\VMware Workstation\darwin.iso
      Starting VMware services and tasks...
      Starting service  VMAuthdService
      Starting service  VMUSBArbService
      Starting service  VmwareAutostartService
      Starting task  C:\Program Files (x86)\VMware\VMware Workstation\vmware-tray.exe
      Press Enter key to continue...
      

      现在可以打开 VMware 虚拟机软件,就可以创建 macOS 虚拟机了。

      在 VMware 虚拟机上安装黑苹果(Hackintosh):免费 macOS ISO 镜像下载及安装教程 第3张

      使用 macOS iso 系统镜像安装

      在执行该步骤之前,确保 VMware 已解锁成功。

      1. 下载 macOS 系统镜像

      2. 创建 macOS 虚拟机

      这里选择 macOS 12

      在 VMware 虚拟机上安装黑苹果(Hackintosh):免费 macOS ISO 镜像下载及安装教程 第3张

      选择 macOS Monterey (12.7) 镜像,提示以下内容:

      在 VMware 虚拟机上安装黑苹果(Hackintosh):免费 macOS ISO 镜像下载及安装教程 第5张

      这是因为你使用的是 AMD CPU (注:intel CPU 直接安装就行,不用添加下面内容,当然可以也添加产品型号),此时关闭虚拟机,然后编辑 macOS 12 虚拟机 macOS 12.vmx 配置文件。

      为了在 AMD CPU 上安装该系统,需要在文件末尾添加以下内容:

      cpuid.0.eax = "0000:0000:0000:0000:0000:0000:0000:1011"
      cpuid.0.ebx = "0111:0101:0110:1110:0110:0101:0100:0111"
      cpuid.0.ecx = "0110:1100:0110:0101:0111:0100:0110:1110"
      cpuid.0.edx = "0100:1001:0110:0101:0110:1110:0110:1001"
      cpuid.1.eax = "0000:0000:0000:0001:0000:0110:0111:0001"
      cpuid.1.ebx = "0000:0010:0000:0001:0000:1000:0000:0000"
      cpuid.1.ecx = "1000:0010:1001:1000:0010:0010:0000:0011"
      cpuid.1.edx = "0000:0111:1000:1011:1111:1011:1111:1111"
      vhv.enable = "FALSE"
      vpmc.enable = "FALSE"
      vvtd.enable = "FALSE"
      

      Note: 确保 vmx 配置文件中,不存在重复的键

      [非必须选项] 当然也可以继续添加以下内容,给系统镜像自定义产品型号,例如 iMac 、MacBookPro 等。

      iMac

      hw.model = "iMac20,2"
      board-id = "Mac-AF89B6D9451A490B"
      

      MacBookPro

      hw.model = "MacBookPro16,4"
      board-id = "Mac-A61BADE1FDAD7B05"
      

      具体对应关系表格如下:

      MacBook Pro

      Model IdentifierMachine ModelBoard ID
      MacBookPro16,4(16-inch, AMD Radeon Pro 5600M)Mac-A61BADE1FDAD7B05
      MacBookPro16,3(13-inch 2020)Mac-5F9802EFE386AA28
      MacBookPro16,2(13-inch 2020)Mac-E7203C0F68AA0004

      iMac

      Model IdentifierMachine ModelBoard ID
      iMac20,2(Retina 5K, 27-Inch, 2020)Mac-AF89B6D9451A490B

      在 VMware 虚拟机上安装黑苹果(Hackintosh):免费 macOS ISO 镜像下载及安装教程 第6张

      在 VMware 虚拟机上安装黑苹果(Hackintosh):免费 macOS ISO 镜像下载及安装教程 第7张

      在 VMware 虚拟机上安装黑苹果(Hackintosh):免费 macOS ISO 镜像下载及安装教程 第8张

      使用 OpenCore 做引导程序安装

      在 VMware 虚拟机上安装黑苹果(Hackintosh):免费 macOS ISO 镜像下载及安装教程 第9张

      上图 macOS Sonoma 14.1 是使用 OpenCore 的方式这些安装.

      安装时需要注意以下问题:

      创建虚拟机时,选择使用现有虚拟磁盘,然后选择 OpenCore 核心引导文件。

      在 VMware 虚拟机上安装黑苹果(Hackintosh):免费 macOS ISO 镜像下载及安装教程 第10张

      确保 OpenCore 引导程序文件使用 SATA 0:0 启动。

      然后添加第二个硬盘,添加 mac iso 系统镜像,启动虚拟机安装即可。


    免责声明:我们致力于保护作者版权,注重分享,被刊用文章因无法核实真实出处,未能及时与作者取得联系,或有版权异议的,请联系管理员,我们会立即处理! 部分文章是来自自研大数据AI进行生成,内容摘自(百度百科,百度知道,头条百科,中国民法典,刑法,牛津词典,新华词典,汉语词典,国家院校,科普平台)等数据,内容仅供学习参考,不准确地方联系删除处理! 图片声明:本站部分配图来自人工智能系统AI生成,觅知网授权图片,PxHere摄影无版权图库和百度,360,搜狗等多加搜索引擎自动关键词搜索配图,如有侵权的图片,请第一时间联系我们,邮箱:ciyunidc@ciyunshuju.com。本站只作为美观性配图使用,无任何非法侵犯第三方意图,一切解释权归图片著作权方,本站不承担任何责任。如有恶意碰瓷者,必当奉陪到底严惩不贷!

    目录[+]