top of page

How To Guide:

Source: LAUNCH TECH CO LTD

LAUNCH Mercedes-Benz W164(2009-) Anti-Theft Key Matching

Just a Heads-Up: This guide is here to help you out, but it’s for general info only. We try to keep everything accurate and reliable, but we can’t promise it’s perfect. So, if you decide to follow this guide, you’re doing it at your own risk.  We’re not responsible for any loss or damage that might happen, including indirect or consequential loss, or any loss of data or profits from using this guide.  Sometimes, we might link to other websites. We don’t control those sites, so we can’t vouch for their content. Just because we link to them doesn’t mean we endorse them.  We do our best to keep this guide running smoothly, but we can’t be held responsible if it’s temporarily unavailable due to technical issues beyond our control.

Mercedes-Benz W164(2009-) Anti-Theft Key Matching


Function:

W164(2009-) EIS Anti-Theft Key Matching


Support product:

LAUNCH X431 PRO5 diagnostic device


Tested EIS:

W164(2009-) EIS, as shown in below:

ree

Operation guide:

1. After entering the Mercedes-Benz Anti-Theft software, connect it according to the wiring diagram, and click "OK" (as shown in the figure below);

ree

2. Click "Anti-Theft Password Reading" (as shown in the figure below);

ree

3. Select the menu according to the actual condition, here click "Operation On The Platform" (as shown in the figure below);

ree

4. Click "Calculate Password By Adding Key" (as shown in the figure below);

ree

5. Click "Automatic Identification" (as shown in the figure below);

ree

6. The type of this EIS is identified, click "OK" (as shown in the figure below);

ree

7. Click "OK" (as shown in the figure below);

ree

8. The following operations may be repeated multiple times, please follow the prompts and click "OK" (as shown in the figure below);

ree

9. Click "OK" after inserting into the infrared keyhole (as shown in the figure below);

ree

10. Follow the prompts and click "OK" (as shown in the figure below);

ree

11. Follow the prompts and click "OK" (as shown in the figure below);

ree

12. Click "OK" after inserting into the infrared keyhole (as shown in the figure below);

ree

13. Collecting data to calculate the password (as shown in the figure below);

ree

14. Follow the prompts and click "OK" (as shown in the figure below);

ree

15. Follow the prompts and click "OK" (as shown in the figure below);

ree

16. Networking to upload data (as shown in the figure below);

ree

17. After the password is calculated, take a screenshot or take a photo to record, and then click "OK" (as shown in the figure below);

ree

18. Click "Yes" (as shown in the figure below);

ree

19. After the file is named and saved, click "OK" (as shown in the figure below);

ree

20. Back to the initial interface, click "Anti-theft Key Matching" (as shown in the figure below);

ree

21. Click "Generate BE Key File" (as shown in the figure below);

ree

22. Click "OK" (as shown in the figure below);

ree

23. Click "OK" (as shown in the figure below);

ree

24. Select the file of password calculation which was saved just now, and click "OK" (as shown in the figure below);

ree

25. Click "OK" after confirming the password (as shown in the figure below);

ree

26. Click "OK" (as shown in the figure below);

ree

27. Click "OK" (as shown in the figure below);

ree

28. Select according to your needs, here select "Key 6", then click "OK" (as shown in the figure below);

ree

29. Networking to generate key file (as shown in the figure below);

ree

30. The key file is successfully generated, write down the file name, and click "OK" (as shown in the figure below);

ree

31. Select according to your needs, here click "No" (as shown in the figure below);

ree

32. Back to the interface of Anti-theft Key Matching, click "Completely Erase BE Key" (as shown in the figure below);

ree

33. Follow the prompts and click "OK" (as shown in the figure below);

ree

34. Click "Yes" (as shown in the figure below);

ree

35. Click "OK" after the key is successfully erased (as shown in the figure below);

ree

36. Back to the Anti-theft Key Matching interface, click "Write Key File" (as shown in the figure below);

ree

37. Follow the prompts and click "OK" (as shown in the figure below);

ree

38. Click "OK" (as shown in the figure below);

ree

39. Select the BE key file generated just now, and click "OK" (as shown in the figure below);

ree

40. Click "OK" (as shown in the figure below);

ree

41. The key file is written successfully, click "OK" to complete the matching (as shown in the figure below);

ree

bottom of page