How to Decode the Password of Monarch Nice 3000 / 3000+ Board with Universal Decoder?

With the development of urbanization, the application of elevator in high-rise buildings is essential. The Monarch Elevator Control System is the most mature and reliable control system in the all-in-one system of elevator industries. The Monarch Elevator Control System is simple and reliable, and easy to maintain, but it has the password that makes the maintainer fall into difficulties. Monarch’s passwords are divided into user password, manufacturer password, implicit password (so-called dynamic password), and even super password. Today ElevatorVip will teach you guys how to unlock / remove the password of Monarch PCB boards, the tutorial as below:

Monarch Decoder Tool, Decode Monarch Board Dynamic Password, Remove Monarch Motherboard User Password, Monarch Nice 3000 Mainboard Decoder, Monarch Nice 3000+ Decoder Tool, Monarch Board Universal Decoder, Monarch Elevator Control System, Monarch Decoder Tool, Monarch STEP Control System Decoder, Monarch All-in-one System Decoder, F5021 Board Decoder, SM-01-DP Decoding Tool, S380 PCB Board Decoder, MCTC-MCB-G Decoder, MCTC-MCB-A Decoder Tool Supplier, Monarch MCTC-MCB-B Decoding Device, Unlock Monarch Board Password, Monarch Password Decoding Tutorial, Monarch Service Tool, Monarch Test Tool, STEP Board Key Pad

Step.1: Must be controller powered off.
Step.2: Then check the motherboard’s version: MCTC-MCB-B, MCTC-MCB-C1, MCTC-MCB-C2, or MCTC-MCB-C3?
Step.3: If the version is MCTC-MCB-C1, MCTC-MCB-C2, and MCTC-MCB-C3, please take out the MCTC-PG card first.
Step.4: Find the clip number U45 on the motherboard.
Step.5: Check the clipping of Monarch Decoder Tool, make sure the No.1 of pin (red cable) is existed.
Step.6: Make sure the No.1 of pin of chip U45 on the motherboard has the point label (white color point).
Step.7: To clip the chip U45 use the Monarch decoder tool, make sure they are matched proper.
Step.8: If the pin chips are matched proper, then the motherboard’s display is lighting on, and LED of COP, LOP, and two others are lighting on.
Step.9: Select the model function on the Monarch decoder tool (press the black switch).
Step.10: For MCTC-MCB-C1, MCTC-MCB-C2, and MCTC-MCB-C3 board is selected on model: NICE 3000+(15.00)?.
Step.11: Then press the green color switch on the Monarch decoder tool to scan the old password.
Step.12: When seen the old password, release the chip clipper and turn on the controller power.
Step.13: Then press the password into the motherboard by Monarch Service Tool (Key pad).

All of above steps are completed to finish the decoding password of Monarch’s board password. If there have any questions, just contact ElevatorVip. Thank you!

The relevant accessories are shown below:


Nippon Elevator Step Controller, MCTC-MCB-B, Monarch NICE3000 Controller, SJEC Step Controller Display Board, Cheap Elevator NICE3000 Controller, Monarch elevator controller Motherboard, MCTC-MCB-C2, MCTC-MCB-C3, Monarch Nice3000 Elevator Control System, Monarch Motherboard for Lift, Monarch Elevator NICE3000 Inverter PCB, Monarch Main Board Manufacturer, Cheap Monarch Main Board

Monarch Service Tool (Keypad)

Monarch Elevator Test Tool, Monarch Service Tool, Monarch MDKE3, Monarch STEP Board Service Tool, Monarch Motherboard Test Tool, Monarch MDKE6, Monarch MDKE Service Tool, Monarch Board Universal Protocol Test Tool, GPS-33E Service Tool, GPS-63E Test Tool, Monarch Elevator Operator, Monarch NICE 3000 Test Tool, Monarch NICE 3000+ Board Service Tool, Monarch STEP Board Key Pad, KONE Elevator Service Tool, Elevator Special Protocol Operator

Monarch Decoder Tool

Monarch Decoder Tool, Monarch NICE 3000 Decoder, NICE 3000+ Remove Password Tool, Unlock STEP Motherboard Device, Universal Elevator Controller Decoder Tool, F5021 Board Decoder, Unlimited Times Decoding Tool, SM-01-DP Board Decoder, SM-01-C Mainboard Decoder, S380 PCB Board Decoder Tool, MCTC-MCB-G Decoding Password, MCTC-MCB-A Decoder, MCTC-MCB-B Board Decoder, MCTC-MCB-C Board Decoder

Posted in Technology and tagged , , , , , , , , , , , , , , , , , , , .