Bigme B6 - Root and Debloat

Here is the Bigme B6 with a custom wallpaper next to my Duoqin P22 Pro.
Supplies
- Bigme B6
- Windows Computer
- MTKClient
- Universal Android Debloater
- ADB Tools
- USB cable between PC and Bigme B6
- Magisk Manager for Android
- Hidden Settings for Android(or similar app)
- Something to drink
Disclaimer
You might brick your device and most certainly void warranty, do this at your own risk!
I used MTKClient to unlock the bootloader, maybe ADB can do it as well.
The procedure will wipe your device, meaning that all data will be deleted - So you know, do a backup first..
The software and choice of hardware worked for me, I could not for the life of me get this running on a Mac and had no access to Linux (Well that is a lie.. I have some RPis in the basement, but that's.. WORK!).
Oh, I'm one of those boring guys that takes no responsibility for what happens to your device.
And lastly, just for the heck of it, this is a world building exercise and not a real step-by-step thingy (wink, wink).
---
Hi there! Future me here, for some reason I started calling the device "toot", just ignore that and carry on with the guide..
Unlock Das Bootoader
So what I have seen, the Bigme B6 flavour of Android does not come with a "normal" settings app, so lets go ahead and install the Hidden Settings app via adb by connecting the tablet to your PC, navigating to the folder where the app is downloaded and run the command:
adb install .\hidden_settings_app.apk
Open the app on the Bigme B6 and use "Advanced Search", search for "About Tablet", look for "Build number" and press it 100 times to enable Developer options (Maybe 10 times is enough, it will actually spell out when you'r a developer).
- Go back and search for "System", look for System System (Yes two systems in the same thing), press it and choose Developer options.
- Make sure that:
- "Use developer options" is toggled.
- OEM unlocking is toggled.
- "USB debugging" is toggled.
Now, we are going to put the Bigme B6 into BROm mode by doing this:
- Remove the USB cable.
- Run the following commands from the folder where you installed MTKClient:
python.exe .\mtk e metadata,userdata,md_udc
- Then this command:
python.exe .\mtk da seccfg unlock
- Turn the tablet off and reinsert the USB cable.
If MTKClient says something like "Waiting for device" or throws an error at you, don't panic.
The "normal" way to get into BROm mode is by pressing volume ur / volume down / power / floor 7, but as you might have noticed, we only have the one power button.. So try to long press, short press and even remove the USB cable.
It will work!
---
It might seem like your Bigme B6 is now in an endless bootloop.
That's not the case - when unlocking the bootloader a warning saying something like "Your bootloader is unlocked and your device is now UNSAFE and UNFIT to use, throw it away - or press the power button to move on".
The thing is, for some reason the tablet does not print this out, so what you have to do is press the power button once every second (at least that's what I do) until the device is booted into the OS.
---
Backup the System
This is a boring but important step. If something goes tewably wong, this will be your only way to get back to a functioning tablet.
As per the previous step, get your tablet into BROm mode and run the following commands from the folder where you installed MTKClient:
mkdir backup_folder
python.exe .\mtk rl --skip userdata backup_folder
This will create a folder named backup_folder and then save all the files in that folder.
Now let's root the toot!
Root the Toot
Repetition is the mother of learning!
Since we wiped the device we need to redo some steps so here is a copy pasta:
So what I have seen, the Bigme B6 flavour of Android does not come with a "normal" settings app, so lets go ahead and install the Hidden Settings app and Magisk Manager via adb by connecting the tablet to your PC, navigating to the folder where the apps are downloaded and run the command:
adb install .\hidden_settings_app.apk
adb install .\magisk_manager.apk
Open the Hidden Settings app on the Bigme B6 and use "Advanced Search", search for "About Tablet", look for "Build number" and press it 100 times to enable Developer options (Maybe 10 times is enough, it will actually spell out when you'r a developer).
- Go back and search for "System", look for System System (Yes two systems in the same thing), press it and choose Developer options.
- Make sure that:
- "Use developer options" is toggled.
- "USB debugging" is toggled.
Now, lets play with adb for a bit by running the following command:
adb reboot fastboot
fastboot getvar current-slot
This will show us what slot the system is running on, slot A or B (A really cool Android feature that makes easy recovery possible if the system gets FUBAR).
With the knowledge of what slot we are using (It's slot A right?) we can boot into the system again:
fastboot reboot
Have a look into the device_backup folder we created earlier and localise the boot_x.bin (The x marks the a or b slot you are on currently), copy that file to the same folder where you stored the apps and run the following command:
adb push .\boot_x.bin /sdcard/Download
This will push the file into the Download folder on the Bigme B6.
We're getting close now..
- Open Magisk Manager on the device and Install via select and patch a file.
- Open the boot_x.bin file and patch it.
- Rename the newly created file to something manageable e.g. patched_boot_x.img (Rename it with the "Internal Storage"-settings app).
- Run the following command to get it back to your computer:
adb pull /sdcard/Download/patched_boot_x.img
Now, with the file on your computer, run this command again:
adb reboot fastboot
Followed by this command to flash the new boot image:
fastboot flash boot_x .\patched_boot_x.img
Now reboot into system again with fastboot reboot and.. That's it!
Almost, don't forget that we're going to debloat the toot!
Debloat the Toot
Install and open Universal Android Debloater
Download the file in this step (the uad_exported_selection.txt*) to the same folder from where you run the software and chose "Uninstall selection".
Congratulations! You did the thing!!!
*If you don't trust things online, good for you! Here are the list in plain text:
com.android.backupconfirm
com.android.calllogbackup
com.android.dialer
com.android.mms
com.android.music
com.android.nfc
com.android.providers.calendar
com.android.quicksearchbox
com.android.sharedstoragebackup
com.b300.xrz.web
com.ebook.imagemanager
com.ebook.wifitransferbook
com.example.test
com.google.android.adservices.api
com.google.android.calculator
com.google.android.gms.supervision
com.google.android.health.connect.backuprestore
com.iflytek.speechcloud
com.mediatek.callrecorder
com.mediatek.duraspeed
com.mediatek.simprocessor
com.mediatek.telephony
com.mediatek.voicecommand
com.mediatek.voiceunlock
com.socialnmobile.colordict
com.xrz.ai
com.xrz.appstore
com.xrz.bookmall
com.xrz.btranslate
com.xrz.dictapp
com.xrz.doc.translate
com.xrz.ebook
com.xrz.ebook.shelf
com.xrz.mutidisplay
com.xrz.soundrecord
com.xrz.video
com.xrz.voice.text
com.xrz.weichat.filetransfer
com.xrz.xreaderV3
Downloads
Celebrate and Give Me Money

Good job with the thing you just did, and even do I made non of the software I think you should give me a bunch of money! So click this link to do so, THANK YOU FOR YOUR ATTENTION TO THIS MATTER!